-------- Forwarded Message --------
Subject: [AISWorld] CFP: IEEE ISPA2017 (Parallel and Distributed
Processing with Applications), Dec. 2018, Melbourne, Australia
Date: Sun, 17 Jun 2018 04:18:14 +1000
From: Jesson Butt <jesson.butt(a)gmail.com>
To: aisworld(a)lists.aisnet.org
Call for papers:
The 16th IEEE International Symposium on Parallel and Distributed
Processing with Applications (ISPA 2018), 11-13 Dec. 2018, Melbourne,
Australia.
Website: http://www.swinflow.org/confs/2018/ispa/
Key dates:
Submission Deadline: August 31, 2018 (11:59pm UTC/GMT, firm)
Notification: September 30, 2018
Final Manuscript Due: October 15, 2018
Submission site: http://www.swinflow.org/confs/2018/ispa/submission.htm
Publication:
Proceedings will be published by IEEE CS Press.
Special issues:
Distinguished papers will be selected for special issues in Information
Sciences, Future Generation Computer Systems, Journal of Parallel and
Distributed Computing, Concurrency and Computation: Practice and Experience
===========
Introduction
The IEEE ISPA 2018 (16th IEEE International Symposium on Parallel and
Distributed Processing with Applications) is a forum for presenting leading
work on parallel and distributed computing and networking, including
architecture, compilers, runtime systems, applications, reliability,
security, parallel programming models and much more. During the symposium,
scientists and engineers in both academia and industry are invited to
present their work on concurrent and parallel systems (multicore,
multithreaded, heterogeneous, clustered systems, distributed systems,
grids, clouds, and large scale machines).
The 16th IEEE ISPA follows the tradition of previous successful IEEE ISPA
conferences in the years from 2003 to 2017 in Asia, Europe, Australia and
North America. It will feature sessions of regular presentations,
workshops, tutorials and keynote speeches. IEEE ISPA 2018 is sponsored by
the IEEE Technical Committee on Scalable Computing (TCSC) and the IEEE
Computer Society. IEEE ISPA is particularly interested in research
addressing heterogeneous computing with the use of accelerators, mobile
computing, approximate computing, tools and methodologies to improve the
quality of parallel programming and applying generic computing approaches
to networks, in particular Software Defined networking and its
applications.
Scope and Topics
*(1) Systems and Architectures Track*
- Cloud computing and data center technology
- Migration of computations
- Multi-clouds environments, cloud federation, interoperability
- Energy management and Green Computing
- Wireless and mobile networks
- Internet-Of-Things (IoT)
- Social Networks, crowdsourcing, and P2P systems
*(2) Technologies and Tools Track*
- Building block processors: FPGA, multicore, GPU, NoC, SoC
- Parallel and distributed algorithms
- Tools/environments for parallel/distributed software development
- Novel parallel programming paradigms
- Programming models for cloud services and applications
- Code generation and optimization
- Compilers for parallel computers
- Middleware and tools
- Scheduling and resource management
- Performance simulations, measurement, and evaluations
- Reliability, fault tolerance, dependability, and security
*(3) Applications Track*
- High-performance scientific and engineering computing
- Grid and cluster computing
- Pervasive and ubiquitous computing
- Databases, data mining, and data management
- Big data and business analytics
- Scientific cloud systems and services
- Internet computing and web services
- Application scenarios of IoT and ubiquitous computing
- Experience with computational, workflow and data-intensive
applications
- Software Defined Networks and its applications
Submission Guidelines
Submissions must include an abstract, keywords, the e-mail address of the
corresponding author and should not exceed 8 pages for main conference,
including tables and figures in IEEE CS format. The template files for
LATEX or WORD can be downloaded here. All paper submissions must represent
original and unpublished work. Each submission will be peer reviewed by at
least three program committee members. Submission of a paper should be
regarded as an undertaking that, should the paper be accepted, at least one
of the authors will register for the conference and present the work.
Submit your paper(s) in PDF file at the submission site:
http://www.swinflow.org/confs/2018/ispa/submission.htm.
Publications
Accepted and presented papers will be included into the IEEE
Conference Proceedings published by IEEE CS Press. Authors of accepted
papers, or at least one of them, are requested to register and present
their work at the conference, otherwise their papers may be removed from
the digital libraries of IEEE CS and EI after the conference.
Distinguished papers will be selected for special issues in Information
Sciences, Future Generation Computer Systems, Journal of Parallel and
Distributed Computing, Concurrency and Computation: Practice and Experience.
Honorary Chairs
Wanlei Zhou, Deakin University, Australia
Albert Zomaya, The University of Sydney, Australia
General Chairs
Geoffrey Fox, Indiana University, USA
Beniamino Di Martino, Universita' della Campania "Luigi Vanvitelli", Italy
Laurence Yang, St. Francis Xavier University, Canada
Program Chairs
Mianxiong Dong, Muroran Institute of Technology, Japan
Rajiv Ranjan, Newcastle University, UK
Massimo Cafaro, University of Salento, Lecce, Italy
Workshop Chairs
Young Choon Lee, Macquarie University, Australia
Wei Zheng, Xiamen University, China
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Forwarded Message --------
Subject: [AISWorld] CFP: IEEE ISPA2018 (Parallel and Distributed
Processing with Applications), Dec. 2018, Melbourne, Australia
Date: Sun, 17 Jun 2018 04:32:08 +1000
From: Jesson Butt <jesson.butt(a)gmail.com>
To: aisworld(a)lists.aisnet.org
Call for papers:
The 16th IEEE International Symposium on Parallel and Distributed
Processing with Applications (ISPA 2018), 11-13 Dec. 2018, Melbourne,
Australia.
Website: http://www.swinflow.org/confs/2018/ispa/
Key dates:
Submission Deadline: August 31, 2018 (11:59pm UTC/GMT, firm)
Notification: September 30, 2018
Final Manuscript Due: October 15, 2018
Submission site: http://www.swinflow.org/confs/2018/ispa/submission.htm
Publication:
Proceedings will be published by IEEE CS Press.
Special issues:
Distinguished papers will be selected for special issues in Information
Sciences, Future Generation Computer Systems, Journal of Parallel and
Distributed Computing, Concurrency and Computation: Practice and Experience
===========
Introduction
The IEEE ISPA 2018 (16th IEEE International Symposium on Parallel and
Distributed Processing with Applications) is a forum for presenting leading
work on parallel and distributed computing and networking, including
architecture, compilers, runtime systems, applications, reliability,
security, parallel programming models and much more. During the symposium,
scientists and engineers in both academia and industry are invited to
present their work on concurrent and parallel systems (multicore,
multithreaded, heterogeneous, clustered systems, distributed systems,
grids, clouds, and large scale machines).
The 16th IEEE ISPA follows the tradition of previous successful IEEE ISPA
conferences in the years from 2003 to 2017 in Asia, Europe, Australia and
North America. It will feature sessions of regular presentations,
workshops, tutorials and keynote speeches. IEEE ISPA 2018 is sponsored by
the IEEE Technical Committee on Scalable Computing (TCSC) and the IEEE
Computer Society. IEEE ISPA is particularly interested in research
addressing heterogeneous computing with the use of accelerators, mobile
computing, approximate computing, tools and methodologies to improve the
quality of parallel programming and applying generic computing approaches
to networks, in particular Software Defined networking and its
applications.
Scope and Topics
*(1) Systems and Architectures Track*
- Cloud computing and data center technology
- Migration of computations
- Multi-clouds environments, cloud federation, interoperability
- Energy management and Green Computing
- Wireless and mobile networks
- Internet-Of-Things (IoT)
- Social Networks, crowdsourcing, and P2P systems
*(2) Technologies and Tools Track*
- Building block processors: FPGA, multicore, GPU, NoC, SoC
- Parallel and distributed algorithms
- Tools/environments for parallel/distributed software development
- Novel parallel programming paradigms
- Programming models for cloud services and applications
- Code generation and optimization
- Compilers for parallel computers
- Middleware and tools
- Scheduling and resource management
- Performance simulations, measurement, and evaluations
- Reliability, fault tolerance, dependability, and security
*(3) Applications Track*
- High-performance scientific and engineering computing
- Grid and cluster computing
- Pervasive and ubiquitous computing
- Databases, data mining, and data management
- Big data and business analytics
- Scientific cloud systems and services
- Internet computing and web services
- Application scenarios of IoT and ubiquitous computing
- Experience with computational, workflow and data-intensive
applications
- Software Defined Networks and its applications
Submission Guidelines
Submissions must include an abstract, keywords, the e-mail address of the
corresponding author and should not exceed 8 pages for main conference,
including tables and figures in IEEE CS format. The template files for
LATEX or WORD can be downloaded here. All paper submissions must represent
original and unpublished work. Each submission will be peer reviewed by at
least three program committee members. Submission of a paper should be
regarded as an undertaking that, should the paper be accepted, at least one
of the authors will register for the conference and present the work.
Submit your paper(s) in PDF file at the submission site:
http://www.swinflow.org/confs/2018/ispa/submission.htm.
Publications
Accepted and presented papers will be included into the IEEE
Conference Proceedings published by IEEE CS Press. Authors of accepted
papers, or at least one of them, are requested to register and present
their work at the conference, otherwise their papers may be removed from
the digital libraries of IEEE CS and EI after the conference.
Distinguished papers will be selected for special issues in Information
Sciences, Future Generation Computer Systems, Journal of Parallel and
Distributed Computing, Concurrency and Computation: Practice and Experience.
Honorary Chairs
Wanlei Zhou, Deakin University, Australia
Albert Zomaya, The University of Sydney, Australia
General Chairs
Geoffrey Fox, Indiana University, USA
Beniamino Di Martino, Universita' della Campania "Luigi Vanvitelli", Italy
Laurence Yang, St. Francis Xavier University, Canada
Program Chairs
Mianxiong Dong, Muroran Institute of Technology, Japan
Rajiv Ranjan, Newcastle University, UK
Massimo Cafaro, University of Salento, Lecce, Italy
Workshop Chairs
Young Choon Lee, Macquarie University, Australia
Wei Zheng, Xiamen University, China
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Forwarded Message --------
Subject: [AISWorld] CFP: SpaCCS2018 (Security, Privacy and Anonymity),
Dec. 2018, Melbourne, Australia
Date: Sun, 17 Jun 2018 04:43:11 +1000
From: Jesson Butt <jesson.butt(a)gmail.com>
To: aisworld(a)lists.aisnet.org
Call for papers:
The 11th International conference on Security, Privacy and Anonymity in
Computation, Communication and Storage (SpaCCS 2018), 11-13 Dec. 2018,
Melbourne, Australia.
Website: http://www.swinflow.org/confs/2018/spaccs/
Key dates:
Submission Deadline: August 31, 2018 (11:59pm UTC/GMT, firm)
Notification: September 30, 2018
Final Manuscript Due: October 15, 2018
Submission site: http://www.swinflow.org/confs/2018/spaccs/submission.htm
Publication:
Proceedings will be published by IEEE CS Press.
Special issues:
Distinguished papers will be selected for special issues in Information
Sciences, Future Generation Computer Systems, Journal of Parallel and
Distributed Computing, Concurrency and Computation: Practice and Experience
===========
Introduction
The SpaCCS 2018 conference is the 11th event in the series of conferences
which are devoted to security, privacy and anonymity in computation,
communication and storage. SpaCCS is now recognized as the main regular
event of the world that is covering many dimensions including security
algorithms and architectures, privacy-aware policies, regulations and
techniques, anonymous computation and communication, encompassing
fundamental theoretical approaches, practical experimental projects, and
commercial application systems for computation, communication and storage.
As applications of computer systems and networks have permeated in every
aspect of our daily life, the issues of security, privacy, and anonymity
have become increasingly critical. The conference will provide a forum for
the world-class researchers to gather and share their research
achievements, emerging ideas and trends in the highly challenging research
fields.
The conference aims at bringing together researchers and practitioners in
the world working in the research fields of computation, communication and
storage, with regard to security, privacy, and anonymity aspects of
computer systems and networks. SpaCCS will focus on three broad areas of
computation, communication, and storage, i.e. architectures, algorithms,
techniques, and applications for security, privacy and anonymity.
* Scope and Topics*
Track 1: Security
1.1 Computation
(1) Security Model and Architecture
(2) Software and System Security
(3) Secure Computing Platform
(4) Secure Network Computing
(5) Security in Cloud Computing and Pervasive/Ubiquitous Computing
(6) Risk Analysis and Management
1.2 Communication
(1) Network Security
(2) Malware and Botnets
(3) Intrusion Detection
(4) Security in Web Services
(5) Security in Mobile Social Networks
(6) Security in Mobile and Wireless Communications
(7) Fraud and Cyber-Crime
1.3 Storage
(1) Access Control
(2) Applied Cryptography
(3) Database Security
(4) Data Protection and Data Integrity
(5) Digital Content Protection and Digital Forensics
(6) Information Hiding
(7) Security in Big Data and its Applications
Track 2: Privacy
2.1 Computation
(1) Measuring and Quantifying Privacy
(2) Privacy Modelling and Analysis
(3) Software and System Privacy
(4) Privacy-preserving Computing Platform
(5) Privacy-enhanced Network Computing
(6) Obfuscation-based Privacy
(7) Cryptographic Tools for Privacy
(8) Building and Deploying Privacy-enhancing Systems
(9) Reliability, Robustness, and Abuse Prevention in Privacy
Systems
2.2 Communication
(1) Privacy in Web Services
(2) Privacy Metrics and Policies
(3) Crowdsourcing for Privacy
(4) Location and Mobility Privacy
(5) Privacy in Cloud and Big Data Applications
(6) Privacy in Ubiquitous Computing and Mobile Devices
(7) Privacy in Social Networks and Microblogging Systems
(8) Privacy-enhanced Access Control, Authentication, and Identity
Management
2.3 Storage
(1) Data Protection Technologies
(2) Differential Privacy
(3) Privacy in Big Data and its Applications
(4) Policy Languages and Tools for Privacy
(5) Privacy and Human Rights
(6) Interdisciplinary Research Connecting Privacy to Other Fields
(7) Privacy in Cloud Computing and Pervasive/Ubiquitous Computing
(8) Information Leakage, Data Correlation and Generic Attacks to
Privacy
(9) Privacy-Preserving Data Mining, Data Release and Publishing
Track 3: Anonymity
3.1 Computation
(1) Anonymous Data Mining and Data Sharing
(2) Parallelism Exploitation Techniques for Anonymity
(3) Anonymity in Big Data Analytics
(4) Anonymous Management in Trust Relationships
(5) Anonymous Video Analytics Technology
(6) Anonymity Metrics, Measures and Evaluations
(7) Anonymity Models, Hardware/Device of Anonymity
3.2 Communication
(1) Anonymity in Wireless Communication Systems
(2) Anonymous Communication Protocols
(3) Anonymity in Mobile, Ad Hoc, and Wireless Sensor Networks
(4) Anonymous Proxy Software
(5) Anonymous Communication and Internet
(6) Anonymous Social Networks, Structural k-Anonymity in Social
Networks
(7) Authentication Protocol Providing User Anonymity
3.3 Storage
(1) Distributed Anonymous Information Storage and Management
(2) Private and Anonymous Data Storage
(3) Anonymity-Preserving Data Collection and Database
(4) Anonymity, Pseudonymity & Identity Management
(5) Anonymity in Big Data and Cloud Scenarios
(6) Anonymity in Health and Medical Databases
Submission Guidelines
Submitted papers must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or a conference
with proceedings. Papers must be clearly presented in English, must not
exceed 14 pages in * Springer LNCS format *
<http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0> (or up to 18
pages with the pages over length charge), including tables, figures,
references and appendices. Papers will be selected based on their
originality, significance, relevance, and clarity of presentation assessed
by at least two reviewers. Submission of a paper should be regarded as a
commitment that, should the paper be accepted, at least one of the authors
will register and attend the conference to present the work. All accepted
papers will be published by Springer LNCS (EI Indexed). Two outstanding
papers will be selected to receive the Best Paper Awards.
Submit your paper(s) in PDF file at the submission site:
http://www.swinflow.org/confs/2018/spaccs/submission.htm.
Publications
Accepted and presented papers will be included into the symposium
proceedings. Distinguished papers will be selected for special issues in
Information Sciences, Future Generation Computer Systems, Journal of
Parallel and Distributed Computing, Concurrency and Computation: Practice
and Experience.
Honorary Chairs
Robert Deng, Singapore Management University, Singapore
Colin Fidge, Queensland University of Technology, Australia
General Chairs
Willy Susilo, University of Wollongong, Australia
Kui Ren, State University of New York at Buffalo, USA
Program Chairs
Hua Wang, Victoria University, Australia
Ron Steinfeld, Monash University, Australia
Tianqing Zhu, Deakin University, Australia
Program Vice Chairs
Shui Yu, Deakin University, Australia
Zeeshan Pervez, University of the West of Scotland, UK
Christian Esposito, University of Salerno, Italy
Workshop Chairs
Arne Wilston, OC Tech, Australia
Xuyun Zhang, The University of Auckland, New Zealand
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Forwarded Message --------
Subject: [WI] ISWC 2018 - Conference Registration is Open
Date: Sat, 16 Jun 2018 17:24:31 +0200
From: Maribel Acosta <iswc2018(a)gmail.com>
Reply-To: Maribel Acosta <iswc2018(a)gmail.com>
To: wi(a)lists.kit.edu
17th International Semantic Web Conference (ISWC 2018)
Conference Dates:
October 8-12, 2018
Location:
Asilomar Conference Grounds, Monterey, CA, USA
Registration:
The Registration for ISWC 2018 is open. Register with Early ISWC
registration prices by June 29 at
http://iswc2018.semanticweb.org/registration/
Accommodation:
Book accommodation at the Asilomar Conference Grounds with ISWC 2018
pricing through http://iswc2018.semanticweb.org/accommodation/. While
there are other lodging options within walking distance, they would not
provide a remotely similar experience or convenience compared to staying
within the Asilomar State Park and Conference Grounds. When staying at
Asilomar, guests are provided with breakfast and dinner, which is
especially convenient since there are very limited dining options in the
area around Asilomar.
Travel (summary):
The most convenient way to attend ISWC 2018 (short of flying directly to
Monterey) is to fly into San Francisco International airport (SFO) or
San Jose International airport (SJC), and then taking the Monterey
Airbus (https://www.montereyairbus.com), which picks up passengers at
either SFO or SJC, and can drop off passengers right at the Asilomar
Conference Grounds or other hotels in the Monterey area.
Invited Speakers:
- Jennifer Golbeck, University of Maryland
- Vanessa Evers, University of Twente
- Natasha Noy, Google
Organization:
General chair: Elena Simperl, University of Southampton
Local chair: Rafael Gonçalves, Stanford University
Full committee: http://iswc2018.semanticweb.org/organization/
Contact:
Website: http://iswc2018.semanticweb.org/
Local enquiries: rafael.goncalves(a)stanford.edu
<mailto:rafael.goncalves@stanford.edu>
--
Mailing-Liste: wi(a)lists.kit.edu
Administrator: wi-request(a)lists.kit.edu
Konfiguration: https://www.lists.kit.edu/wws/info/wi
-------- Forwarded Message --------
Subject: Call for Position Papers - KMIS 2018 (Seville / Spain)
Date: Tue, 12 Jun 2018 20:00:01 +0000
From: KMIS Secretariat <cfps(a)scitevents.net>
Reply-To: cfps(a)scitevents.net
To: G. Neumann <neumann(a)wu-wien.ac.at>
CALL FOR POSITION PAPERS
10th International Conference on Knowledge Management and Information
Sharing
New Submission Deadline: *June 20, 2018*
*http://www.kmis.ic3k.org/* < http://www.kmis.ic3k.org/ >
September 18 - 20, 2018
Seville - Spain
Due to many requests, the position papers submission deadline of this
conference has been extended.
*What is a position paper?*
A position paper presents an arguable opinion about an issue. The goal
of a position paper is to convince the audience that your opinion is
valid and worth listening to, without the need to present completed
research work and/or validated results.
Knowledge Management (KM) is a discipline concerned with the analysis
and technical support of practices used in an organization to identify,
create, represent, distribute and enable the adoption and leveraging of
good practices embedded in collaborative settings and, in particular, in
organizational processes. Effective knowledge management is an
increasingly important source of competitive advantage, and a key to the
success of contemporary organizations, bolstering the collective
expertise of its employees and partners. Information Sharing (IS) is a
term used for a long time in the information technology (IT) lexicon,
related to data exchange, communication protocols and technological
infrastructures. Although standardization is indeed an essential element
for sharing information, IS effectiveness requires going beyond the
syntactic nature of IT and delve into the human functions involved in
the semantic, pragmatic and social levels of organizational semiotics.
The two areas are intertwined as information sharing is the foundation
for knowledge management.
*In Cooperation with:*
Associazione Italiana per l'Intelligenza Artificiale
German Society for Computer Science - Special Interest Group on
Knowledge Management
The European Research Consortium for Informatics and Mathematics
With the presence of internationally distinguished keynote speakers:
Nicola Leone < http://www.ic3k.org/KeynoteSpeakers.aspx#1>, University
of Calabria, Italy
Xindong Wu < http://www.ic3k.org/KeynoteSpeakers.aspx#2>, Mininglamp
Software Systems, China and University of Louisiana at Lafayette, United
States
Proceedings will be submitted for indexation by:
DBLP, Thomson-Reuters Conference Proceedings Citation Index, EI, SCOPUS
and Semantic Scholar.
All papers presented at the conference venue will also be available at
the SCITEPRESS Digital Library <http://www.scitepress.org/>.
Kind regards,
Carla Mota
KMIS Secretariat
*Address:* Av. D. Manuel I, 27A 2Esq, 2910-595 Setubal, Portugal
*Tel:* +351 265 100 033
*Web:* http://www.kmis.ic3k.org/
*e-mail:* kmis.secretariat(a)insticc.org
<mailto:kmis.secretariat@insticc.org>
If you no longer wish to receive mail from us, you can unsubscribe
<http://tracking.scitevents.net/tracking/unsubscribe?msgid=ndmv2ufCTB6ck0Plc…>
SCITEVENTS, Av. D. Manuel I, 27A 2Esq, Setubal, Setubal, 2910-595, Portugal
-------- Forwarded Message --------
Subject: [AISWorld] HICCS 50 CFP - Security and Privacy Challenges in
Healthcare
Date: Tue, 12 Jun 2018 15:48:22 +0000
From: Au Vo <auvo(a)sfsu.edu>
To: aisworld(a)lists.aisnet.org <aisworld(a)lists.aisnet.org>
Dear Colleagues,
Please consider submitting a manuscript to the HICSS 2019 minitrack on
Security and Privacy Challenges in Healthcare. Manuscript submissions
close on June 15.<http://airmail.calendar/2018-06-15%2012:00:00%20PDT>
Following is a description of the minitrack:
Digitizing healthcare services can provide many new benefits and
opportunities. However, it can also introduce new research challenges in
terms of protecting the security and privacy security of patient data
and electronic health records. Furthermore, as security incidents and
breaches continue to impact healthcare providers and organizations,
patient information continues to be at risk and such organizations are
under pressure to enhance the credibility and reliability of the health
facilities that they provide.
The Security and Privacy Challenges in Healthcare mini-track encourages
research in emerging problems and opportunities for security and privacy
in healthcare. Further, it addresses new approaches and strategies to
improve the capabilities for protecting healthcare information. Research
may focus on specific areas related to themes and issues, tools and
techniques, Mobile Health (mHealth) security and privacy, securing
electronic health records, mitigating risks, incident response,
technical and legal issues related to the security and privacy of
patient healthcare data, including data obtained through the Internet of
Things (IoT) and cloud computing.
Topics covered by the mini-track include, but are not limited to:
* Security and privacy challenges associated with Electronic Health
Records (EHR)
* Privacy concerns for patients’ data
* Security and privacy risks associated with technologies such as cloud
computing and the Internet of Things (IoT) for healthcare
* Mobile Health (mHealth) security and privacy
* Mitigating risks in healthcare Information Technology
* Incident response
* Lessons learned from recent healthcare security breaches
* EHR vendor selection and management with a focus on security and privacy
* Legal issues and regulations
* Training programs
* Tools, techniques, and algorithms for protecting patients’ data
* Healthcare infrastructure protection
* Theoretical foundations of security and privacy for healthcare
If you have any questions or comments, do not hesitate to contact me.
Thank you and looking forward to seeing you in Hawaii!
Best Wishes,
Au Vo, PhD
Assistant Professor
Information Systems Department, SCI 350
College of Business
San Francisco State University
auvo(a)sfsu.edu<mailto:auvo@sfsu.edu>
http://cob.sfsu.edu/is
415-338-1038
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Forwarded Message --------
Subject: [AISWorld] CFP HICSS 52 Advances in Trust, Identity, and
Trusted Systems in Technology-Mediated Environments
Date: Thu, 14 Jun 2018 21:48:06 +0000
From: Jarvenpaa, Sirkka L <Sirkka.Jarvenpaa(a)mccombs.utexas.edu>
To: aisworld(a)lists.aisnet.org <aisworld(a)lists.aisnet.org>
Dear Friends, this exciting, timely and female powered minitrack is
waiting for your paper. The paper will be in trusted hands!!
Call for Papers: Hawaii International Conference on System Sciences-52 (
HICSS-52)
Minitrack: Advances in Trust, Identity, and Trusted Systems in
Technology-Mediated Environments
8-11 January, 2019
Grand Wailea Maui
http://hicss.hawaii.edu
Minitrack Chairs: Sirkka L. Jarvenpaa, Mareike Möhlmann, and Robin Teigland
This mini-track advances in trust and identity research in
technology-mediated environments. How do new advancements in both
hardware and software technologies change the way we trust and identify?
What forms will digital trust and trust in digital environments take?
What shapes identity and its consequences? What are the various risks
and vulnerabilities to trust and identity imposed by emerging
algorithmic capabilities, cloud-based platforms, complex platform
infrastructures, and highly distributed peer-to-peer systems, e.g.,
cryptocurrencies or other applications in the financial industry? What
are the implications for trust and identity as technologies take on
capabilities with both social and moral agency? How do driverless cars
change the way we relate to the automobiles, their manufacturers, and
other institutions? Some digital technologies may replace the trust we
now have in institutions, as trust shifts from humans and central
organizations to computers and anonymous decentralized organizations
that know no geographic boundaries. Digital technologies may create new
fluid identities. How does trust in humans differ from trust in
technology? Is it possible that human-like systems exacerbate rather
than compensate weaknesses common in trust assessments? How do trust and
identity relate?
We welcome papers that theoretically or empirically advance our
understanding of different forms of trust and identity in
technology-mediated environments, including in organizational,
inter-organizational, network, platform, collective, and interpersonal
contexts. Papers can use any acceptable methodology and theory. We
welcome papers at any level of analysis and encourage papers that take a
cross-level and/or inter-disciplinary perspective. Some possible topic
areas include but are not limited to the following:
· Understanding issues of digital trust, identity, and risk in the
context of sharing economy and other platform-based organizations, e.g.,
in the digital platform, among the users of the platform, in the
organization behind the platform, in financial and other transactions
conducted through the platform.
· Understanding the relationship between an organization's handling of
its users' data, e.g., privacy/integrity/security, use of the cloud, and
trust and identities in the organization.
· Understanding the relationship between trust in an organization and
trust in the organization's technology-based offerings and understanding
the difference between trust in humans and trust in technology.
· How do changes in trust influence identity and identification
processes? And vice versa?
· Understanding how regulation and policy at the national and
international levels influence issues of digital trust and the
penetration of technology, e.g., in the financial industry and the
sharing economy, and vice versa.
· How to leverage trust levels by implementing new forms of digital
trust tools online?
· Understanding trust and or identity relationships between users and
emerging technologies, e.g., personal robots, smart toys, wearables,
personal voice assistants, 3D printing, autonomous vehicles, drones.
· Understanding the role of trust in the development of algorithms,
e.g., functions, openness of coding, data collection.
· Investigating new digital trust cues that can signal and form trust
· Understanding the relationship between trust and business models in
startups and emerging industries as well as in the commercialization of
new technologies by established firms.
· Understanding the relationship between trust and the development and
dynamics of self-regulated, decentralized, peer-to-peer networks.
· How does trust change in blockchain technology and cryptography contexts?
· How does trust evolve in complex and multi-layered environments such
as digital platforms?
· Understanding the relationship between national culture and
institutions and trust in technology and digital environments that know
no geographic boundaries.
· Understanding the relationship between trust, identity, control, and
influence in digital environments.
IMPORTANT DATES FOR CALL FOR PAPERS
June 15, 2019 Paper Submission DEADLINE
August 15, 2019 Acceptance Notifications
September 15, 2019 Submission camera-ready paper
October 1, 2019 Early Registration fee deadline
More info: http://hicss.hawaii.edu
HICSS Author Guidelines:
http://hicss.hawaii.edu/tracks-and-minitracks/authors/
Minitrack Co-Chairs:
Sirkka L. Jarvenpaa (Primary Contact), McCombs School of Business, The
University of Texas at Austin,
Sirkka.Jarvenpaa(a)mccombs.utexas.edu<mailto:Sirkka.Jarvenpaa@mccombs.utexas.edu>
Mareike Möhlmann, Warwick Business School, University of Warwick,
Mareike.Moehlmann(a)wbs.ac.uk<mailto:Mareike.Moehlmann@wbs.ac.uk>
Robin Teigland, Center for Strategy and Competitiveness, Stockholm
School of Economics,
Robin.Teigland(a)hhs.se<mailto:Robin.Teigland@hhs.se>
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Forwarded Message --------
Subject: [AISWorld] CFP: ACM TOIT Theme Section on Trust and AI
Date: Thu, 14 Jun 2018 13:39:35 +0800
From: Jie Zhang <zhangj.ntu(a)gmail.com>
To: aisworld(a)lists.aisnet.org
Theme Section on Trust and AI
ACM Transactions on Internet Technology (TOIT)
https://toit.acm.org/pdf/ACM-ToIT-CfP-Trust.pdf
Trust is critical in building effective AI systems. It
characterizes the elements that are essential in social
reliability, whether this be in human-agent interaction, or
how autonomous agents make decisions about the selection
of partners and coordinate with them. Many computational
and theoretical trust models and approaches to reputation
have been developed using AI techniques over the past
twenty years. However, some principal issues are yet to
be addressed, including bootstrapping; causes and
consequences of trust; trust propagation in heterogeneous
systems where agents may use different assessment
procedures; group trust modelling and assessment;
trust enforcement; trust and risk analysis, etc.
Increasingly, there is also a need to understand how
human users trust AI systems that have been designed to
act on their behalf. This trust can be engendered through
effective transparency and lack of bias, as well as
through successful attention to user needs.
The aim of this special section is to bring together world-
leading research on issues related to trust and artificial
intelligence. We invite the submission of novel research
in multiagent trust modelling, assessment and enforcement,
as well as in how to engender trust in and transparency
of AI systems from a human perspective.
The scope of the theme includes:
Trust in Multi-Agent Systems:
- socio-technical systems and organizations;
- service-oriented architectures;
- social networks;
- adversarial environments
Trustworthy AI Systems:
- detecting and addressing bias and improving fairness;
- trusting automation for competence;
- understanding and modelling user requirements;
- improving transparency and explainability;
- accountability and norms
AI for combating misinformation:
- detecting and preventing deception and fraud;
- intrusion resilience in trusted computing;
- online fact checking and critical thinking;
- detecting and preventing collusion
Modelling and Reasoning:
- game-theoretic models of trust;
- socio-cognitive models of trust;
- logical representations of trust;
- norms and accountability;
- reputation mechanisms;
- risk-aware decision making
Real-world Applications:
- e-commerce;
- security;
- IoT;
- health;
- advertising;
- government
Theme Editors
Jie Zhang
Nanyang Technological University
zhangj(a)ntu.edu.sg
http://www.ntu.edu.sg/home/zhangj/
Jamal Bentahar
Concordia University
bentahar(a)ciise.concordia.ca
https://users.encs.concordia.ca/~bentahar/
Rino Falcone
ISTC-CNR
rino.falcone(a)istc.cnr.it
http://www.istc.cnr.it/people/rino-falcone
Timothy J. Norman
University of Southampton
t.j.norman(a)soton.ac.uk
https://www.ecs.soton.ac.uk/people/tjn1f15
Murat Sensoy
Ozyegin University
murat.sensoy(a)ozyegin.edu.tr
https://faculty.ozyegin.edu.tr/muratsensoy/
Deadlines
Submissions: November 1, 2018
Preliminary decisions: January 15, 2019
Revisions: April 1, 2019
Final decisions: May 15, 2019
Final versions: June 15, 2019
Publication date: Fall 2019
Submission
To submit a paper, please follow the standard instructions:
http://toit.acm.org/submission.html
Please select "Theme Section: Trust and AI" in the Manuscript Central
website
Contact Email Address: trustai.toit(a)gmail.com
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Forwarded Message --------
Subject: [WI] [C&TC2018] Abstract Submission Deadline Approaching (July
3rd, 2018)
Date: Thu, 14 Jun 2018 11:40:10 +0200
From: Fulvio Frati <fulvio.frati(a)unimi.it>
Reply-To: Fulvio Frati <fulvio.frati(a)unimi.it>
To: wi(a)lists.uni-karlsruhe.de
***Best C&TC2018 papers will be invited in a special issue of the Future
Generation Computer Systems journal (confirmed).***
[Apologies if you receive multiple copies of this message]
==========================================================================
CALL FOR PAPERS
8th International Symposium on Secure Virtual Infrastructures --
Cloud and Trusted Computing (C&TC 2018)
October 22-26, 2018 -- Valletta, Malta
http://www.otmconferences.org
==========================================================================
===========
Description
===========
Current and future service-based software needs to remain focused
towards the development and deployment of large and complex intelligent
and networked information systems, required for internet-based and
intranet-based systems in organizations, as well to move to IoT
integration and big data analytics. Today, service-based software covers
a very wide range of application domains as well as technologies and
research issues. This has found realization through Cloud Computing, Big
Data, and IoT. Vital element in such networked, virtualized, and
sensor-based information systems are the notions of trust, security,
privacy and risk management.
Cloud and Trusted Computing (C&TC 2018) is the 8th International
Symposium on Cloud Computing, Trusted Computing and Secure Virtual
Infrastructures, organized as a component conference of the OnTheMove
Federated Conferences & Workshops. C&TC 2018 will be held in Valletta,
Malta.
The conference solicits submissions from both academia and industry
presenting novel research in the context of Cloud Computing, Big Data,
and IoT, presenting theoretical and practical approaches to cloud, big
data, and IoT trust, security, privacy and risk management. The
conference will provide a special focus on the intersection between
cloud paradigm, big data analytics, and IoT integration, bringing
together experts from the three communities to discuss on the vital
issues of trust, security, privacy and risk management in Cloud
Computing, shedding the light on novel issues and requirements in big
data and IoT domains. Potential contributions could cover new
approaches, methodologies, protocols, tools, or verification and
validation techniques. We also welcome review papers that analyze
critically the current status of trust, security, privacy and risk
management in the cloud, big data, and IoT. Papers from practitioners
who encounter trust, security, privacy, and risk management problems,
and seek understanding are finally welcome.
===========
Topics
===========
Topics of interest are classified in four main themes and include, but
are not limited to:
TRUST, SECURITY, PRIVACY AND RISK MANAGEMENT
- Assurance Techniques
- Access Control, Authorization, and Authentication
- Big data security and privacy
- Blockchain
- Cloud Computing with Autonomic and Trusted Environment
- Cooperative systems
- Cryptographic Algorithms and Protocols
- Cyber Attack, Crime and Cyber War
- DRM, Watermarking Technology, IP Protection
- Emergency and Security Systems
- End-to-end security over complex cloud supply chain
- Forensics
- Human Interaction with Trusted and Autonomic Computing Systems
- Identity and Trust Management
- IoT security and privacy
- Multimedia Security Issues over Mobile and Wireless Clouds
- Network Security
- Networks of Trust, Clouds of Trust
- Privacy, Anonymity
- Privilege Management Infrastructure
- Reliable Computing and Trusted Computing
- Risk evaluation and Management
- Security, Dependability and Autonomic Issues in Ubiquitous Computing
- Security Models and Quantifications
- Self-protection and Intrusion-detection in Security
- Trust Evaluation and Prediction in Service-Oriented Environments
- Trust, Security, Privacy and Confidentiality
- Trust in big data analytics
- Trust in IoT environments
- Trusted Computing in virtualized environments
- Trusted Execution Environments
- Trusted P2P, Web Service, SoA, SaaS, EaaS, PaaS, XaaS
- Virus Detections and Anti-virus Techniques/Software
DATA MANAGEMENT
- Algorithms and Computations on Encrypted Data
- Big Data, Frameworks and Systems for Parallel and Distributed Computing
- Big Data Processing and Analytics
- Big Data Preparation
- Big Data Representation
- Big Data Visualization- Database as a Service, Multi-tenancy, Data
management and analytics as a service
- Data Provenance
- Data Integrity
- Data Science and Scalable Machine Learning
- Elasticity and Scalability for Cloud Data Management Systems
- Encryption Systems for IoT Data
- High Availability and Reliability
- Interoperability between Clouds- New Protocols, Interfaces and Data
Models for Cloud Databases
- Resource and Workload Management in Cloud Databases
- Sensor-Based Data Collection, Management, and Security
- Service Level Agreements and Contracts
- Transactional Models for Cloud Databases, Consistency and Replication
- Threats and countermeasures
- Virtualization and Cloud databases, Storage Structures and Indexing
INFRASTRUCTURES AND ARCHITECTURES
- Autonomic Computing Theory, Models, Architectures and Communications
- Big Data Infrastructures
- Cloud Resource provisioning with QoS Guarantees
- Cloud Operation and Resource Management
- Cloud Performance Modeling and Benchmarks
- Datacenter Architecture and Management
- Formal methods and Tools for Cloud computing
- Infrastructures for Social Computing and Networking
- IoT Infrastructures
- NoSQL Databases
- Software Architectures and Design for Trusted Emerging Systems
- Virtualized Computing Infrastructures
APPLICATIONS
- Big Data Applications and Case Studies
- Cloud Business Applications and Case Studies
- Clouds and Social Media, Network and Link Analysis
- Data Intensive Applications
- IoT Applications and Case Studies
- Large Scale Cloud Applications, Reality Mining
- Mobile Cloud Services
- New Parallel / Concurrent Programming Models for Cloud Computing
- Pervasive / Ubiquitous Computing in the Cloud
- Reliability, Fault Tolerance, Quality-of-Service
- Service Level Agreements and Performance Measurement
- Service-Oriented Architectures, RESTful Services in Cloud Environments
===============
Important Dates
===============
- Conference Abstract Submission Deadline: July 3, 2018
- Conference Paper Submission Deadline: July 10, 2018
- Acceptance Notification: Aug 20, 2018
- Camera Ready Due: Aug 30, 2018
- Author Registration Due: Aug 30, 2018
================
Paper Submission
================
FULL PAPERS
Regular paper submissions to Cloud and Trusted Computing 2018 (C&TC
2018) must present original, highly innovative, prospective and
forward-looking research in one or more of the themes given above. Full
papers must break new ground, present new insight, deliver a significant
research contribution and provide validated support for its results and
conclusions. Successful submissions typically represent a major advance
for the fields of cloud computing, big data, and IoT referencing and
relating the contribution to existing research work, giving a
comprehensive, detailed and understandable explanation of a system,
study, theory or methodology, and support the findings with a compelling
evaluation and/or validation. Each paper must be submitted as a single
PDF file in Springer Lecture Notes in Computer Science format (no longer
than 18 pages in length). Accepted regular papers will be included in
the conference main proceedings and presented in the paper sessions.
Submissions to C&TC 2018 must not be under review by any other
conference or publication at any time during the C&TC review cycle, and
must not be previously published or accepted for publication elsewhere.
NOTES (SHORT PAPERS)
Short papers (not longer than 6 pages in length) must report new results
and provide support for the results, as a novel and valuable
contribution to the field – just like full papers. Short papers are
intended for succinct work that is nonetheless in a mature state ready
for inclusion in archival proceedings. Short papers will be held to the
same standard of scientific quality as full papers, albeit for a shorter
presentation, and must still state how they fit with respect to related
work, and provide a compelling explanation and validation. Short papers
must be submitted as single PDF file in Springer Lecture Notes in
Computer Science format. Accepted short papers will be published in the
conference main proceedings and will be presented in the paper sessions
of the conference.
*Best papers will be invited in the special issue on "Trusted
Cloud-Edges (CE) Computations" in the Future Generation Computer Systems
journal.*
Paper submission site: http://submissions.onthemove-conferences.org/2018/ctc
PAPER FORMATTING AND PRESENTING
The paper and notes submission site giving all the relevant submission
details is located at:
http://www.otmconferences.org/index.php/paper-submission/authors-kit.
Failure to comply with the formatting instructions for submitted papers
or notes will lead to the outright rejection of the paper without
review. Failure to commit to presentation at the conference
automatically excludes a paper from the proceedings.
===============
Program Chairs
===============
- Claudio Agostino Ardagna, Universita' degli Studi di Milano, Italy
- Adrian Belmonte, ENISA, Greece
- Mauro Conti, University of Padua, Italy
=================
Program Committee
=================
- Alberto Compagno, CISCO Systems, France
- Chia-Mu Yu, National Chung Hsing University, Taiwan
- Christos XENAKIS, University of Piraeus, Greece
- Claus Pahl, Free University of Bozen, Italy
- Daniele Sgandurra, Royal Holloway, University of London
- David Chadwick, University of Kent, UK
- Ernesto Damiani, Universita' degli Studi di Milano, Italy
- Eugenia Nikolouzou, ENISA, Greece
- Francesco Di Cerbo, SAP Labs, France
- George Karabatis, University of Maryland, USA
- Julian Schutte, Fraunhofer, Germany
- Luca Vigano', King's College London, UK
- Marco Anisetti, Universita' degli Studi di Milano, Italy
- Marit Hansen, Unabhängiges Landeszentrum für Datenschutz
Schleswig-Holstein, Kiel, Germany
- Meiko Jensen, Unabhängiges Landeszentrum für Datenschutz
Schleswig-Holstein, Kiel, Germany
- Michele Bezzi, SAP, France
- Miguel Vargas Martin, University of Ontario, Canada
- Nabil El Ioini, Free University of Bozen, Italy
- Patrick Hung, University of Ontario, Canada
- Rasool Asal, British Telecommunications, UK
- Scharam Dustdar, Technical University of Vienna, Austria
- Stefan Schulte, Technical University of Vienna, Austria
- Stefanos Gritzalis, University of the Aegean, Greece
- Gwanggil Jeon, Incheon National University, South Korea
- Jörg Schwenk, Ruhr-Universität Bochum, Germany
- Pierluigi Gallo, Università di Palermo
- Luis Vega, Technical University of Lisbon
===============
Publicity Chair
===============
- Nabil El Ioini, Free University of Bolzano/Bozen, Italy
More information available at http://otmconferences.org
--
Mailing-Liste: wi(a)lists.kit.edu
Administrator: wi-request(a)lists.kit.edu
Konfiguration: https://www.lists.kit.edu/wws/info/wi
-------- Forwarded Message --------
Subject: [AISWorld] CFP - Data, Text and Web Mining for Business
Analytics Minitrack at HICSS-52
Date: Thu, 14 Jun 2018 19:00:18 +0000
From: Delen, Dursun <dursun.delen(a)okstate.edu>
To: aisworld(a)lists.aisnet.org <aisworld(a)lists.aisnet.org>
As the co-chairs for the Data, Text and Web Mining for Business
Analytics minitrack at the 52nd Hawaii International Conference on
System Sciences (HICSS-52), which will be held at the Grand Wailea,
Maui, Hawaii on January 8-11, 2019, we would like to personally invite
you to submit a paper and/or serve as a reviewer.
A representative list of general topic areas covered in this minitrack
(which is not meant to be complete or comprehensive) includes:
· New methods and algorithms of data/text mining and advanced analytics
· The process and new methodologies of conducting data/text mining
· Novel applications in sentiment analysis, social analytics, media
analytics and data stream miming
· Ethical and privacy issues in data/text mining
· Novel applications of data mining for better decision making
· Data pre-processing related aspect of data/text mining, such as data
characterization, data cleaning, data integration, data sampling, data
reduction, data visualization, etc.
· Design issues, challenges and opportunities in agile analytics
· Emerging technologies and techniques, investment and governance
mechanisms, coproduction methodologies
· Evolutions to scoring and data mining algorithms for advanced analytics
· In-database vs. in-memory advanced analytics capabilities
· Visualization for supporting advanced analytics
· People and culture issues in managing advanced analytics
· Critical success factors for advanced analytics.
If you are interested in submitting a manuscript for review please note
the following important dates (taken from the HICSS Website -
http://hicss.hawaii.edu<http://hicss.hawaii.edu/>):
June 15 Submit full manuscripts for review. The review is double-blind;
therefore this submission must not include author names.
August 17 Acceptance notices are emailed to authors by the review system.
September 22 Submit Final Paper for Publication. At least one author of
each paper should register by this date in order secure publication in
the Proceedings.
October 1 Deadline for at least one author of each paper to register for
the conference.
If you are willing to be a reviewer please notify me as soon as you can,
and indicate the number of manuscripts (1, 2, 3, or more) that you would
be willing to review. Also, if you have any questions please feel free
to contact me.
Sincerely,
Dursun Delen
Oklahoma State University
dursun.delen(a)okstate.edu<mailto:dursun.delen@okstate.edu>
Hamed Majidi Zolbanin
Ball State University
hmzolbanin(a)bsu.edu<mailto:hmzolbanin@bsu.edu>
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org