-------- Original-Nachricht -------- Betreff: [isworld] Second CFP: The Third International Workshop on RFID Technology - Concepts, Applications, Challenges Datum: Tue, 27 Jan 2009 04:33:14 -0500 Von: Yanbo WU yanbo.wu@adelaide.edu.au Antwort an: Yanbo WU yanbo.wu@adelaide.edu.au An: AISWORLD Information Systems World Network isworld@lyris.isworld.org
The Third International Workshop on RFID Technology - Concepts, Applications, Challenges (IWRT'09) 6-7 May 2009, Milan, Italy
http://www.iceis.org/Workshops/iwrt/iwrt2009-cfp.htm
In conjunction with the 11th International Conference on Enterprise Information Systems (ICEIS'09)
Workshop Background and Goals -----------------------------
Radio Frequency Identification (RFID) systems are emerging as one of the most pervasive computing technologies due to their low cost and their broad applicability. RFID systems consist of tiny integrated circuits equipped with antennas (RFID tags) that communicate with their reading devices (RFID readers) using radio-frequency waves without line of sight. This creates tremendous opportunities for linking various objects from real world. These objects are numbered, identified, cataloged, and tracked. RFID systems present many advantages and features that cannot be found in other ubiquitous computing environments. RFID communication is fast, convenient and its application can substantially save time, improve services, reduce labor cost, thwart product counterfeiting and theft, increase productivity gains and maintain quality standards. Common applications range from highway toll collection, supply chain management, public transportation,controlling building access, animal trac! king, developing smart home appliances and remote keyless entry for automobiles to locating children. In addition, RFID technology also offers a viable approach to implement physical user interfaces. The services available in the local environment are advertised by RFID tags. Users browse the services and activate the desired service by simply touching the corresponding tag with a mobile terminal that is equipped with an RFID reader. In the near future, these user interfaces would introduce RFID tags into our everyday lives.
While RFID provides promising benefits such as inventory visibility and business process automation, some significant challenges need to be overcome before these benefits can be realized. One important issue is how to process and manage RFID data, which is typically in large volume, noisy and unreliable, time-dependent, dynamically changing, and of varying ownership. Another issue is how to seamlessly integrate low-level RFID data into (existing) enterprise information infrastructures (e.g., upper-level business processes). Finally, RFID systems present a number of inherent vulnerabilities with serious potential security implications. Indeed, given the ability of inexpensively tagging and thus monitoring a large number of items and/or people, RFID raises some serious security and privacy concerns. RFID systems are vulnerable to a broad range of malicious attacks ranging from passive eavesdropping to active interference. RFID privacy and security are stimulating research are! as that involve rich interplay among many disciplines, such as signal processing, hardware design, supply-chain logistics, privacy rights, and cryptography.
The workshop's objective is to provide a forum for researchers, practitioners, and users to exchange new ideas, developments, and experience on issues related to this emerging field.
Topics of Interest ---------------------- We welcome papers that focus on novel RFID technologies and applications. Topics of interests include, but are not limited to:
Data management issues in RFID applications Innovative RFID-enabled applications RFID and physical user interfaces Security/privacy and RFID RFID and sensor networks Web services and RFID RFID and semantic Web RFID standards RFID case studies and field trials RFID middleware Next generation RFID technologies Commercial experience with RFID RFID network management COTS and Open Source RFID infrastructure Integration of RFID with other applications Performance evaluation Business process redesign and RFID Intrusion Detection in RFID systems Behavior analysis Situation awareness
Submission and Review of Papers -------------------------------- All papers must be written in English. Papers should be prepared in postscript, PDF, or Word and should be submitted through ICEIS web-based paper submission system.
All the submitted papers will be reviewed by at least 3 reviewers. We will also implement a rebuttal phase during the paper selection process. Authors will be invited to supply a response to the reviewers' comments. The paper selection will be based on both reviewers' comments and authors' responses.
Format of the Workshop ------------------------ The workshop will consist of oral presentations. The proceedings of the workshop will be published in the form of a book by INSTICC Press and indexed in DBLP.
Journal Publication -------------------- Best papers of the workshop will be considered for further publication in a forthcoming Special issue of a well-known international journal planned shortly after the workshop.
Workshop Co-Chairs ------------------------- Dr. Michael Sheng School of Computer Science The University of Adelaide Adelaide, SA 5005, Australia qsheng@cs.adelaide.edu.au
Dr. Zakaria Maamar College of Information Technology Zayed University Po Box 19282, Dubai,U.A.E zakaria.maamar@zu.ac.ae
Dr. Sherali Zeadally Department of Computer Science and Information Technology University of the District of Columbia, USA szeadally@udc.edu
Dr. Katerina Mitrokotsa Faculty of Electrical Engineering, Mathematics and Computer Science Technical University of Delft, The Netherlands A.Mitrokotsa@TUDelft.nl
Workshop Publicity Chair Yanbo Wu, The University of Adelaide, Australia
Workshop Program Committee --------------------------- Thierry Bodhuin, University of Sannio, Italy Leonid Bolotnyy, University of Virginia, USA Mike Burmester, Florida State University, USA Mark Cameron, CSIRO ICT Center, Australia Hesham El-Sayed, United Arab Emirates University, UAE Rajit Gadh, UCLA, USA Sozo Inoue, Kyushu University, Japan Behnam Jamali, Auto-ID Lab, The University of Adelaide, Australia Roger Jiao, Georgia Institute of Technology, USA Mohamed Latrach, ESEO, France Xue Li, The University of Queensland, Australia Weifa Liang, The Australian National University, Australia Tao Lin, SAP Research, USA Zongwei Luo, University of Hong Kong, China Tom Karygiannis, National Institute of Standards and Technology (NIST) John Mo, RMIT University, Australia Jukka Riekki, University of Oulu, Finland Nicolas Sklavos, University of Patras, Greece Fusheng Wang, Siemens Corporate Research, USA Eiko Yoneki, University of Cambridge, UK Holger Ziekow, Humboldt-Universitaet zu Berlin, Germany
Important Dates ----------------- Paper Submission: February 6, 2009 Author Notification: March 6, 2009 Camera-Ready and Registration: March 17, 2009
Workshop Venue --------------------- The workshop will be held in conjunction of the 11th International Conference on Enterprise Information Systems (ICEIS 2009) in Milan, Italy.
Registration Information ------------------------- At least one author of an accepted paper must register for the workshop. The registration information can be found from http://www.iceis.org.
Secretariat ------------------------- ICEIS 2009 Secretariat - The Third International Workshop on RFID Technology (IWRT 2009) E-mail: workshops@iceis.org Web site: http://www.iceis.org
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann@wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.