Call For Papers: EACL 2012 Workshop on Semantic Analysis in Social Networks (SASN 2012)

CALL FOR PAPERS

EACL 2012 Workshop on Semantic Analysis in Social Networks
April 23, 2012, Avignon, France

Website:
http://www.eecs.uottawa.ca/~diana/eacl2012_social_media_workshop.html

Submission Deadline: Jan 30, 2012

Semantic analysis in social networks (SN) is important for applications such as understanding and enabling social networks, natural language interfaces and human behaviour on the web, e-learning environments, cyber communities and educational or online shared workspaces. These aspects are also important in security, privacy& identity, opinion mining, sentiment analysis, and in the larger area of affective computing. This workshop will provide a forum for discussion between leading names and researchers involved in text analysis and social networks in the context of natural language understanding, natural language generation, automatic categorization, topic detection, emotion analysis, and applications using computational approaches to process social networks. Besides methodologies and techniques for SN analysis, we also encourage the submission of papers that experiment with and describe applicative contexts in which analysis and detection of affective aspects are useful and beneficial.

Topics of interest include, but are not limited to:

– semantic analysis in sentences and web content from social networks
– classification of texts by emotion and mood from SN
– sociology of emotions and influence on inter-personal communications
– topic detection and clustering in SN
– SN analysis across different languages
– SN analysis from multimedia (text, speech, video)
– security and privacy issues in SNs
– automatic summarization from multiple sources and multiple languages
– analysis of sentiment and opinion in SN
– information extraction and indexing
– applications in which affective aspects are beneficial
– tools and resources for accessing, representing, and managing social
network data in natural language processing frameworks (e.g., GATE, UIMA)
– other aspects of the computational treatment of SN and affect.

We would like to invite researchers to submit their original and unpublished work to the workshop. Demos of working or under development systems are encouraged. We hope to cover three main perspectives: government (e.g., security and criminology), industry (e.g., marketing), and academic (e.g., theoretical research related to SNs).

We are in negotiations with a journal for a special issue, for selected papers from the workshop. An invited speaker for the workshop will be chosen at a later date.

IMPORTANT DATES

Deadline for submission: January 30, 2012
Notification of acceptance: February 24, 2012
Revised version of papers: March 9, 2012
Workshop: April 23, 2012

Submission instructions:

Authors are invited to submit full papers on original, unpublished work in the topic area of this workshop. Submissions should be formatted using the EACL 2012 stylefiles for latex or MS Word, with blind review and not exceeding 8 pages plus an extra page for references. The PDF files will be submitted electronically at
https://www.softconf.com/eacl2012/SASN2012/

Organizing committee:

Atefeh Farzindar (NLP Technologies Inc. and Université de Montréal Canada)
Diana Inkpen (University of Ottawa, Canada)

Programme Committee:

Colin Cherry (National Research Council, Canada)
Viola Ganter (HITS gGmbH, Heidelberg, Germany)
Mitsuru Ishizuka (University of Tokyo, Japan)
Fazel Keshtkar (University of Memphis)
Wael Khreich (NLP Technologies Inc, Canada)
Guy Lapalme (Université de Montréal, Canada)
Eduarda Mendes Rodrigues (University of Porto, Portugal)
Alena Neviarouskaya (University of Tokyo, Japan)
Alexander Osherenko (University of Augsburg, Germany)
Victoria Rubin (University of Western Ontario, Canada)
Carlo Strapparava (FBK-IRST, Povo-Trento, Italy)
Mike Thelwall (University of Wolverhampton, UK)
Alessandro Valitutti (University of Helsinki, Finland)
Simone Teufel (Cambridge University, UK)
Clifford J. Wenstein (MIT, USA)
René Witte (Concordia University, Canada)

Posted in Conferences | Tagged , , , , , , , , | Comments Off on Call For Papers: EACL 2012 Workshop on Semantic Analysis in Social Networks (SASN 2012)

Call For Papers: Social Computing Behavioral-Cultural Modeling and Prediction Challenge (SBP 2012)

SBP 2012 Modeling Challenge
International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction (SBP 2012)
University of Maryland, CollegePark, MD.
April 3-5, 2012
http://www.umiacs.umd.edu/conferences/sbp2012/challenge.html

About SBP
The SBP conference is the result of merging two successful international conferences on closely related subjects: the International Conference on Social Computing, Behavioral Modeling, and Prediction (SBP) and the International Conference on Computational Cultural Dynamics (ICCCD.) The combined conference retains the acronym SBP, with “Behavioral” replaced by “Behavioral-Cultural”. Social computing harnesses the power of computational methods to study social behavior within a social context. Behavioral-Cultural modeling refers to representing behavior and culture in the abstract, and is a convenient and powerful way to conduct virtual experiments and scenario planning. Both social computing and behavioral-cultural modeling are techniques designed to achieve a better understanding of complex behaviors, patterns, and associated outcomes of interest. Moreover, these approaches are inherently interdisciplinary; subsystems and system components exist at multiple levels of analysis and cross disparate disciplines. Sponsors for SBP include:
– Air Force Office of Scientific Research (AFOSR),
– Army Research Organization (ARO),
– National Institutes of Health (NIH),
– National Science Foundation (NSF), and
– Office of Naval Research (ONR).
More details on the SBP conferences can be found at: http://sbp.asu.edu/

Modeling Challenge
SBP will host a modeling challenge, SBP 2012 Challenge, this year along with the regular conference. The SBP 2012 Challenge aims to add a new dimension to the conference to demonstrate the real-world and interdisciplinary impact of social computing. The challenge is geared to engage the social computing research community in solving relevant, interesting, and challenging research problem contributing towards theoretical, methodological, and applicational advancement of the area. The challenge problem will highlight the multidisciplinary aspect of the social computing area. The challenge problem is designed to be ‘broad’ so that it can be appreciated equally by researchers from different backgrounds.

Challenge Problem
Social media has inarguably played a critical role in facilitating information dissemination in numerous real-world events including citizen protests driven by economic (e.g., the Occupy Wall Street, Greek’s the Indignant Citizens Movement) or socio-political crisis (e.g., Egyptian revolution, the Arab Spring), disaster recovery and response (Haiti earthquake), political campaigns, and many others. Prior to such events, the social network is virtually non-existent and emerges dynamically at an overwhelming pace afterwards. A similar phenomenon could be observed during the outbreak of an epidemic, especially in highly mobilized environments. Identifying the nodes that spread the information (epidemic) fastest, early on before the network stabilizes, could have a significant impact in decision making. Companies could also find this problem significant during early product promotions.

Considering the significance of the above-mentioned problem, the theme of the SBP 2012 challenge is to model diffusion in rapidly evolving networks. There is no specific dataset meaning the challenge problem is open for different interpretations. One could propose simulation models or mine real-world social media data in the context of ‘diffusion in rapidly evolving networks’ and share their analyses and findings.

Submissions will be evaluated based on theoretical grounding as well as experimental evidence. ‘Closeness’ to real-world scenarios would certainly be preferred during evaluations. Winners will be selected by an interdisciplinary committee of researchers and will be recognized at the conference with 1st, 2nd, and 3rd prizes. The winners will introduce the idea briefly at the conference to the audience and/or give a quick demo. The winners will be given one entire tutorial session (3 hours) to present their work (possibly demo) followed by a panel discussion to answer audience queries. Winners will be recognized with awards during the conference reception.

Submission Details
The submissions (6 pages) should be formatted according to the Springer-Verlag LNCS/LNAI guidelines. Sample LaTeX2e and Word files are available from http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0. Submissions should be made at: http://www.easychair.org/conferences/?conf=sbp2012challenge.

Important Dates
Submission Deadline: January 16, 2012 (23:59 PST)
Notification of Winners: March 2, 2012

Interested participants are requested to join the mailing list SBP-2012-Challenge@googlegroups.com to follow the related discussion. Details and updates regarding the challenge will be posted on the group.

Please contact Nitin Agarwal at nxagarwal@ualr.edu for more details.

Posted in Conferences | Tagged , , , , , , , , | Comments Off on Call For Papers: Social Computing Behavioral-Cultural Modeling and Prediction Challenge (SBP 2012)

Call For Papers: The 3rd International Conference on Information Computing and Applications(ICICA2012)

The 3rd International Conference on Information Computing and Applications

(ICICA2012)

September 14-16, 2012

Mountain Resort, Chengde, China

http://icica.heuu.edu.cn

Organized by: Hebei Applied Statistics Society

Sponsored by: Springer, LNCS, CCIS, TTP, Nanyang Technological University, Hebei United University, Yanshan University, Northeastern University at Qinhuangdao, Chengde Petroleum College

The 2012 International Conference on Information Computing and Applications (ICICA 2012) will be held on September 14-16, 2012, in Mountain Resort, Chengde, China. This conference is organized by Hebei Applied Statistics Society, and sponsored by Springer, TTP, Nanyang Technological University, Hebei United University, Yanshan University, Northeastern University at Qinhuangdao and Chengde Petroleum College. This conference provides a forum for researchers and practitioners to exchange research results and share development experiences on information computing and applications.

The upcoming ICICA 2012 proceedings covers, but not limited to the following areas in information computing and applications:

Internet Computing
Pervasive Computing
Web Computing
Quantum and Molecular Computations
Cloud Computing
Scalable Computing
Grid computing
Multimedia Networking and Computing
Parallel Computing
Social Networking and Computing
Distributed Computing
Bio-inspired and DNA Computing
Cluster Computing
Scientific and Engineering Computing
Mobile Computing
Computational Economics and Finance
Intelligent Computing
Wearable Computing
Trusted Computing
Computational Genomics and Proteomics
Autonomy-Oriented Computing
Computational Statistics
Evolutionary Computing
Other Applications

Submission and Publication

Only original and unpublished paper will be considered. The accepted papers will be collected into the three volumes of the proceedings that will be published by Springer, including one volume in Lecture Notes in Computer Science (LNCS), and two volumes in Communications in Computer and Information Science (CCIS). LNCS and CCIS should be indexed by EI according the previous Springer proceedings index results.

All papers should be in PDF format, and submitted electronically through the conference website. The manuscripts should be written in English and follow the LNCS/CCIS format provided at http://www.springer.com/computer/lncs?SGWID= 0-164-7-72376-0 and http://www.springer.com/computer?SGWID=0-146-6-46661 2-0 on Springer website. Papers are limited to 6 to 8 pages for LNCS and CCIS.

All papers will be published by several special issues in well-known international journals (SCI, EI-JA) after revised. All papers revised will be recommended to these journals.

World Wide Web (SCI, EI)
Mobile Networks and Applications (SCI, EI)
Elsevier Future Generation Computer Systems (SCI, EI)
International Journal of High Performance Computing and Networking (EI)
International Journal of Computer Applications in Technology (EI)
Journal of Networks (EI)
Journal of Multimedia (EI)
International Journal of Web Engineering and Technology (EI)
Journal of Computers (EI)
Journal of Software (EI)
International Journal of Innovative Computing and Applications (EI)

Important Dates
Full paper due: January 5, 2012
Acceptance notification: January 15, 2012
Camera-ready submission: January 25, 2012
The submission system

https://www.easychair.org/conferences/?conf=3rdicica2012

Posted in Conferences | Tagged , , , , , , , , , , , , , | Comments Off on Call For Papers: The 3rd International Conference on Information Computing and Applications(ICICA2012)

Call For Papers: 15th International Conference on Business Information Systems (BIS 2012)

15th International Conference on Business Information Systems BIS 2012
Vilnius, Lithuania
May 21-23, 2012
http://bis.kie.ue.poznan.pl/15th_bis/

======================================================================
Deadline for submissions: January 16th, 2012

(Proceedings in Springer’s LNBIP series)
======================================================================

THEME OF THE CONFERENCE

Advanced Computational Gateway to Business Information Management

The pervasive vision of this year conference is laid for opening gateway to knowledge discovery for effective decision making and managing business processes by developing information management frameworks closely aligned with enterprise strategy and objectives. We encourage comprehensive look at the concept of data governance as it joins cross-functional teams for business knowledge alignment affecting the company or organization as a whole. The aim of the conference is to identify trends and problems fostering new development of business information systems by applying advanced computational approaches and business intelligence. We expect that ideas and high quality publications presented by the researchers can shape future research directions both in theoretical and applied domains of managing business knowledge. BIS 2012 continues the tradition of collaboration among multiple scientific areas, therefore we are looking forward for original research papers covering the topics detailed below.
======================================================================
TOPICS OF THE CONFERENCE

Topics are restricted by the theme of the conference as defined above and they include:
Business intelligence
* Artificial intelligence
* Evolutionary and genetic algorithms
* Support vector machines
* Fuzzy logic
* Machine learning
* Neural networks
* Intelligent agent based systems
* Business applications of artificial intelligence
Business information management
* Business process management
* Data governance
* IT Project management
* Electronic commerce
* Financial management
* Information security
* Quality management
* Customer Relationship Management
* Semantic business process management
* Adaptive and dynamic processes
* Supply chain processes
* ERP implementations
* Integration of data and processes
* Collaborative BPM
Information technology
* Communication and network systems
* Business Data mining
* Data governance technologies and applications
* Business databases, data warehousing
* Software engineering
* Internet technology and application
* Multimedia business applications
Ontologies
* Creation, learning, population, evolution and evaluation of ontologies
* Ontologies for enterprise content management
* Natural language processing and cognitive science
* Semantic integration of heterogeneous semi-structured information sources
* Interoperability of heterogeneous information systems
* Business models for web information integration and aggregation
Contexts
* Location-aware and geography-centric information systems
* Wireless and mobile applications
* Multi-agent distributed systems
* Semantic web personalization
* Ambient computing
Content retrieval and filtering
* Hidden Web search and crawling
* Data integration from Web information sources
* Modeling and describing evolving data sources
* Adaptive integration of evolving data sources
* Information gathering support for knowledge-intensive enterprises
* Search over semi-structural Web sources
* Business models for a content
Collaboration
* Knowledge-based collaboration
* Human-computer interaction
* Social networks and social wikis
* Enterprise mashups, enterprise 2.0
* Infrastructures for collaboration (p2p, tsc, etc.)
* Semantic grid
* Security in distributed systems
* Web-based model for discoverability, consumption, and reuse
Web services
* Service oriented computing (SOA)
* Semantic web services
* Composition, choreography and orchestration
* Open, decentralized self-service
* Trust and quality of service (qos)
* Service level agreements
======================================================================
SUBMISSION

BIS 2012 proceedings will be published as a volume in Lecture

Notes in Business Information Processing (LNBIP) series by Springer Verlag.
http://www.springer.com/computer?SGWID=0-146-6-450209-0

Information for LNBIP authors may be found at
http://www.springer.com/computer/lncs?SGWID=0-164-6-791344-0

Electronic submission system is available at:
http://www.easychair.org/conferences/?conf=bis2012
* language of publication: English
* paper should not exceed 12 LNCS pages (including abstract and references)
* please include a 100-word abstract at the beginning of the paper, which clearly presents the achievement or contribution of the paper
* please include 4-7 keywords best describing your paper
* we understand that you submit your original work that has not been published or submitted elsewhere, and that you agree to publish your work when it is accepted by the Program Committee; you will be required to send a signed copyright form as required by Springer at a later stage
* at least one author should register for the conference and present the paper; only registered authors’ papers will be included in the proceedings
* the authors will prepare the final manuscript in time for its inclusion in conference proceedings

======================================================================

IMPORTANT DATES

Jan 16, 2012 submission deadline for papers
Mar 1, 2012 notification of acceptance/rejection
Mar 11, 2012 submission of final papers
May 21-23, 2012 the conference
======================================================================

ORGANIZERS
Poznan University of Economics, Department of Information Systems
Vilnius University, KHF, Department of Informatics

======================================================================

PROGRAM COMMITTEE

General Co-Chairs
Witold Abramowicz, Poznan University of Economics, Poland
Virgilijus Sakalauskas, Vilnius University, Lithuania

PC Members
(preliminary, to be extended)

Dimitris Apostolou, University of Piraeus, Greece
Morad Benyoucef, University of Ottawa, Canada
Hans U. Buhl, Augsburg Uni, Germany
Michelangelo Ceci, University of Bari, Italy
Wojciech Cellary, Poznań University of Economics, Poland
Oscar Corcho, Universidad Politechnica de Madrid, Spain
Zhihong Deng, Peking University, China
Tommaso Di Noia, Technical University of Bari, Italy
Schahram Dustdar, Technical University of Vienna, Austria
Suzanne Embury, University of Manchester, UK
Agata Filipowska, Poznań University of Economics, Poland
Bogdan Franczyk, University of Leipzig, Germany
Flavius Frasincar, Erasmus School of Economics, Netherlands
Johann-Christoph Freytag, Humboldt University, Germany
Francesco Guerra, University of Modena, Italy
Jon Atle Gulla, Norwegian University of Science and Technology, Norway
Hele-Mai Haav, Tallinn University of Technology, Estonia
Axel Hahn, University of Oldenburg, Germany
Willem-Jan van den Heuvel, Tilburg School of Economics and Management, Netherlands
Knut Hinkelmann, University of Applied Sciences Northwestern Switzerland, Switzerland
Marta Indulska, The University of Queensland, Australia
Marijn Janssen, Delft University of Technology, Netherlands
Adam Jatowt, Kyoto University, Japan
Monika Kaczmarek, Poznań University of Economics, Poland
Tomasz Kaczmarek, Poznań University of Economics, Poland
Paweł J. Kalczyński, CSU Fullerton, USA
Gary Klein, University of Colorado at Colorado Springs, USA
Ralf Klischewski, German University in Kairo, Egypt
Andrzej Kobyliński, Warsaw School of Economics, Poland
Marek Kowalkiewicz, SAP Research Brisbane, Australia
Helmut Krcmar, TU München, Germany
Dalia Kriksciuniene, Vilnius University, Lithuania
Daniel Lemire, Université du Québec à Montréal , Canada
Alexander Löser, Technische Universität Berlin, Germany
Qiang Ma, Kyoto University , Japan
Maria Mach, University of Economics in Katowice, Poland
Leszek Maciaszek, Macquarie University, Australia
Yannis Manolopoulos, Aristotle University, Greece
Florian Matthes, Technical University of Munich, Germany
Heinrich C. Mayr, University of Klagenfurt, Austria
Jan Mendling, Wirtschaftsuniversität Wien , Austria
Markus Nüttgens, University of Hamburg, Germany
Andreas Oberweis, University of Karlsruhe, Germany
Mitsunori Ogihara, University of Miami, USA
Marcin Paprzycki, Polish Academy of Sciences, Poland
Eric Paquet, National Research Council, Canada
Carlos Pedrinaci, The Open University, UK
Klaus Pohl, University of Duisburg-Essen, Germany
Jaroslav Pokorný, Charles University, Czech Republic
Elke Pulvermueller, University Osnabrueck, Germany
Manjeet Rege, Rochester Institute of Technology, USA
Ulrich Reimer, University of Konstanz, Germany
Gustavo Rossi, National University of La Plata, Argentina
Massimo Ruffolo, University of Calabria, Italy
Shazia Sadiq, The University of Queensland, Australia
Demetrios Sampson, University of Piraeus, Greece
Jürgen Sauer, University of Oldenburg, Germany
Ulf Seigerroth, Jönköping University, Sweden
Gheorghe Cosmin Silaghi, Babes-Bolyai University of Cluj-Napoca, Romania
Elmar J. Sinz, University of Bamberg, Germany
Kilian Stoffel, University of Neuchâtel, Switzerland
Darijus Strasunskas, Norwegian University of Science and Technology, Norway
Jerzy Surma, Warsaw School of Economics, Poland
Zdzisław Szyjewski, University of Szczecin, Poland
Sergio Tessaris, Free University of Bozen – Bolzano, Italy
Barbara Thönssen, University of Applied Sciences Northwestern Switzerland, Switzerland
Robert Tolksdorf, Free University Berlin, Germany
Vassileios Tsetsos, University of Athen, Greece
Herna Viktor, University of Ottawa, Canada
Stefan Voß, Hamburg Uni, Germany
Krzysztof Węcel, Poznań University of Economics, Poland
Andreas Wombacher, University of Twente , Netherlands
Yun Yang, Swinburne University of Technology, Australia
Qi Yu, Rochester Institute of Technology, USA
Slawomir Zadrozny, Polish Academy of Sciences, Poland
John Zeleznikow, Victoria University, Australia
Jozef Zurada, University of Louisville, USA

======================================================================

Poznan University of Economics
Dept. of Information Systems
Al. Niepodleglosci 10
61-875 Poznan, POLAND

Tel: +48(61)854-3381 Fax: +48(61)854-3633
bis[at]kie[dot]ue[dot]poznan[dot]pl
http://bis.kie.ue.poznan.pl

Posted in Conferences | Tagged , , , , , , , , , , , | Comments Off on Call For Papers: 15th International Conference on Business Information Systems (BIS 2012)

Call For Papers: SI on Future Trends in Security Issues in Internet and Web Applications (IWA-SI-IJCSE 2012)

International Journal of Computational Science and Engineering (IJCSE)

Call For Papers
Special Issue on: “Future Trends in Security Issues in Internet and Web Applications”
Link: http://www.inderscience.com/browse/callpaper.php?callID=1729

Guest Editors:
Dr. Al-Sakib Khan Pathan, International Islamic University Malaysia
Dr. Muhammad Mostafa Monowar, University of Chittagong, Bangladesh

Overview

Web applications have gone through a very rapid growth in the recent years and their adoption is moving faster than that was anticipated few years ago. Today, billions of transactions are done online with the aid of different Web applications. Goods and products are advertised through the Internet, prices go up and down based on online bidding, products are sold and bought online, news and information sharing via Internet even influences the political situation of a country. To formally define Internet and Web, we may say that the Internet is a huge network of networks, a complete networking infrastructure that connects millions of computers together which could be located in different geographic locations. The World Wide Web (WWW), or simply Web on the other hand, is a way of accessing information over the medium of the Internet. So, Internet is the implemented network infrastructure, Web is more like an information sharing model.

Nowadays, almost everyone in touch with ‘computer technology’ is somehow connected with Internet. Even though parts of the world are till today out of proper Internet infrastructure, the existing number of users is huge who use different types of Web applications for their intended tasks. To serve this huge number of users, great volumes of data are stored in Web application databases in different parts of the globe. From time to time, the users need to interact with the backend databases via the user interfaces for various tasks such as: updating data, making queries, extracting data, and so forth. For all these operations, design interface and structure play a crucial role, the quality of which has a great impact on the security of the stored data in the database. The reality is that in many cases many of these applications lack proper level of security or sometimes the security is weak, which makes them vulnerable to get compromised and allows illegitimate users to get access to the backend databases.

A less secure Web application design may allow crafted injection and malicious update on the backend database. This trend can cause lots of damage and theft of trusted users’ sensitive data by unauthorized users. In the worst case, the attacker may gain full control over the Web application and totally destroy or damage the system. Other than this particular scenario, there are numerous forms of attacks which exploit other types of vulnerabilities.

The objective of this special issue is to put together the achievements, present research trends, and future potentials of dealing with various security issues of the Internet and Web applications. We mainly welcome technical papers; however comprehensive survey on specific topic may also be considered (although not encouraged).

Any related topic will be considered; and indicative list includes:

– Security in Internet protocols: routing, naming, network management
– Security of Web-based applications
– Combating malware: detection, analysis, and prevention
– Security for future home networks, Internet of Things, body-area networks
– Intrusion detection and prevention
– Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
– Privacy technologies
– Theory and practice of network security policies
– Intellectual property protection
– Watermarking and digital rights management
– Security for collaborative applications: teleconferencing and video-conferencing
– Authentication and access control
– Cloud security
– SQL Injection
– Security in next generation and emerging Web applications

Submission Guidelines

Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (N.B. Conference papers may only be submitted if the paper was not originally copyrighted and if it has been completely re-written).

All papers are refereed through a peer review process. A guide for authors, sample copies and other relevant information for submitting papers are available on the Author Guidelines (http://www.inderscience.com/mapper.php?id=31) page

Important Dates

Manuscript due date: January 15, 2012
First round notification: March 15, 2012
Revised paper due: April 15, 2012
Notification of acceptance: May 01, 2012
Submission of final manuscript: May 20, 2012

All papers must be submitted online. To submit a paper, please go to Online Submissions of Papers (http://www.inderscience.com/mapper.php?id=35&jid=125). If you experience any problems submitting your paper online, please contact submissions@inderscience.com, describing the exact problem you experience. (Please include in your email the title of the Special Issue, the title of the Journal and the names of the Guest Editors)

Please contact Dr. Al-Sakib Khan Pathan (sakib@iium.edu.my, spathan@ieee.org) with any questions about the issue.

Posted in Conferences | Tagged , , , , , , | Comments Off on Call For Papers: SI on Future Trends in Security Issues in Internet and Web Applications (IWA-SI-IJCSE 2012)

Call For Papers: Conference on Science and the Internet 2012 (CoScI 2012)

Online media have brought about numerous changes in scholarly practices, including, but not limited to gathering data, finding relevant literature, making research and results accessible, organising collaboration, communicating with colleagues and students as well as creating fruitful learning environments.

The interdisciplinary conference “Science and the Internet”, to be held August 1-3, 2012 in Düsseldorf, brings together researchers and practitioners from multiple disciplines (e.g. information science, computer science, sociology, communication and media studies, linguistics, educations studies, legal studies, etc.) working on the following or related issues:

* How is the research process transformed through the use of digital infrastructures?
* How can the challenges of the public availability of (large scale) scientific data be met?
* How do scholars make use of social networking platforms, (micro-)blogs, wikis, or websites?
* How does the Internet affect scholarly publishing (e.g. Open Access, unpublished manuscripts, blogs)?
* How has the Internet changed the practice and relevance of citations and of receiving reputation?
* How do teaching styles or beliefs and use of the Internet mutually influence each other?
* Do Web 2.0 platforms offer opportunities to advance public understanding of science?
* What is the role of ethics, policies, and legal regulation in academic use of the Internet?
* What theoretical and practical implications do the aforementioned considerations have for science and the Internet?

Call for Submissions:

The conference language is English. We invite two types of submissions:

Abstracts for talks (20 minutes for presentation + 10 minutes for discussion) should not exceed 500 words, excluding data and references. In case of acceptance a full paper (max. 3.000 words or 12 pages) in either English or German must be submitted by July 15, 2012. The full paper will be published in conference proceedings (print and online).

Proposals for interactive workshops (90 minutes) should outline both the thematic focus and the session design. Workshops should engage participants in developing the topics. Proposals should not exceed 1.000 words.

Both abstracts for presentations and proposals for interactive workshops must be submitted via EasyChair.
Link: http://nfgwin.uni-duesseldorf.de/de/cosci12

Important Dates:

Deadline for submitting abstracts: January 15, 2012

Notification of acceptance: March 15, 2012

Camera-ready submission of papers: July 15, 2012

Conference dates: August 1-3, 2012

Registration:

A registration fee of 50 € must be paid by Paypal or on site.

Posted in Conferences | Tagged , , , , , , , , , , , , , , , , | Comments Off on Call For Papers: Conference on Science and the Internet 2012 (CoScI 2012)

Call For Papers: First International Workshop on Workflow Models, Systems, Services and Applications in the Cloud (CloudFlow 2012)

First International Workshop on
Workflow Models, Systems, Services and Applications in the Cloud (CloudFlow) 2012

To be held in conjunction with the
26th IEEE International Parallel & Distributed Processing Symposium (IPDPS) 2012
Shanghai, China
May 21-25, 2012.

http://www.cloud-uestc.cn/cloudflow/home.html

Overview
Cloud computing is gaining tremendous momentum in both academia and industry,
more and more people are migrating their data and applications into the Cloud.
We have observed wide adoption of the MapReduce computing model and the open
source Hadoop system for large scale distributed data processing, and a
variety of ad hoc mashup techniques that weave together Web applications.
However, these are just first steps towards managing complex task and data
dependencies in the Cloud, as there are more challenging issues such as large
parameter space exploration, data partitioning and distribution, scheduling
and optimization, smart reruns, and provenance tracking associated with
workflow execution.

Cloud needs structured and mature workflow technologies to handle such issues,
and vice versa, as Cloud offers unprecedented scalability to workflow systems,
and could potentially change the way we perceive and conduct research and
experiments. The scale and complexity of the science and data analytics
problems that can be handled can be greatly increased on the Cloud, and the
on-demand nature of resource allocation on the Cloud will also help improve
resource utilization and user experience.

As Cloud computing provides a paradigm-shifting utility-oriented computing
model in terms of the unprecedented size of datacenter-level resource pool
and the on-demand resource provisioning mechanism, there are lots of
challenges in bringing Cloud and workflows together. We need high level
languages and computing models for large scale workflow specification; we need
to adapt existing workflow architectures into the Cloud, and integrate
workflow systems with Cloud infrastructure and resources; we also need to
leverage Cloud data storage technologies to efficiently distribute data over
a large number of nodes and explore data locality during computation etc. We
organize the CloudFlow workshop as a venue for the workflow and Cloud
communities to define models and paradigms, present their state-of-the-art
work, share their thoughts and experiences, and explore new directions in
realizing workflows in the Cloud.

Topics:
We welcome the submission of original work related to the topics listed below,
which include (in the context of Cloud):
– Models and Languages for Large Scale Workflow Specification
– Workflow Architecture and Framework
– Large Scale Workflow Systems
– Service Workflow
– Workflow Composition and Orchestration
– Workflow Migration into the Cloud
– Workflow Scheduling and Optimization
– Cloud Middleware in Support of Workflow
– Virtualized Environment
– Workflow Applications and Case Studies
– Performance and Scalability Analysis
– Peta-Scale Data Processing
– Event Processing and Messaging
– Real-Time Analytics
– Provenance

Paper Submission
Authors are invited to submit papers with unpublished, original work. The
papers should not exceed 10 single-spaced double-column pages using 10-point
size font on 8.5×11 inch pages (IEEE conference style), including figures,
tables, and references. Paper submission should be done via the online CMT
system, Microsoft??s Academic Conference Management Service
(https://cmt.research.microsoft.com/CF2012) by midnight January 9th, 2012
Pacific Time. The final format should be in PDF. Proceedings of the workshop
will be published by the IEEE Digital Library and distributed at the
conference. Selected excellent work may be eligible for additional
post-conference publication as journal articles or book chapters. Submission
implies the willingness of at least one of the authors to register and present
the paper.

Important Dates
Paper submission: January 9th, 2012
Acceptance notification: February 8th, 2012
Final paper due: Feb 21st, 2012

Organization
Workshop Chairs:
Dr. Yong Zhao
University of Electronic Science and Technology of China, China
yongzh04@gmail.com

Dr. Cui Lin
California State University, Fresno, USA
clin@csufresno.edu
Dr. Shiyong Lu
Wayne State University, USA
shiyong@wayne.edu

Program Chairs:
Dr. Wenhong Tian
University of Electronic Science and Technology of China, China
Dr. Ruini Xue
Tsinghua University, China

Steering Committee
– Dan Kartz, University of Chicago, U.S.A.
– Mike Wilde, University of Chicago, U.S.A.
– Ewa Deelman, University of South California, U.S.A.
– Tevfik Kosar, University at Buffalo, U.S.A.
– Ilkay Altintas, San Diego Supercomputer Center, U.S.A.
– Ioan Raicu, Illinois Institute of Technology, U.S.A.
– Yogesh Simmhan, University of Southern California, U.S.A.
– Ian Taylor, Cardiff University, U.K.
– Weimin Zheng, Tsinghua University, China
– Hai Jin, Huazhong University of Science and Engineering, China
– Wanchun Dou, Nanjing University, China

Program Committee
– Shawn Bowers, Gonzaga University, U.S.A.
– Douglas Thain, University of Notre Dame, U.S.A.
– Ian Gorton, Pacific Northwest National Laboratory, U.S.A.
– Artem Chebotko, University of Texas at Pan American, U.S.A.
– Paolo Missier, Newcastle University, U.K.
– Paul Groth, University of Amsterdam, the Netherlands
– Zhiming Zhao, University of Amsterdam, the Netherlands
– Marta Mattoso, Federal University of Rio de Janeiro, Brazil
– Wei Tan, IBM T. J. Watson Research Center, U.S.A.
– Jianwu Wang, San Diego Super Computer Center, U.S.A.
– Ping Yang, Binghamton University, U.S.A.
– Jian Guo, Harvard University, U.S.A.
– Liqiang Wang, University of Wyoming, U.S.A.
– Wenhong Tian, University of Electronic Science and Technology of China, China
– Ruini Xue, Tsinghua University, China
– Jian Cao, Shanghai Jiaotong University, China
– Weisong Shi, Tongji University, China
– Jianxun Liu, Hunan University of Science and Technology, China
– Song Zhang, Chinese Academy of Sciences, China

Posted in Conferences | Tagged , , , , , , , | Comments Off on Call For Papers: First International Workshop on Workflow Models, Systems, Services and Applications in the Cloud (CloudFlow 2012)

Call For Papers: The 2012 International Workshop on Social Computing, Network, and Services (SocialComNet 2012)

** Important Notices **

1. Submission due: Jan. 15, 2012

2. All accepted papers will be published in the Springer CCIS proceedings (EI and ISTP), which will be indexed by the following services: EI Compendex(Since 2010), ISI Conference Proceedings Citation Index – Science (CPCI-S), included in ISI Web of Science, DBLP and Scopus.

3. All accepted and presented papers in SocialComNet 2012, after further revisions,
will be published in the special issues of the following international journals:

1) The Journal of Supercomputing (JoS) – Springer (SCI)
2) Wireless Personal Communications – Springer (SCIE)
3) Journal of Personal and Ubiquitous Computing – Springer (SCIE)
4) Peer-to-Peer Networking and Applications – Springer (SCIE)
5) Human-Centric Computing and Information Science (HCIS) – Springer
6) International Journal of Information Technology, Communications and Convergence (IJITCC) – Inderscience
7) International Journal of Autonomous and Adaptive Communications Systems (IJAACS) – Inderscience
8) Journal of Convergence (JoC) – FTRA Publishing

========================================================================================

WORKSHOP OVERVIEW
===================

Recently, social computing and networking has been driving dramatic evolution in the way people communicate and interact with each other, attracting great attention from the research community as well as the business world. Social computing not only includes Web 2.0 elements such as blogs, twitter, and wikis, etc, but also stands for a collection of the technologies that gather, process, compute, and visualize social information and the studies that model and analyze dynamics of participants in social networks.

With the advent of the social computing era, SocialComNet-2012 aims at reporting the most recent progresses, trends, and concerns in this rapidly growing area. This workshop will provide a forum for participants from the computing and social science communities and publish state-of-art research papers. Furthermore, we expect that the workshop and its publications will trigger related research and technology innovation in this important subject.

TOPICS
===================

Original contributions are solicited in all social computing and network researchs. Topics include, but are not limited to:

Social Computing Theories
Data Mining and Machine Learning for Social Computing
Information Retrieval for Social Computing
Artificial Intelligence for Social Computing
Social Behavior Modeling
Social Intelligence and Cognition
Collaborative and Multi-Agent Systems for Social Computing
Information Diffusion in Social Networks
Peer-to-Peer System
Cloud computing for Social Computing
Grid, Cluster, and Internet Computing
Semantic Web Technologies and Their Applications for Social Network
Context-Awareness and Context Sharing
Search and Discovery Techniques for Social Network
RFID and Internet of Things
Human Computer Interactions
Smart Object, Space/Environment & System
Social Network and Smart-phone Services
Ubiquitous Sensing with Inputs from Social Sensors
Location Aware Services for Social Network
Social Computing and Entertainment
E-Learning, Edutainment, and Infotainment in Social Network
Social Computing for E-Commerce and E-Society, etc
Video Distribution (IPTV, VoD) in Social Network
Developing and Managing Web2.0 Services
Use of Social Networks for Marketing
Web Page Ranking Informed by Social Media
Collaborative Filtering
Social Recommender Systems
Social System Design and Architectures
Social Media Business Models
Social Computing Services and Case Studies
Privacy and Security Issues in Social Networks
Social and Ethical Issues of Networked World

PAPER SUBMISSION & PROCEEDING
================================

There will be a combination of presentations including scientific papers. Prospective authors are invited, in the first instance, to submit papers for oral presentations in any of the areas of interest for this workshop.

Papers must strictly adhere to page limits as follows.

– Full Paper: 8 pages (Max 2 extra pages allowed at additional cost)
– Regular Paper: 6 pages (Max 2 extra pages allowed at additional cost)
– Poster Paper: 2 pages (FTRA Publishing Proceeding with ISBN)

Papers exceeding the page limits will be rejected without review.

SocialComNet-2012’s submission web site: http://www.editorialsystem.net/socialcomnet2012

All accepted papers will be published in the Springer CCIS proceedings (EI and ISTP), which will be indexed by the following services: EI Compendex(Since 2010), ISI Conference Proceedings Citation Index – Science (CPCI-S), included in ISI Web of Science, DBLP and Scopus.

All accepted and presented papers in SocialComNet 2012, after further revisions,
will be published in the special issues of the following international journals:

1. The Journal of Supercomputing (JoS) – Springer (SCI)
2. Wireless Personal Communications – Springer (SCIE)
3. Journal of Personal and Ubiquitous Computing – Springer (SCIE)
4. Peer-to-Peer Networking and Applications – Springer (SCIE)
5. Human-Centric Computing and Information Science (HCIS) – Springer
6. International Journal of Information Technology, Communications and Convergence (IJITCC) – Inderscience
7. International Journal of Autonomous and Adaptive Communications Systems (IJAACS) – Inderscience
8. Journal of Convergence (JoC) – FTRA Publishing

Posted in Conferences | Tagged , , , , , , , , , , , , , , , , , , , , | Comments Off on Call For Papers: The 2012 International Workshop on Social Computing, Network, and Services (SocialComNet 2012)

Call For Papers: The 3rd International Workshop on Security and Privacy in Cloud Computing (ICDCS-SPCC 2012)

The 3rd International Workshop on Security and Privacy in Cloud Computing,
in conjunction with ICDCS 2012, Macau, China, June 18-21, 2012
(http://www.ece.iit.edu/~ubisec/workshop.htm)

Cloud computing has recently emerged as a new information technology infrastructure. Cloud computing has unique attributes that raise many security and privacy challenges in areas such as data security, recovery, and privacy, as well as legal issues in areas such as regulatory compliance and auditing. In contrast to traditional enterprise IT solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the servers in large data centers on the Internet, where the management of the data and services are not fully trustworthy. When clients store their data on the server without themselves possessing a copy of it, how the integrity of the data can be ensured if the server is not fully trustworthy? Will encryption solve the data confidentiality problem of sensitive data? How will encryption affect dynamic data operations such as query, insertion, modification, and deletion? Data in the cloud is typically in a shared environment alongside data from other clients. How the data segregation should be done, while data are stored, transmitted, and processed? Due to the fundamental paradigm shift in cloud computing, many security concerns have to be better understood, unanticipated vulnerabilities identified, and viable solutions to critical threats devised, before the wide deployment of cloud computing techniques can take place.

We are soliciting both full papers that present relatively complete and mature research results and short position papers that report work-in-progress but inspiring and intriguing new ideas. Topics of interests include (but are not limited to) the following subject categories:

Secure cloud architecture

Cloud access control and key management

Identification and privacy in cloud

Remote data integrity protection

Dynamic data operation security

Software and data segregation security

Secure management of virtualized resources

Joint security and privacy aware protocol design

Failure detection and prediction

Secure data management in/across data centers

Availability, recovery and auditing

Secure wireless cloud

Authors are invited to submit either Research Papers or Position Papers or both. Position Papers that define new problems in cloud computing security or provide visions and clarifications of cloud computing security are solicited. Regular Research Papers that present novel research results on security and privacy in cloud computing, and Short Research Papers that describe work-in-progress ideas are also welcome. Research Papers and Position Papers will be reviewed separately.

Time Line and Paper Submission:

Manuscript submission: January 8, 2012

Acceptance notification: February 22, 2012

Final Manuscript due: March 3, 2012

Workshop Date: TBA

All paper submissions should follow the IEEE 8.5″ x 11″ Two-Column Format. Regular Research Paper submission can have 10 pages plus up to 2 over-length pages. If the paper is accepted for publication, an over-length fee will be charged to each of the over-length pages, at $200 per page in the final camera-ready version. Position Papers and Short Research Papers, on the other hand, are allowed to be up to 5 pages.

Electronic Submission: https://www.easychair.org/conferences/?conf=icdcsspcc12.

Organizing Committees

General Chair
Xiaohua Jia, City University of Hong Kong

Program Co-chairs

Moti Yung, Google Inc.
Kui Ren, Illinois Institute of Technology

Publicity Chair
Shucheng Yu, University of Arkansas at Little Rock

Technical Program Committee (to be finalized)

Ahmed Azab, North Carolina State University
Jack Brassil, HP Laboratories
Charlie Catlett, Argonne National Laboratory
Sherman S.M. Chow, University of Waterloo
Xuhua Ding, Singapore Management University
Xinwen Fu, University of Massachusetts Lowell
Keesook Han, Air Force Research Laboratory
Xiaohua Jia, City University of Hong Kong
Xuxian Jiang, North Carolina State University
Zhenkai Liang, National University of Singapore
Wenjing Lou, Virginia Polytechnic Institute and State University
Di Ma, University of Michigan Dearborn
Peter Mueller, IBM Zurich Research
Peng Ning, North Carolina State University
Cristina Nita-Rotaru, Purdue University
Kui Ren, Illinois Institute of Technology
Pierangela Samarati, Università degli Studi di Milano
Cliff Wang, US Army Research Office
Sherry Wang, Johns Hopkins University/Applied Physics Laboratory
Xinyuan Wang, George Mason University
Zhi Wang, North Carolina State University
Moti Yung, Google Inc.
Xiaolan (Catherine) Zhang, IBM T.J. Watson Research

Steering Committee

Peng Ning, North Carolina State University, Raleigh
Jeffrey Chase, Duke University
David Du, University of Minnesota
Ari Juels, RSA Laboratories
Wenjing Lou, Virginia Polytechnic Institute and State University
Michael Reiter, University of North Carolina at Chapel Hill
Moti Yung, Google Inc.

Posted in Conferences | Tagged , , , , , , , | Comments Off on Call For Papers: The 3rd International Workshop on Security and Privacy in Cloud Computing (ICDCS-SPCC 2012)