Tuesday, May 19, 2015

dmanet Digest, Vol 87, Issue 19

Send dmanet mailing list submissions to
dmanet@zpr.uni-koeln.de

To subscribe or unsubscribe via the World Wide Web, visit
http://www.zaik.uni-koeln.de/mailman/listinfo/dmanet
or, via email, send a message with subject or body 'help' to
dmanet-request@zpr.uni-koeln.de

You can reach the person managing the list at
dmanet-owner@zpr.uni-koeln.de

When replying, please edit your Subject line so it is more specific
than "Re: Contents of dmanet digest..."


Today's Topics:

1. Last Mile | ICCGI 2015 || October 11 - 16, 2015 - St.
Julians, Malta (Cristina Pascual)
2. Call For Papers: Healthcare special session, CIE45
(Masmoudi Malek)
3. ** DEADLINE APPROACHING - FRIDAY 22 MAY** - 2nd International
Workshop on Reliability and Security Aspects for Critical
Infrastructure Protection - ReSA4CI 2015 co-located with SAFECOMP
2015 (Silvia Bonomi)


----------------------------------------------------------------------

Message: 1
Date: Tue, 19 May 2015 09:10:17 +0200
From: Cristina Pascual<cris.pascual.gonzalez@gmail.com>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] Last Mile | ICCGI 2015 || October 11 - 16, 2015 -
St. Julians, Malta
Message-ID: <201505190710.t4J7AGai012263@smtp.upv.es>
Content-Type: text/plain; charset=us-ascii


INVITATION:

=================
Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results to ICCGI 2015.

The submission deadline is June 1, 2015.

Authors of selected papers will be invited to submit extended article versions to one of the IARIA Journals: http://www.iariajournals.org
=================


============== ICCGI 2015 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

ICCGI 2015, The Tenth International Multi-Conference on Computing in the Global Information Technology

October 11 - 16, 2015 - St. Julians, Malta

General page: http://www.iaria.org/conferences2015/ICCGI15.html

Call for Papers: http://www.iaria.org/conferences2015/CfPICCGI15.html

Submission page: http://www.iaria.org/conferences2015/SubmitICCGI15.html


Contributions:
- regular papers [in the proceedings, digital library]
- short papers (work in progress) [in the proceedings, digital library]
- ideas: two pages [in the proceedings, digital library]
- extended abstracts: two pages [in the proceedings, digital library]
- posters: two pages [in the proceedings, digital library]
- posters: slide only [slide-deck posted at www.iaria.org]
- presentations: slide only [slide-deck posted at www.iaria.org]
- demos: two pages [posted at www.iaria.org]
- doctoral forum submissions: [in the proceedings, digital library]

Proposals for:
- mini symposia: see http://www.iaria.org/symposium.html
- workshops: see http://www.iaria.org/workshop.html
- tutorials: [slide-deck posed on www.iaria.org]
- panels: [slide-deck posed on www.iaria.org]

Submission deadline: June 1 2015

Sponsored by IARIA, www.iaria.org
Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org
Print proceedings will be available via Curran Associates, Inc.: http://www.proceedings.com/9769.html
Articles will be archived in the free access ThinkMind Digital Library: http://www.thinkmind.org

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.

All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and comply with the editorial rules: http://www.iaria.org/editorialrules.html


ICCGI 2015 Topics (topics and submission details: see CfP on the site)

Industrial systems

Control theory and systems; Fault-tolerance and reliability; Data engineering; Enterprise computing and evaluation; Electrical and electronics engineering; Economic decisions and information systems; Advanced robotics; Virtual reality systems; Industrial systems and applications; Industrial and financial systems; Industrial control electronics; Industrial IT solutions

Evolutionary computation

Algorithms, procedures, mechanisms and applications; Computer architecture and systems; Computational sciences; Computation in complex systems; Computer and communication systems; Computer networks; Computer science theory; Computation and computer security; Computer simulation; Digital telecommunications; Distributed and parallel computing; Computation in embedded and real-time systems; Soft computing; User-centric computation

Autonomic and autonomous systems

Automation and autonomous systems; Theory of Computing; Autonomic computing; Autonomic networking; Network computing; Protecting computing; Theories of agency and autonomy; Multi-agent evolution, adaptation and learning; Adjustable and self-adjustable autonomy; Pervasive systems and computation; Computing with locality principles; GRID networking and services; Pervasive computing; Cluster computing and performance; Artificial intelligence Computational linguistics; Cognitive technologies; Decision making; Evolutionary computation; Expert systems; Computational biology

Bio-technologies

Models and techniques for biometric technologies; Bioinformatics; Biometric security; Computer graphics and visualization; Computer vision and image processing; Computational biochemistry; Finger, facial, iris, voice, and skin biometrics; Signature recognition; Multimodal biometrics; Verification and identification techniques; Accuracy of biometric technologies; Authentication smart cards and biometric metrics; Performance and assurance testing; Limitations of biometric technologies; Biometric card technologies; Biometric wireless technologies; Biometric software and hardware; Biometric standards

Knowledge data systems

Data mining and Web mining; Knowledge databases and systems; Data warehouse and applications; Data warehousing and information systems; Database performance evaluation; Semantic and temporal databases; Database systems Databases and information retrieval; Digital library design; Meta-data modeling

Mobile and distance education

Human computer interaction; Educational technologies; Computer in education; Distance learning; E-learning; Mobile learning Cognitive support for learning; Internet-based education; Impact of ICT on education and society; Group decision making and software; Habitual domain and information technology; Computer-mediated communications; Immersing authoring; Contextual and cultural challenges in user mobility; Learning process of digital nationality; M-learning's function in business training and in higher education

Intelligent techniques, logics, and systems

Intelligent agent technologies; Intelligent and fuzzy information processing; Intelligent computing and knowledge management; Intelligent systems and robotics; Fault-tolerance and reliability; Fuzzy logic & systems; Genetic algorithms; Haptic phenomena; Graphic recognition; Neural networks; Symbolic and algebraic computation; Modeling, simulation and analysis of business processes and systems

Knowledge processing

Knowledge representation models; Knowledge languages; Cognitive science; Knowledge acquisition; Knowledge engineering; Knowledge processing under uncertainty; Machine intelligence; Machine learning; Making decision through Internet; Networking knowledge plan

Information technologies

Information technology and organizational behavior; Agents, data mining and ontologies; Information retrieval systems; Information and network security; Information ethics and legal evaluations; Optimization and information technology; Organizational information systems; Information fusion; Information management systems; Information overload; Information policy making; Information security; Information systems; Information discovery; Content-consumer IT applications for mobile platforms; New ICT-based applications in the digital society; Micro-contents' function on the way of the Web 3.0

Internet and web technologies

Internet and WWW-based computing; Web and Grid computing; Internet service and training; IT and society; IT in education and health; Management information systems; Visualization and group decision making; Web based language development; Web search and decision making; Web service ontologies; Scientific web intelligence; Online business and decision making; Business rule language; E-Business; E-Commerce; Online and collaborative work; Social eco-systems and social networking; Social decisions on Internet; Computer ethics

Digital information processing

Mechatronics; Natural language processing; Medical imaging; Image processing; Signal processing; Speech processing; Video processing; Pattern recognition; Pattern recognition models; Graphics & computer vision; Medical systems and computing

Cognitive science and knowledge agent-based systems

Cognitive support for e-learning and mobile learning; Agents and cognitive models; Agents & complex systems; computational ecosystems; Agent architectures, perception, action & planning in agents; Agent communication: languages, semantics, pragmatics & protocols; Agent-based electronic commerce and trading systems Multi-agent constraint satisfaction; Agent programming languages, development environments and testbeds; Computational complexity in autonomous agents; Multi-agent planning and cooperation; Logics and formal models of for agency verification; Nomadic agents; Negotiation, auctions, persuasion; Privacy and security issues in multi-agent systems

Mobility and multimedia systems

Mobile communications; Multimedia and visual programming; Multimedia and decision making; Multimedia systems; Mobile multimedia systems; User-centered mobile applications; Designing for the mobile devices; Contextual user mobility; Mobile strategies for global market; Interactive television and mobile commerce

Systems performance

Performance evaluation; Performance modeling; Performance of parallel computing; Reasoning under uncertainty; Reliability and fault-tolerance; Performance instrumentation; Performance monitoring and corrections; Performance in entity-dependable systems; Real-time performance and near-real time performance evaluation; Performance in software systems; Performance and hybrid systems; Measuring performance in embedded systems

Networking and telecommunications

Telecommunication and Networking; Telecommunication Systems and Evaluation; Multiple Criteria Decision Making in Information Technology; Network and Decision Making; Networks and Security; Communications protocols (SIP/H323/MPLS/IP); Specialized networks (GRID/P2P/Overlay/Ad hoc/Sensor); Advanced services (VoIP/IPTV/Video-on-Demand; Network and system monitoring and management; Feature interaction detection and resolution; Policy-based monitoring and managements systems; Traffic modeling and monitoring; Traffic engineering and management; Self-monitoring, self-healing and self-management systems; Man-in-the-loop management paradigm

Software development and deployment

Software requirements engineering; Software design, frameworks, and architectures; Software interactive design; Formal methods for software development, verification and validation; Neural networks and performance; Patterns/Anti-patterns/Artifacts/Frameworks; Agile/Generic/Agent-oriented programming; Empirical software evaluation metrics; Software vulnerabilities; Reverse engineering; Software reuse; Software security, reliability and safety; Software economics; Software testing and debugging; Tracking defects in the OO design; Distributed and parallel software; Programming languages; Declarative programming; Real-time and embedded software; Open source software development methodologies; Software tools and deployment environments; Software Intelligence; Software Performance and Evaluation

Knowledge virtualization

Modeling techniques, tools, methodologies, languages; Model-driven architectures (MDA); Service-oriented architectures (SOA); Utility computing frameworks and fundamentals; Enabled applications through virtualization; Small-scale virtualization methodologies and techniques; Resource containers, physical resource multiplexing, and segmentation; Large-scale virtualization methodologies and techniques; Management of virtualized systems; Platforms, tools, environments, and case studies; Making virtualization real; On-demand utilities Adaptive enterprise; Managing utility-based systems; Development environments, tools, prototypes

Systems and networks on the chip

Microtechnology and nanotechnology; Real-time embedded systems; Programming embedded systems; Controlling embedded systems; High speed embedded systems; Designing methodologies for embedded systems; Performance on embedded systems; Updating embedded systems; Wireless/wired design of systems-on-the-chip; Testing embedded systems; Technologies for systems processors; Migration to single-chip systems

Context-aware systems

Context-aware autonomous entities; Context-aware fundamental concepts, mechanisms, and applications; Modeling context-aware systems; Specification and implementation of awareness behavioral contexts; Development and deployment of large-scale context-aware systems and subsystems; User awareness requirements Design techniques for interfaces and systems; Methodologies, metrics, tools, and experiments for specifying context-aware systems; Tools evaluations, Experiment evaluations

Networking technologies

Next generation networking; Network, control and service architectures; Network signalling, pricing and billing; Network middleware; Telecommunication networks architectures; On-demand networks, utility computing architectures; Next generation networks [NGN] principles; Storage area networks [SAN]; Access and home networks; High-speed networks; Optical networks; Peer-to-peer and overlay networking; Mobile networking and systems; MPLS-VPN, IPSec-VPN networks; GRID networks; Broadband networks

Security in network, systems, and applications

IT in national and global security; Formal aspects of security; Systems and network security; Security and cryptography; Applied cryptography; Cryptographic protocols; Key management; Access control; Anonymity and pseudonymity management; Security management; Trust management; Protection management; Certification and accreditation; Virii, worms, attacks, spam; Intrusion prevention and detection; Information hiding; Legal and regulatory issues

Knowledge for global defense

Business continuity and availability; Risk assessment; Aerospace computing technologies; Systems and networks vulnerabilities; Developing trust in Internet commerce; Performance in networks, systems, and applications; Disaster prevention and recovery; IT for anti-terrorist technology innovations (ATTI); Networks and applications emergency services; Privacy and trust in pervasive communications; Digital rights management; User safety and protection

Information Systems [IS]

Management Information Systems; Decision Support Systems; Innovation and IS; Enterprise Application Integration; Enterprise Resource Planning; Business Process Change; Design and Development Methodologies and Frameworks; Iterative and Incremental Methodologies; Agile Methodologies; IS Standards and Compliance Issues; Risk Management in IS Design and Development; Research Core Theories; Conceptualisations and Paradigms in IS; Research Ontological Assumptions in IS Research; IS Research Constraints, Limitations and Opportunities; IS vs Computer Science Research; IS vs Business Studies

IPv6 Today - Technology and deployment

IP Upgrade - An Engineering Exercise or a Necessity?; Worldwide IPv6 Adoption - Trends and Policies; IPv6 Programs, from Research to Knowledge Dissemination; IPv6 Technology - Practical Information; Advanced Topics and Latest Developments in IPv6; IPv6 Deployment Experiences and Case Studies; IPv6 Enabled Applications and Devices

Modeling

Continuous and discrete Models; Optimal Models; Complex System Modeling; Individual-Based Models; Modeling Uncertainty; Compact fuzzy models; Modeling languages; Real-time modeling; Performance modeling; Decision support systems; Multiple criteria decision aiding; Problem structuring methods

Optimization

Multicriteria Optimization; Multilervel Optimization; Goal Programming; Optimization and Efficiency; Optimization-based decisions; Evolutionary Optimization; Self-Optimization; Extreme Optimization; Combinatorial Optimization; Disccrete Optimization; Fuzzy Optimization; Lipschitzian Optimization; Non-Convex Optimization; Convexity; Continuous Optimization; Interior point methods; Semidefinite and Conic Programming

Complexity

Complexity Analysis; Computational Complexity; Complexity Reduction; Optimizing Model Complexity; Communication Complexity; Managing Complexity; Modeling Complexity in Social Systems; Low-complexity Global Optimization; Software Development for Modeling and Optimization; Industrial applications

---------------------

Committee: http://www.iaria.org/conferences2015/ComICCGI15.html
================================================


------------------------------

Message: 2
Date: Tue, 19 May 2015 09:39:53 +0200
From: "Masmoudi Malek" <malek.masmoudi@univ-st-etienne.fr>
To: DMANET@zpr.uni-koeln.de
Subject: [DMANET] Call For Papers: Healthcare special session, CIE45
Message-ID: <77cc-555ae900-1-6e773d80@197065376>
Content-Type: text/plain; charset="utf-8"

Dear colleagues,

There will be a dedicated session on 'Healthcare Engineering and Management" in the forthcoming International Conference on Computers & Industrial Engineering (CIE45). The session potential topics include, but are not limited to:
- OR and AI for planning and scheduling,
- Quantitative Methods in Health Care Management
- Multiple Criteria Decision Making in Healthcare
- Risk and uncertainty management,
- Lean Healthcare management.

Please feel free to further distribute this invitation also to possibly interested colleagues and students.
We apologize in case of any multiple receipt of this message.

Best regards
Malek Masmoudi
Assistant Professor
University of Saint-Etienne, France

Practical information:
CIE45, October 28-30, 2015 - Metz, France
Please submit your full paper on the Easychair website:
https://easychair.org/conferences/?conf=cie45
May 31, 2015: deadline for paper submission
June 21, 2015: notification of acceptance/reject
July 15, 2015: deadline for final paper
August 16, 2015: deadline for registration.
All papers must be written in English and should describe original work. The length of the paper is limited to a maximum of 8 pages (in the standard CIE conference format). For up-to-date information and paper submission, please visit the conference submission page:
https://easychair.org/conferences/?conf=cie45. The proceedings of CIE 45 will be published on the web page of the conference and that of Computers & Industrial Engineering. They carry the identifier ISSN of 2164-8670 for the CD-ROM version and 2164-8689 for the Online version. A special issue of the international journal ?COMPUTERS & INDUSTRIAL ENGINEERING? will be dedicated to the best papers presented at the conference after rigorous reviews. For any practical issue please write to: cie45@easychair.org





------------------------------

Message: 3
Date: Tue, 19 May 2015 11:18:59 +0200
From: Silvia Bonomi <bonomi@dis.uniroma1.it>
Subject: [DMANET] ** DEADLINE APPROACHING - FRIDAY 22 MAY** - 2nd
International Workshop on Reliability and Security Aspects for
Critical Infrastructure Protection - ReSA4CI 2015 co-located with
SAFECOMP 2015
Message-ID: <3A7E6E0D-F88C-4B24-BCE0-C7951470EBC8@dis.uniroma1.it>
Content-Type: text/plain; charset=us-ascii


================================================================================

CALL FOR PAPERS

2nd International Workshop on Reliability and Security Aspects for Critical Infrastructure Protection - ReSA4CI 2015
co-located with SAFECOMP 2015

September 22nd, 2015, Delft, The Netherlands

http://safecomp2015.tudelft.nl/resa4ci-2015

================================================================================

=================
Scope
=================

Critical infrastructures (CIs) are at the hearth of any advanced civilized country. This workshop aims at providing a forum for researchers and engineers in academia and industry to foster an exchange of research results, experiences, and products in the area of reliable, dependable and secure computing for critical systems protection from both a theoretical and practical perspective. Its ultimate goal is to envision new trends and ideas about aspects of designing, implementing, and evaluating reliable and secure solutions for the next generation critical infrastructures. Critical Infrastructures present several challenges in the fields of distributed systems, dependability and security methods and approaches crucial for improving trustworthiness on ICT facilities. The workshop aims at presenting the advancement on the state of art in these fields and spreading their adoption in several scenarios involving main infrastructures for modern society.

Topics of interest are (but not limited to):
- Model-based and experimental assessment of safety, reliability and security
- Security & Privacy
- Quantitative analysis of dependability and security metrics
- Risk Assessment and Management
- Fault tolerant and Dependable Distributed Algorithm
- Threat Analysis
- Monitoring systems
- Adaptive solutions for secure and safe systems
- Self-* solutions

Domains of application are (but not limited to):

- Critical infrastructure, Smart Grid, and SCADA systems
- Medical device and healthcare
- Telecommunication and networks
- Railways, automotive, aerospace, and avionics
- Defence, cyber intelligence

=================
General Chair
=================

Silvia Bonomi, University of Rome La Sapienza, Italy
Ilaria Matteucci, IIT-CNR, Italy

=================
Program Committee
=================

Valentina Bonfiglio, University of Florence, Italy
Francois Bonnet, Japan Advanced Institute of Science and Technology, Japan
Silvia Bonomi, University of Rome La Sapienza, Italy (co-chair)
Andrea Ceccarelli, University of Florence, Italy
Michele Colajanni, Univerity of Modena and Reggio Emilia, Italy
Barbara Gallina, Malardalen University, Sweden
Joaquin Garcia-Alfaro, Institut Mines-Telecom, France
Felicita Di Giandomenico, ISTI-CNR, Italy
Karama Kanoun, LAAS, France
Ilaria Matteucci, IIT-CNR, Italy (co-chair)
Paolo Masci, Queen Mary University of London, UK
Federica Paci, University of Southampton, UK
Marinella Petrocchi, IIT-CNR, Italy
Marco Platania, Johns Hopkins University, USA

=================
Important dates
=================

Submission deadline: May 22, 2015
Acceptance notification: June 15, 2015
Camera-ready copy due: June 28, 2015

=================
Submission and Publication
=================

Submitted papers must be written in English and must contain results that have not previously published nor concurrently submitted to a journal or conference with published proceedings. Any partial overlap with any published or concurrently submitted paper must be clearly indicated. Submissions are limited to 10 pages in the LNCS format and submitted electronicaly to the EasyChair server (https://easychair.org/conferences/?conf=safecomp2015). The selection of accepted contributions will be based on peer-reviews by the PC. Each accepted paper will be published jointly with the SAFECOMP 2015 proceedings and it must be presented at the workshop by one of its authors.


------------------------------

Subject: Digest Footer

_______________________________________________
dmanet mailing list
dmanet@zpr.uni-koeln.de
http://www.zaik.uni-koeln.de/mailman/listinfo/dmanet


------------------------------

End of dmanet Digest, Vol 87, Issue 19
**************************************

No comments:

Post a Comment