We are happy to announce the following event.
**********************************************************************
CALL FOR PAPERS
32nd Italian Conference on
Computational Logic
(CILC 2017) -- http://cilc2017.unina.it/
Naples, Italy, September 26-29, 2017
**********************************************************************
CILC (Italian Conference on Computational Logic) is the annual conference
organized by GULP (Group of researchers and Users of Logic Programming,
www.programmazionelogica.it). Its 32nd edition will be held in Naples
(Italy) on
September 26-29, 2017.
Since the first event of the series, which took place in Genoa in 1986, the
annual GULP conference represents the main opportunity for users,
researchers
and developers working in the field of computational logic to meet and
exchange
ideas. Over the years the conference broadened its horizons from the
specific
field of logic programming to include declarative programming and
applications
in neighboring areas such as artificial intelligence and deductive
databases.
CILC 2017 is co-located with the 18th Italian Conference on Theoretical
Computer
Science ICTCS 2017 (http://ictcs2017.unina.it/) with which it will share
part of
the program. The two events will feature plenary events, on September
29, to be
specified later.
Contributions:
--------------
The conference will feature presentations of refereed contributions,
including
the demonstration of software prototypes, concerning all aspects of
computational logic.
The conference invites two types of submissions: full papers, possibly
already
submitted to other conferences or journals, and short papers, which are
particularly suitable for presenting work in progress, software prototypes,
extended abstracts of doctoral theses, or general overviews of research
projects.
The topics of interest include, but are not limited to, the following:
Logic Programming, Constraint Programming and other paradigms of
declarative programming
Extensions and integrations of declarative programming paradigms
Analysis, transformation, validation, and verification of programs
Instruments and environments for program development
Implementations and benchmarking
Model Checking
Temporal logics
Automated Theorem Proving
Non-Monotonic Reasoning
Answer Set Programming
Knowledge representation and extraction
Treatment of uncertain and incomplete knowledge
Approximate Reasoning
Abductive Logic Programming
Model-based Reasoning
Inductive Logic Programming
Deductive Databases
Data Mining and Data Integration
Multi-agent systems
Logics for strategic reasoning
Semantic Web
Natural Language Processing
Computational logic for concurrency, coordination, mobility and objects
Planning and scheduling
Probabilistic Logic Programming
Computational Logic and formal methods in Artificial Intelligence
Applications of Computational Logic
Pedagogy of Computational Logic
Important dates:
----------------
Abstract, paper, and demo submission deadline: 25 May 2017
Notification of acceptance: 30 June 2017
Final version and early registration deadline: 24 July 2017
Conference: 26-29 September 2017
Submission instructions:
------------------------
Authors are invited to submit their manuscripts in PDF via the EasyChair
system
at the link:
https://easychair.org/conferences/?conf=cilc2017
Articles must not exceed 15 pages for full papers and 5 pages for short
papers,
respectively. Manuscripts should be formatted using the Springer LNCS
style. To
ease the reviewing process, the authors of regular papers may add an
appendix
(although reviewers are not required to consider it in their
evaluation). All
contributions must be written in English.
We invite submissions of system or prototype software descriptions which use
techniques or tools of computational logic, or which themselves aid the
development of applications based on computational logic. Systems of both
research and industrial character are welcome. Submissions must include
a brief
description, prepared according to the guidelines given for short
papers, and a
specification of the required hardware and software equipment.
For each accepted contribution, at least one of the authors is required to
attend the conference and present the paper. The event is organized by
GULP. Therefore, Italian attendants are required to be members of GULP
(it is
possible to join GULP at the conference).
Proceedings:
------------
Papers accepted for presentation at the conference (both full and short)
will be
published on CEUR-WS.org.
As in previous years, we plan to publish a selection of the best papers in a
special issue of an international journal (to be determined).
General chair:
--------------
Aniello Murano (University of Naples "Federico II")
Program co-chairs:
------------------
Dario Della Monica (Universidad Complutense de Madrid)
Luigi Sauro (University of Naples "Federico II")
Venue:
------
The conference will take place at the "Complesso di San Giovanni a
Teduccio---Complesso Napoli Est", in Corso Nicolangelo Protopisani, 70,
80146
Napoli.
--------------
For more information email cilc2017(a)easychair.org.
--
Dario Della Monica, Postdoctoral Researcher
Dipartimento di Ingegneria Elettrica e Tecnologie dell'Informazione (DIETI)
University of Naples "Federico II"
via Claudio, 21, 80125 Naples, Italy
cell: (+39) 328 2477327
email: dario.dellamonica [at] unina.it
skype: dariodellamonica
web site: http://wpage.unina.it/dario.dellamonica/
FULLY FUNDED PHD STUDENTSHIP at the University of Birmingham, UK
http://www.cs.bham.ac.uk/~xin/PhDAdvert.html
RPOJECT: Experience-based Optimisation
This project aims at improving the efficiency of optimisation processes
for problems inspired by industrial application scenarios. The key research
issues include the conservation, abstraction and modelling of experience
gained from optimising one problem instance and the smart integration of such
experience/knowledge in solving related problem instances. In this project,
novel algorithms and techniques will be designed that will become more and
more effective as they solve more and more problem instances. The key research
challenges include: the representation of experience; the mapping/transfer of
the problem-solving experience across problem instances; the incorporation of
transferred experience into solving the current problem instance at hand.
FUNDING:
The PhD studentship is for three-years, covering tuition fees and GBP14,553
per year tax-free living stipends. Additional funding is available for conference
travels and research collaborations with industry.
RESEARCH ENVIRONMENT:
The University of Birmingham has a long tradition of supporting outstanding PhD
students in natural computation. Our former PhD students have won prestigious
IEEE Computational Intelligence Society Outstanding PhD Dissertation Awards
(twice), CPHC/BCS Distinguished Dissertation Award (Runner-up), and highly
competitive Leverhulme Early Career Fellowship, EPSRC Theoretical Computer
Science Postdoctoral Fellowship, etc.
APPLICATION DEADLINE AND EXPECTED STARTING DATE:
The PhD studentship is available immediately. This position will remain open until it
is filled.
CANDIDATES:
The successful applicant must have at least a 2.1 or above degree in computer
science or a closely related field (or a Distinction at the MSc level). We do
consider outstanding applicants from mathematics, physics and engineering as
long as they have sufficient computer science background. Previous research
experience is an advantage, but not essential. Excellence is our top priority.
Both EU and overseas applicants are welcome.
HOW TO APPLY:
Only online applications will be considered. For further details of how to
apply, please visit http://www.cs.bham.ac.uk/admissions/postgraduate-research/
and follow the instructions and links there.
CONTACT PERSON FOR RESEARCH ISSUES: Prof. Xin Yao: x.yao(a)cs.bham.ac.uk.
================================================================================
*** Apologies for multiple copies ***
C a l l F o r P a p e r s
Twenty-second European Symposium on Research in Computer Security
(ESORICS 2017)
Oslo, Norway -- September 11-15, 2017
WWW: https://www.ntnu.edu/web/esorics2017/
================================================================================
Overview
------------------------------------
ESORICS is the annual European research event in Computer Security. The
Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities. Papers offering novel research
contributions in computer security are solicited for submission to the
Symposium. The primary focus is on original, high quality, unpublished
research and implementation experiences. We encourage submissions of
papers discussing industrial research and development.
Important Dates
------------------------------------
* Paper submission deadline: April 19, 2017
* Notification to authors: June 16, 2016
* Camera ready due: July 26, 2016
Topics of Interest
------------------------------------
Topics of interest include, but are not limited to:
* access control
* accountability
* ad hoc networks
* anonymity
* applied cryptography
* authentication
* biometrics
* data and computation integrity
* database security
* data protection
* digital content protection
* digital forensics
* distributed systems security
* embedded systems security
* inference control
* information hiding
* identity management
* information flow control
* information security governance and management
* intrusion detection
* formal security methods
* language-based security
* network security
* phishing and spam prevention
* privacy
* privacy preserving data mining
* risk analysis and management
* secure electronic voting
* security architectures
* security economics
* security metrics
* security models
* security and privacy for big data
* security and privacy in cloud scenarios
* security and privacy in complex systems
* security and privacy in content centric networking
* security and privacy in crowdsourcing
* security and privacy in the IoT
* security and privacy in location services
* security and privacy for mobile code
* security and privacy in pervasive / ubiquitous computing
* security and privacy policies
* security and privacy in social networks
* security and privacy in web services
* security and privacy in cyber-physical systems
* security, privacy and resilience in critical infrastructures
* security verification
* software security
* systems security
* trust models and management
* trustworthy user devices
* usable security and privacy
* web security
* wireless security
Paper Submission Guidelines
------------------------------------
Submissions must be made through EasyChair at:
https://easychair.org/conferences/?conf=esorics2017
Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference/workshop with proceedings. The symposium proceedings will be
published by Springer in the Lecture Notes in Computer Science series
(LNCS).
All submissions should follow the LNCS template from the time they are
submitted. Submitted papers should be at most 16 pages (using 10-point
font), excluding the bibliography and well-marked appendices, and at
most 20 pages total. Committee members are not required to read the
appendices, so the paper should be intelligible without them. All
submissions must be written in English. Submissions are to be made to
the Submission web site. Only pdf files will be accepted.
Submissions not meeting these guidelines risk rejection without
consideration of their merits. Authors of accepted papers must guarantee
that their papers will be presented at the conference.
Papers must be received by the aforementioned dates, 11:59 p.m. American
Samoa time (UTC-11).
Organisation Committee
------------------------------------
General Chairs:
* Einar Snekkenes, Norwegian University of Science and Technology
(NTNU), Norway.
Organization Chair:
* Laura Georg, Norwegian University of Science and Technology (NTNU),
Norway.
Workshop Chair:
* Sokratis Katsikas, Norwegian University of Science and Technology
(NTNU), Norway.
Program Committee Chairs:
* Dieter Gollman, Technische Universität Hamburg-Harburg, Germany
* Simon Foley, IMT Atlantique, France
Program Committee:
Gail-Joon Ahn, Arizona State University, USA
Alessandro Armando, University of Genoa, Italy
Michael Backes, Saarland University, Germany
Giampaolo Bella, Università degli studi di Catania, Italy
Elisa Bertino, Purdue University, USA
Carlo Blundo, Università degli studi di Salerno, Italy
Rainer Böhme, University of Innsbruck, Austria
Colin Boyd, Norwegian University of Science and Technology, Norway
Stefan Brunthaler, SBA Research, Austria
Tom Chothia, University of Birmingham, UK
Sherman S. M. Chow, Chinese University of Hong Kong, Hong Kong
Mauro Conti, University of Padua, Italy
Cas Cremers, University of Oxford, UK
Frederic Cuppens, IMT Atlantique, France
Nora Cuppens-Boulahia, IMT Atlantique, France
Mads Dam, KTH, Sweden
Sabrina De Capitani di Vimercati, Università degli studi di Milano,
Italy
Herve Debar, Telecom SudParis, France
Roberto Di Pietro, Nokia Bell Labs, France
Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
Wenliang Du, Syracuse University, USA
Pavlos Efraimidis, Democritus University of Thrace, Greece
Hannes Federrath, University of Hamburg, Germany
Simone Fischer-Hübner, Karlstad University, Sweden
Riccardo Focardi, Università Ca’ Foscari di Venezia, Italy
Simon Foley, IMT Atlantique, France
Sara Foresti, Università degli studi di Milano, Italy
Katrin Franke, Norwegian University of Science and Technology, Norway
Felix Freiling, Friedrich-Alexander-Universität Erlangen-Nürnberg,
Germany
Joaquin Garcia-Alfaro, Telecom ParisSud, France
Dieter Gollmann, Hamburg University of Technology, Germany
Dimitris Gritzalis, Athens University of Economics and Business, Greece
Stefanos Gritzalis, University of the Aegean, Greece
Joshua Guttman, Worcester Polytechnic Institute, USA
Gerhard Hancke, City University of Hong Kong, China
Marit Hansen, Unabhängiges Landeszentrum für Datenschutz
Schleswig-Holstein, Germany
Feng Hao, Newcastle University, UK
Cormac Herley, Microsoft Research , USA
Xinyi Huang, Fujian Normal University, China
Michael Huth, Imperial College, UK
Aaron D. Jaggard, U.S. Naval Research Laboratory, USA
Sushil Jajodia, George Mason University, USA
Limin Jia, Carnegie Mellon University, USA
Wouter Joosen, KU Leuven, Belgium
Vasilis Katos, Bournemouth University, UK
Sokratis Katsikas, Norwegian University of Science and Technology,
Norway
Florian Kerschbaum, University of Waterloo, Canada
Dogan Kesdogan, Universität Regensburg, Germany
Kwangjo Kim, Korea Advanced Institute of Science and Technology, Korea
Steve Kremer, INRIA Nancy-Grand Est, France
Marina Krotofil, Honeywell, USA
Ralf Küsters, University of Trier, Germany
Junzuo Lai, Singapore Management University, Singapore
Kwok-yan Lam, Nanyang Technological University, Singapore
Costas Lambrinoudakis, University of Piraeus, Greece
Peeter Laud, Cybernetica AS, Estonia
Adam J. Lee, University of Pittsburgh, USA
Gabriele Lenzini, University of Luxembourg, Luxembourg
Yingjiu Li, Singapore Management University, Singapore
Antonio Lioy, Politecnico di Torino, Italy
Peng Liu, The Pennsylvania State University, USA
Javier Lopez, University of Malaga, Spain
Antonio Maña, University of Malaga, Spain
Pratyusa K. Manadhata, Hewlett Packard Labs, USA
Luigi V. Mancini, "Universita di Roma ""La Sapienza""", Italy
Heiko Mantel, TU Darmstadt, Germany
Olivier Markowitch, Université Libre de Bruxelles, Belgium
Fabio Martinelli, IIT-CNR, Italy
Sjouke Mauw, University of Luxembourg, Luxembourg
Catherine Meadows, Naval Research Laboratory, USA
John Mitchell, Stanford University, USA
Aikaterini Mitrokotsa, Chalmers University of Technology, Sweden
Refik Molva, EURECOM, France
Charles Morisset, Newcastle University, UK
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, Università di Bergamo, Italy
Dusko Pavlovic, University of Hawaii, USA
Günther Pernul, Universität Regensburg, Germany
David Pichardie, ENS-IRISA, Rennes
Frank Piessens , Katholieke Universiteit Leuven, Belgium
Wolter Pieters, Delft University of Technology, The Netherlands
Michalis Polychronakis, Stonybrook University, USA
Christina Pöpper, NYU Abu Dhabi, UAE
Joachim Posegga, University of Passau, Germany
Christian Probst, Technical University of Denmark, Denmark
Kai Rannenberg, Goeth University, Germany
Awais Rashid, Lancaster University, UK
Indrajiti Ray, Colorado State University, USA
Kui Ren, State University of New York at Buffalo, USA
Mark Ryan, University of Birmingham, UK
Peter Y.A. Ryan, University of Luxembourg, Luxembourg
Rene Rydhof Hansen, Aarhus University, Denmark
Andrei Sabelfeld, Chalmers University of Technology, Sweden
Rei Safavi-Naini, University of Calgary, Canada
Pierangela Samarati, Universitá degli studi di Milano, Italy
Ravi Sandhu, University of Texas at San Antonio, USA
Ralf Sasse, ETH Zürich, Switzerland
Nitesh Saxena, University of Alabama at Birmingham, USA
Andreas Schaad, Huawei European Research Center, Germany
Steve Schneider, University of Surrey, UK
Basit Shafiq, Lahore University of Management Sciences, Pakistan
Einar Snekkenes, Norwegian University of Science and Technology, Norway
Willy Susilo, University of Wollongong, Australia
Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Björn Tackmann, IBM Research, Switzerland
Qiang Tang, New Jersey Institute of Technology, USA
Nils Ole Tippenhauer, Singapore University of Technology and Design,
Singapore
jaideep Tsochou, Ionion University, Greece
Vijay Varadharajan, Macquarie University, Australia
Luca Viganò, King's College London, UK
Michael Waidner, Fraunhofer SIT & TU Darmstadt, Germany
Cong Wang, City University of Hong Kong, China
Ben Smyth, Huawei, France
Edgar Weippl, SBA Research, Austria
Stephen Wolthusen, Royal Holloway university, UK
Christos Xenakis, University of Piraeus, Greece
Jeff Yan, Lancaster University, UK
Meng Yu, University of Texas at San Antonio, USA
Ben Zhao, University of California at Santa Barbara, USA
Jianying Zhou, Singapore University of Technology and Design, Singapore
Jörg Schwenk, Ruhr-Universität, Bochum
Publicity Chair
* Cristina Alcaraz, University of Malaga, Spain
The 2017 IEEE/ACM International Conference on Advances in Social Networks
Analysis and Mining
ASONAM 2017
Sydney, Australia
31 July -03 August 2017
http://asonam.cpsc.ucalgary.ca
Call for Papers
The study of social networks originated in the social science,
anthropology, and business communities. In recent years, social network
research has advanced significantly; the development of advanced techniques
for Social Network Analysis and Mining (SNAM) has been highly influenced by
the internet, the social web, and other large-scale, socio-technical
infrastructures, which are widely analyzed using graph theory, statistics,
and data mining and machine learning techniques. People perceive the Web
increasingly as a social medium that fosters interaction among people,
sharing of experiences and knowledge, group activities, and community
formation and evolution. These trends have led to a rising prominence of
SNAM in academia, politics, homeland security, and business.
The international conference on Advances in Social Network Analysis and
Mining (ASONAM 2017) will primarily provide an interdisciplinary venue that
will bring together practitioners and researchers from a variety of SNAM
fields to promote collaborations and exchange of ideas and practices.
ASONAM 2017 is intended to address important aspects with a specific focus
on the emerging trends and industry needs associated with social networking
analysis and mining. The conference solicits experimental and theoretical
works reporting original and unpublished research results on social network
analysis and mining along with their application to real life situations.
More specialized topics within ASONAM 2017 include, but are not limited to:
- Accuracy of network data at scale
- Analysis of covert networks, Dark Web
- Anomaly detection in social network evolution
- Application of social network analysis and mining
- Community discovery and analysis in large scale online/offline social
networks
- Computational simulations and modeling
- Crowd sourcing of network data generation and collection
- Cyber anthropology
- Data models for social networks and social media
- Economics of transactions in networks
- Ethics, privacy and security with network data collection and analysis
- Evolution of communities/patterns on the Web and in large organizations
- Impact of social networks on recommendations systems
- Incorporating social information in query processing and query
optimization
- Influence of cultural aspects on the formation of communities
- Information acquisition and establishment of social relations
- Information diffusion
- Large-scale graph algorithms for social network analysis
- Migration between communities
- Misbehavior detection in communities
- Multi-actor/multiple-relationship networks
- Network formation and evolution
- Network visualization
- Open source intelligence
- Pattern presentation for end-users and experts
- Personalization for search and for social interaction
- Political impact of social network discovery
- Privacy and security of social networks
- Scalability of social networking/search algorithms
- Social and cultural anthropology
- Social geography and spatial networks
- Statistical modeling of large networks
- Trust in networks
To fully embrace the fast-growing and vigorously dynamic trend of social
networks and applications, ASONAM 2017 is eager to consider any
breakthroughs in social network analysis and mining in the broadest
possible sense.
General areas of interest to ASONAM 2017 include information science and
mathematics, communication studies, business and organizational studies,
sociology, psychology, anthropology, applied linguistics, biology and
medicine.
Submission
The papers will be reviewed and assessed by the program committee. Full
paper manuscripts must be in English with a length of 8 pages using the
IEEE two-column template. We solicit also short paper with a maximum length
of 4 pages. Submissions should include the title, author(s),
affiliation(s), e-mail address(es), and abstract on the first page.
EasyChair submission link: https://easychair.org/co
nferences/?conf=asonam2017
Papers will be accepted for the conference based on the reviewers' comments
on their originality, timeliness, significance, relevance, and clarity of
presentation. A Best Paper Award ceremony will be organized at the banquet.
If the paper is accepted, the paper will appear in the proceedings of the
conference if one author presents the paper at the conference and at least
one author registers as a full conference participant.
Publications
Accepted and presented papers will be included in the ASONAM 2017
Conference Proceedings and forwarded for inclusion in IEEE Computer Society
Digital Library (CSDL), IEEE eXplore, and the ACM Digital Library. The
conference proceedings will be submitted for El indexing through INSPEC by
the IEEE.
If you have any questions on ASONAM 2017, please send email to asonam2017
(AT) gmail (dot) com.
Key Dates
Paper submission deadline
March 17, 2017 11:59 PM American Samoa Zone (UTC-11)
Notification of acceptance
May 12, 2017
Camera-ready papers due
June 23, 2017 11:59 PM American Samoa Zone (UTC-11)
Conference events
31 July - 03 August, 2017
We apologize if you receive multiple copies of this CFPs.
We appreciate your help to forward this CFPs to your friends & email lists.
================================================
The 10th IFIP Wireless and Mobile Networking Conference, September 25-27, 2017, Valencia (Spain) -- WMNC 2017: http://jlloret.webs.upv.es/wmnc2017/
SUBMISSION DEADLINE: May 1st, 2017
SUBMISSION LINK: http://edas.info/newPaper.php?c=21553
===============================================
CALL FOR PAPERS
=================================================
The 10th IFIP Wireless and Mobile Networking Conference will be held in Valencia, Spain from September 25 to September 27, 2016. WMNC 2017 provides a forum for discussion for researchers, practitioners and students interested in new developments in mobile and wireless networks, services, applications and mobile computing. WMNC combines PWC (Personal Wireless Communications conference), MWCN (Mobile and Wireless Communication Networks conference), and WSAN (Wireless Sensors and Actor Networks conference) into one event.
Accepted and presented papers will be published in the conference proceedings and will be indexed in IEEEXplore. Authors of papers of special merit will be invited to send their extended versions to a Special Issue organized for this purpose in International Journals indexed in ISI Thomson and Scopus databases.
Network Protocols and Algorithms (S.I.: Special Issue on Wireless and Mobile Networking)
Link: http://www.macrothink.org/journal/index.php/npa
Indexed is several Databases, incluided in DBLP.
Sensors (S.I.: Special Issue on Smart Communication Protocols and Algorithms for Sensor Networks)
Link: http://www.mdpi.com/journal/sensors/special_issues/Smart_Communication_Prot…
Indexed in ISI Thomson and several Databases.
I.F.: 2.033 (2015). Q1
TOPICS
=================================================
Authors are invited to submit full papers (up to 8 pages, double column) according to the guidelines available on the conference website at Authors Guidelines (http://jlloret.webs.upv.es/wmnc2017/sub_gui.html) . WMNC 2017 includes three tacks focusing on (but not limited to) the following topics:
Track 1: Wireless and Mobile Communications and Networks 5G Networks, Wireless technologies design and evaluation, Handoff management, Location management, Resource management, Network and service management and control, Energy management and efficiency of protocols and devices, Cognitive radio networking, Device, to, device communications, Routing and scheduling in mobile and wireless networks, Transport layer issues in mobile and wireless networks, Network security solutions and protocols, Subscriber privacy, Authentication, Authorization, Accounting, Traffic and network modeling, Analysis, and simulation in wireless/mobile networks, Virtualized and cloud, based wireless.
Track 2: Wireless Sensor and Actor Networks, Ad hoc and Opportunistic Networks, Vehicular Networks Cyber-Physical, Systems, Machine to Machine communications (M2M), Communication Technologies for the IoT, Ad-Hoc networking, Delay tolerant networking, Cross, layer design and optimization, In-network processing and aggregation of information, Energy, efficient protocols and power management, Localization and tracking, Middleware for WSN and M2M, Self, organization and reconfiguration, Security for WSN and M2M, Multimedia communications in WSN, Vehicular networks, Robots as actor networks, Nano networks, Fog Networking.
Track 3: Applications and Services over Wireless and Mobile Networks Wireless multimedia networking, Mobile cloud computing and applications, Multicasting and broadcasting issues, Multimedia session signalling in wireless/mobile environments, Digital radio and TV broadcasting, Mobile computing, Protocols and platforms for convergence, QoS and QoE in wireless/mobile networks, Mobile and wireless applications: health, environmental protection, Wireless Internet applications, ITS (Intelligent transportation systems), Infotainment, pervasive systems, RFID, Location, based services, Mobile services, Content management and distribution, Context, aware wireless multimedia applications, Context-aware services, Information centric networking, Social networking.
WMNC'2017 technical program committee invites authors to submit manuscripts with original research results that have not been previously published or that are not currently under review by another conference or journal. The following contributions are welcome:
(i) Research papers reporting on new trends and developments,
(ii) Application papers reporting on academia developments of technologies, products, services, systems and solutions,
(iii) Performance evaluation and experimentation papers,
(iv) Industry practice papers.
PAPER SUBMISSION
=================================================
Submissions will be judged based on originality, significance, clarity, relevance, and correctness. All submitted papers will be subject to peer reviews by Technical Program Committee members and other experts in the field. Papers presented at the symposium will be considered for a Best Paper Award.
Authors can submit original technical papers, using the EDAS link:
http://edas.info/newPaper.php?c=21553
The submission system will present an entry form to allow you to enter the paper title, abstract text, author contact information and subject areas. For each paper, it is requested to enter ONE conference track.
ALL authors must be entered in the EDAS submission form, and must appear in the same order in which the authors appear on the PDF.
IMPORTANT DATES
=================================================
Full paper registration: April 24, 2017
Full paper submission: May 1, 2017
Notification of acceptance: June 1, 2017
Camera ready submission: July 1, 2017
ORGANIZING COMMITTEE
=================================================
General Chair:
Jaime Lloret, Universidad Politecnica de Valencia, Spain
Program Chairs:
Mohammed Atiquzzaman, University of Oklahoma, USA
Lei Shu, Guangdong University of Petrochemical Technology, China
Special Issue Chair:
Guangjie Han, Hohai University, China
Keynote Speaker & Tutorial Chair:
Francisco Falcone, Universidad Publica de Navarra, Spain
Workshops Chair:
Joel Rodrigues, National Institute of Telecommunications (Inatel), Brazil; Instituto de Telecomunica��es, UBI, Portugal
Industry Chair:
Antonio Sanchez, Telefonica, Spain
Web Chair:
Alejandro Canovas, Universidad Politecnica de Valencia, Spain
Publicity Chairs:
Sandra Sendra, Universidad de Granada, Spain
Sofiane Hamrioui, University of Haute Alsace, France
Submission Chairs:
Jose M. Jimenez, Universidad Politecnica de Valencia, Spain
Lorena Parra, Universidad Politecnica de Valencia, Spain
Local Organization:
Juan R. Diaz, Universidad Politecnica de Valencia, Spain
Oscar Romero, Universidad Politecnica de Valencia, Spain
STEERING COMMITTEE
=================================================
Adam Wolisz, Technische Universitat Berlin, Germany
Edmundo Monteiro, Coimbra University, Portugal
George C. Polyzos, Athens University of Economics and Business, Greece
Giuseppe Bianchi, Universita degli Studi di Roma - Tor Vergata, Italy
Guy Pujolle, Pierre et Marie Curie University Paris 6, France
Jozef Wozniak (SC Chair), Gdansk University of Technology, Poland
Mario Gerla, UCLA Computer Science Department, US
Pedro Cuenca, Universidad de Castilla-La Mancha, Spain
Robert Bestak, Czech Technical University, Czehc Republic
Zoubir Mammeri, Paul Sabatier University, France
Hannes Frey, University of Koblenz-Landau, Germany
Pascal Lorenz, University of Haute Alsace, France
For more information, visit the conference website: http://jlloret.webs.upv.es/wmnc2017/
=================================================
*Call for Papers*
*2017 IEEE International Conference on Big Data (IEEE Big Data 2017)*
http://cci.drexel.edu/bigdata/bigdata2017/
December 11-14, 2017, Boston, MA, USA
In recent years, “Big Data” has become a new ubiquitous term. Big Data is
transforming science, engineering, medicine, healthcare, finance, business,
and ultimately our society itself. The IEEE Big Data conference series
started in 2013 has established itself as the top tier research conference
in Big Data.
· The first conference IEEE Big Data 2013 had more than 400
registered participants from 40 countries (
http://cci.drexel.edu/bigdata/bigdata2013/) and the regular paper
acceptance rate is 17.0%.
· The IEEE Big Data 2016 ( http://cci.drexel.edu/bigdata/bigdata2016/ ,
regular paper acceptance rate: 18.7%) was held in Washington DC, Dec 5-8,
2016 with close to 900 registered participants from 43 countries.
The 2017 IEEE International Conference on Big Data (IEEE Big Data 2017)
will continue the success of the previous IEEE Big Data conferences. It
will provide a leading forum for disseminating the latest results in Big
Data Research, Development, and Applications.
We solicit high-quality original research papers (and significant
work-in-progress papers) in any aspect of Big Data with emphasis on 5Vs
(Volume, Velocity, Variety, Value and Veracity), including the Big Data
challenges in scientific and engineering, social, sensor/IoT/IoE, and
multimedia (audio, video, image, etc.) big data systems and
applications. *Example
topics of interest includes but is not limited to the following*:
1. Big Data Science and Foundations
a. Novel Theoretical Models for Big Data
b. New Computational Models for Big Data
c. Data and Information Quality for Big Data
d. New Data Standards
2. Big Data Infrastructure
a. Cloud/Grid/Stream Computing for Big Data
b. High Performance/Parallel Computing Platforms for Big Data
c. Autonomic Computing and Cyber-infrastructure, System Architectures,
Design and Deployment
d. Energy-efficient Computing for Big Data
e. Programming Models and Environments for Cluster, Cloud, and Grid
Computing to Support Big Data
f. Software Techniques and Architectures in Cloud/Grid/Stream Computing
g. Big Data Open Platforms
h. New Programming Models for Big Data beyond Hadoop/MapReduce, STORM
i. Software Systems to Support Big Data Computing
3. Big Data Management
a. Search and Mining of variety of data including scientific and
engineering, social, sensor/IoT/IoE, and multimedia data
b. Algorithms and Systems for Big DataSearch
c. Distributed, and Peer-to-peer Search
d. Big Data Search Architectures, Scalability and Efficiency
e. Data Acquisition, Integration, Cleaning, and Best Practices
f. Visualization Analytics for Big Data
g. Computational Modeling and Data Integration
h. Large-scale Recommendation Systems and Social Media Systems
i. Cloud/Grid/Stream Data Mining- Big Velocity Data
j. Link and Graph Mining
k. Semantic-based Data Mining and Data Pre-processing
l. Mobility and Big Data
m. Multimedia and Multi-structured Data- Big Variety Data
4. Big Data Search and Mining
a. Social Web Search and Mining
b. Web Search
c. Algorithms and Systems for Big Data Search
d. Distributed, and Peer-to-peer Search
e. Big Data Search Architectures, Scalability and Efficiency
f. Data Acquisition, Integration, Cleaning, and Best Practices
g. Visualization Analytics for Big Data
h. Computational Modeling and Data Integration
i. Large-scale Recommendation Systems and Social Media Systems
j. Cloud/Grid/StreamData Mining- Big Velocity Data
k. Link and Graph Mining
l. Semantic-based Data Mining and Data Pre-processing
m. Mobility and Big Data
n. Multimedia and Multi-structured Data- Big Variety Data
5. Big Data Security, Privacy and Trust
a. Intrusion Detection for Gigabit Networks
b. Anomaly and APT Detection in Very Large Scale Systems
c. High Performance Cryptography
d. Visualizing Large Scale Security Data
e. Threat Detection using Big Data Analytics
f. Privacy Threats of Big Data
g. Privacy Preserving Big Data Collection/Analytics
h. HCI Challenges for Big Data Security & Privacy
i. User Studies for any of the above
j. Sociological Aspects of Big Data Privacy
k. Trust management in IoT and other Big Data Systems
6. Big Data Applications
a. Complex Big Data Applications in Science, Engineering, Medicine,
Healthcare, Finance, Business, Law, Education, Transportation, Retailing,
Telecommunication
b. Big Data Analytics in Small Business Enterprises (SMEs),
c. Big Data Analytics in Government, Public Sector and Society in
General
d. Real-life Case Studies of Value Creation through Big Data Analytics
e. Big Data as a Service
f. Big Data Industry Standards
g. Experiences with Big Data Project Deployments
*INDUSTRIAL Track*
The Industrial Track solicits papers describing implementations of Big Data
solutions relevant to industrial settings. The focus of industry track is
on papers that address the practical, applied, or pragmatic or new research
challenge issues related to the use of Big Data in industry. We accept full
papers (up to 10 pages) and extended abstracts (2-4 pages).
*Student Travel Award*
IEEE Big Data 2017 will offer* student travel *to student authors
(including post-docs)
*Journal Publication *
A set of about 10 papers will be selected for a fast-track review and then
published at the IEEE Transactions on Big Data.
*Paper Submission:*
Please submit a full-length paper (up to *10 page IEEE 2-column format*)
through the online submission system.
https://wi-lab.com/cyberchair/2017/bigdata17/scripts/submit.php?subarea=BigD
Papers should be formatted to IEEE Computer Society Proceedings Manuscript
Formatting Guidelines (see link to "formatting instructions" below).
*Formatting Instructions*
http://www.ieee.org/conferences_events/conferences/publishing/templates.html
*Important Dates:*
Electronic submission of full papers: August 7, 2017
Notification of paper acceptance: Oct 9, 2016
Camera-ready of accepted papers: Nov 10, 2017
Conference: Dec 11-14, 2017
*PC Co-Chairs*
Jian-Yun Nie, University of Montreal, Canada
Zoran Obradovic, Temple University, USA
Toyotaro Suzumura, IBM Research, USA
*Industry and Government Co-Chairs:*
Raghunath Nambiar, CISCO, USA
Ghosh Rumi, BOSCH, USA
Chonggang Wang, InterDigital, IncUSA
Hui Zang, Huawei Research, USA
########################################################################
To unsubscribe from the BIGDATA list, click the following link:
http://lists.drexel.edu/cgi-bin/wa?TICKET=NzM2NDMyIGNvbXB1dGF0aW9uYWwuc2NpZ…
GECCO 2017 Workshop “ Evolutionary Computation in Computational Biology”
http://eccsb2017.irlab.org/
In the last two decades, many computer scientists in Artificial Intelligence have made significant contributions to modeling biological systems as a means of understanding the molecular basis of mechanisms in the healthy and diseased cell. The field of computational biology includes the development and application of data-analytical and theoretical methods, mathematical modeling and computational simulation techniques to the study of biological, behavioral, and social systems. The focus of this workshop is the use of nature-inspired approaches to central problems in computational biology, including optimization methods under the umbrella of evolutionary computation.
Areas of interest include (but are not restricted to):
* Genome and sequence analysis with nature-inspired approaches.
* Computational systems biology.
* Biological network modeling and analysis.
* Use of artificial life models like cellular automata or Lindenmayer systems in the modeling of biological problems.
* Study and analysis of properties of biological systems like self-organization, self-assembled systems, emergent behavior or morphogenesis.
* Hybrid approaches and memetic algorithms in the modeling of computational biology problems.
* Multi-objective approaches in the modeling of computational biology problems.
* Use of natural and evolutionary computation algorithms in protein structure classification and prediction (secondary and tertiary).
* Mapping of protein and peptide energy landscapes.
* Modeling of temporal folding of proteins.
* Protein design.
* Protein-ligand and protein-protein docking.
* Stability and dynamics of biomolecular systems.
* Applications in atomic clusters: Water clusters, Leonard Jones clusters, metal clusters, etc.
* Applications in cellular systems: micelle, single organisms, bacterial cells, etc.
* Applications in stem cell differentiation and development, lineage programming and cell fates.
* Evolutionary search strategies to assist cryo-electron microscopy and other experimental techniques in model building.
* Surrogate models and stochastic approximations of computationally expensive fitness functions of biomolecular systems.
Dates :
Paper submission deadline: April 15 (strict deadline)
Decision notification: April 20
Camera ready articles due: April 24
GECCO 2017 Conference: July 15th-19th 2017, Berlin.
Workshop organizers:
José Santos (University of A Coruña, Spain), santos(a)udc.es
Julia Handl (University of Manchester, UK), j.handl(a)manchester.ac.uk
Amarda Shehu (George Mason University, USA), amarda@ cs.gmu.edu
Mostafa Ellabaan (Technical University of Denmark, Denmark), mostafa.mhashim(a)gmail.com
[Please accept our apologies if you receive multiple copies of this email.]
*************************************************************************************
CNSM 2017
13th International Conference on Network and Service Management
26 - 30 November 2017, Tokyo, Japan
http://www.cnsm-conf.org/2017/
*************************************************************************************
The 13th International Conference on Network and Service Management
(CNSM) is inviting authors to submit original contributions in the network
and service management research area. CNSM 2017 is a selective
single-track conference, covering all aspects of the management of
networks and services, pervasive systems, enterprises, and cloud computing
environments. The core track is accompanied by a series of workshops and
poster sessions.
IMPORTANT DATES
Paper Submission: June 12, 2017
Rebuttal Phase: Aug. 6-12, 2017
Acceptance Notification: Aug. 27, 2017
Camera Ready due: Oct. 7, 2017
Conference: Nov. 26 ? 30, 2017
TOPICS OF INTEREST
Network Management
- Software-defined networks
- Virtual networks
- Overlay networks
- Wireless networks and cellular networks
- Wireless sensor networks
- Internet of Things networks
- Information-centric networks
- Enterprise networks and campus networks
- Data center networks
- Optical networks
- IP networks
- Home networks
- Access networks
- SCADA networks and distributed control systems
- Smart Cities and Smart Grids
Management Paradigms
- Centralized management
- Distributed management
- Hierarchical management
- Federated management
- Autonomic and cognitive management
- Policy-based management
- Pro-active management
- Energy-aware management
- Quality of experience-centric management
Service Management
- Cloud computing services
- Content delivery services
- Multimedia services
- Internet connectivity and Internet access
- Internet of Things services
- Security services
- Context-aware services
- Information technology services
Business Management
- Economic aspects
- Multi-stakeholder aspects
- Service level agreements
- Lifecycle aspects
- Process and workflow aspects
- Legal perspective
- Regulatory perspective
- Privacy aspects
Functional Areas
- Deployment management
- Fault management
- Configuration management
- Accounting management
- Performance management
- Security management
Management Technologies
- Network function virtualization
- Software-defined networking
- Orchestration
- Cloud computing and cloud storage
- Communication protocols
- Middleware
- Data models, information models semantic models
- Operations support systems and business
support systems
- Information visualization Methods
- Mathematical optimization
- Control theory
- Probability theory, stochastic processes, and queuing theory
- Machine learning
- Evolutionary algorithms
- Economic theory and game theory
- Mathematical logic and automated reasoning
- Data mining and (big) data analysis
- Monitoring and measurements
- Computer simulation experiments
- Prototype implementation and testbed experimentation
- Field trials
GENERAL CO-CHAIRS
- Yoshiaki Tanaka, Waseda Univ., Japan
- Yoshiaki Kiriha, The Univ. of Tokyo, Japan
VICE CHAIR
- Shingo Ata, Osaka City Univ., Japan
TPC CO-CHAIRS
- Carol Fung, Virginia Commonwealth Univ., USA
- Kazuhiko Kinoshita, Tokushima Univ., Japan
- Steven Latré, Univ. of Antwerp - imec, Belgium
**ISDDC 2017 *International Conference onIntelligent,Secure
andDependable Systems inDistributed andCloud Environments, **October
25-27, 2017*, Vancouver, BC, Canada.
Proceedings published in Springer LNCS
*(Submissions due June 10 2017)*
This conference solicits papers addressing issues related to the design,
analysis, and implementation, of dependable and secure infrastructures,
systems, architectures, algorithms, and protocols that deal with network
computing, mobile/ubiquitous systems, cloud systems, and IoT systems.
We invite papers on the following topics:
- Intelligent secure mobile systems
- Modern and Emerging Authentication Paradigms
- Digital Fraud detection, social engineering and insider threats
- Cyber threat intelligence
- Privacy, Security and Trust for Cloud, Mobile, and Internet-of-Things
security
- Digital forensics, Intrusion Detection, and Biometrics
- Emerging Threats, Botnet and Distributed Denial of Service (DDoS)
detection and control
- Dependable Cluster/cloud/ubiquitous computing and grid Computing for
mobile applications
- Dependable Distributed data mining for mobile applications
- Secure Ubiquitous Knowledge Discovery
- Applications such as cooperative mobile robots, opportunistic networks
- Cryptographic primitives for wireless and mobile security
- Security and privacy for mobile sensing systems
- Wireless or mobile security for emerging applications
- Security protocols for wireless networking
- Mobile malware and platform security
- Distributed Systems Security
- Embedded Systems Security
- Security architectures for cloud computing
- Security protocols for cloud computing
- Privacy-preserving data mining for clouds
- Identity management for cloud services
- Information sharing and data protection in the cloud
- Trust models for cloud services
- Security and Privacy of the Internet of Things
- Hardware security
- Secure computer architectures
- Embedded systems security
- Methods for detection of malicious or counterfeit hardware
- Mobile systems security
- Distributed systems security
- Intrusion and anomaly detection and prevention for mobile, cloud and
IOT platforms
**
For more information, please visit
http://www.scs.ryerson.ca/iwoungan/ISDDC17/.
===========================================================================
IEEE Transactions on Network and Service Management
Special Issue on Advances in Big Data Analytics for Management
http://www.comsoc.org/tnsm/cfp/si-bdm
(Submissions due: 3 May 2017)
===========================================================================
Cloud and network analytics can harness the immense stream of
operational data from clouds and networks, and can perform analytics
processing to improve reliability, configuration, performance, and
security management. In particular, we see a growing trend towards
using statistical analysis and machine learning to improve operations
and management of IT systems and networks.
Research is therefore needed to understand and improve the potential
and suitability of Big Data analytics in the context of systems and
network management. This will not only provide deeper understanding
and better decision making based on largely collected and available
operational data, but present opportunities for improving data
analysis algorithms and methods on aspects such as accuracy and
scalability. Moreover, there is an opportunity to define novel
platforms that can harness the vast operational data and advanced data
analysis algorithms to drive management decisions in networks, data
centers, and clouds.
IEEE Transactions on Network and Service Management (IEEE TNSM) is a
premier journal for timely publication of archival research on the
management of networks, systems, services and applications. Following
the success of TNSM special issue on Big Data Analytics for Management
(September 2016), this special issue of TNSM will focus on "Advances
in Big Data Analytics for Management," presenting recent, emerging
approaches and technical solutions that can exploit Big Data and
analytics in management solutions. We welcome submissions addressing
the underlying challenges of Big Data Analytics for Management and
presenting novel theoretical or experimentation results. Survey papers
that offer a perspective on related work and identify key challenges
for future research will be considered as well.
-----------------------------------------------------------------------
Topics of Interest
Topics of interest for this special issue include, but are not
limited, to the following:
Big Data Analytics and Machine Learning
- Analysis, modelling and visualization
- Operational analytics and intelligence
- Event and log analytics
- Anomaly detection and prediction
- Monitoring and measurements for management
- Harnessing social data for management
- Predictive analytics and real-time analytics
- Data mining, statistical modeling, and machine learning for management
Application Domains and Management Paradigms
- Cloud and network analytics
- Data centric management of virtualized infrastructure, clouds and data
centers
- Data centric management of storage resources and software defined
networks
- Data centric management of Internet of Things and cyber-physical systems
- Platforms for analyzing and storing logs and operational data for
management tasks
- Applications of Big data analytics to traffic classification,
root-cause analysis, service quality assurance, IT service and
resource management
- Analytics and machine learning applications to cyber-security,
intrusion detection, threat analysis, and failure detection
-----------------------------------------------------------------------
Paper Submission
All papers should be submitted through the IEEE Transactions on
Network and Service Management manuscript submission site at
https://mc.manuscriptcentral.com/tnsm. Authors must indicate in the
submission cover letter that their manuscript is intended for the
"Advances in Big Data Analytics for Management" special issue. Each
submission will be limited to 14 pages in IEEE 2-column format.
Detailed author guidelines can be found at
http://www.comsoc.org/tnsm/author-guidelines.
-----------------------------------------------------------------------
Important Dates
Submission Deadline: May 3, 2017
Author Notification: July 15, 2017
Revision Deadline: September 15, 2017
Final Decision: November 1, 2017
Camera Ready: December 1, 2017
Publication: March 2018
-----------------------------------------------------------------------
Guest Editors
Giuliano Casale (Imperial College London, UK)
Yixin Diao (IBM T. J. Watson Research Center, USA)
Marco Mellia (Politecnico di Torino, Italy)
Rajiv Ranjan (Newcastle University, UK)
Nur Zincir-Heyood (Dalhousie University, Canada)
Albert Zomaya (University of Sydney, Australia)
For more information, please contact the guest editors at
TNSM.SI.BDM(a)gmail.com.