[Apologies if you receive this more than once]
Please forward this CFP to anyone who might be interested.
#######################################################################
Call for Proposals for Special Sessions and Workshops
**************extended, firm Deadline till 12.3.2017****************
IEEE/WIC/ACM International Conference on Web Intelligence 2017 (WI'17)
August 23-26, 2017, Leipzig, Germany
Conference Website: http://webintelligence2017.com/
#######################################################################
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
SPONSORS
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Association for Computing Machinery (ACM)
IEEE Computer Society
Web Intelligence Consortium (WIC)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
IMPORTANT DATES
+++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Workshop and Special session proposal submission:Mar. 12, 2017
Notification of Workshop/Special session acceptance:Mar. 15, 2017
Submission of Workshop/Special session papers:May 22, 2017
Notification of Workshop/Special session paper acceptance: June 29, 2017
Camera-Ready Papers (Workshops and Special sessions)Jul. 17, 2017
Main conference:Aug. 23-26, 2017
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
AIMS AND SCOPE
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Special session and Workshop proposals are invited to the 2017 Web
Intelligence conference to be held in Leipzig, Germany, on August 23-26,
2018. Their objective is to complement the regular program with specific
or emerging topics that are of particular interest to the Web
Intelligence community and, in case of Workshops, to provide a forum for
intense and deep-going discussions. Special Session and Workshop
proposals need to address topics that do not pertain to well-established
tracks of WI. They may, however, cut across and beyond disciplines
traditionally represented at WI conferences.
Special Sessions
----------------
Typically, each Special Session comprises at least 3 regular
presentations, or 5 short ones, or an adequate mixture of these. The
first paper in a Special Session may serve as an introduction to the
field, aimed at listeners, who are not experts in the field yet and,
therefore, could also be an overview paper. An organizer should not
contribute with more than one paper.
Workshops
---------
The purpose of the CP workshops is to provide a more informal venue in
which participants can:
* explore specific research areas in depth,
* discuss new research directions,
* study specific application areas of Web Intelligence, or
* bring together researchers from different areas with shared interests.
How is a proposal meant to look like?
-------------------------------------
Prospective organizers of Special Sessions or Workshops (called events
in the following) should submit proposals indicating:
1. Title and acronym of the event
2. Duration (in half-day steps) -for Workshops only
3. Description of the event topic, and a draft version of CFP (not
exceeding 500 words)
4. Short description on how the organizers plan to attract quality
submissions (CfP spreading?)
5. Preliminary list of invited speakers (if already available)
6. Past records (if any)
7. Short bio of the organizers
8. Tentative program committee (if already available)
9. Contact information of the organizers (including name, affiliation,
mailing address, and e-mail address)
Evaluation of Proposals:
------------------------
Special session and Workshop proposals will be evaluated based on the
timeliness of the topic, its uniqueness, the qualifications of the
proposers and their experience. The proposers are expected to have at
least a PhD degree and a good publication track record in the proposed
area. A tentative accept/reject decision on the proposal will be sent to
the proposers within a short period after its receipt by the Special
Sessions and Workshop Chairs. Accepted special sessions and Workshops
will be listed on the website. However, it may be that we suggest that
an accepted proposal shall be combined with a similar proposal to avoid
multiple Special Sessions or Workshops on a similar topic. A final
decision will be made two weeks after the special session proposal
deadline. High quality outcomes (papers) of these events may be
considered for publication in a journal (e.g., Web Intelligence journal
(IOS Press,
www.iospress.nl/journal/web-intelligence-and-agent-systems/), or the
Multiagent and Grid Systems journal (IOS Press,
http://www.iospress.nl/journal/multiagent-and-grid-systems/).
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
PROPOSAL SUBMISSION
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Proposals are to be send by Email to:
WSChair(a)webintelligence2017.com
For further information either visit the WI 2017 homepage (see above) or
contact any of the Special session and Workshop chairs (see below).
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Workshop and Special Session Chairs:
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Agata Filipowska, Poznan University of Economics, Poland,
Agata.Filipowska(a)ue.poznan.pl
Omar Hussain, UNSW Canberra, Australia, o.hussain(a)adfa.edu.au
Juan D. Velasquez, University of Chile, Chile, jvelasqu(a)dii.uchile.cl
Yiqiang Chen, Chinese Academy of Sciences, Beijing, yqchen(a)ict.ac.cn
Olaf Reinhold, Leipzig University, Germany, reinhold(a)wifa.uni-leipzig.de
--
“Experience is this valuable asset which allows us to identify the
mistake immediately when we are doing it again and again!”
“Erfahrung ist jener kostbare Besitz, der uns befähigt, einen Fehler
sofort zu erkennen, wenn wir ihn immer wieder machen.”
**************************************************************************
Prof. Dr. Rainer Unland
University of Duisburg-Essen
Institute for Computer Science and Business Information Systems (ICB)
Practical Computer Science, especially Data Management Systems and
Knowledge Representation
Schuetzenbahn 70
45117 Essen, Germany
Tel.: (+49) 201-183 3421
IP-Tel. Skype: unlandr Fax: (+49) 201-183 4460
Email: Rainer.Unland at icb.uni-due.de
WWW: http://www.dawis.wiwi.uni-due.de/
***************************************************************************
*CALL FOR PAPERS*
*8th International Workshop on*
*Biological **Knowledge Discovery from Data **(BIOKDD'17)*
Held in parallel with
*28th International Conference on Database and *
*Expert Systems Applications **(**DEXA’17**)*
*www.dexa.org/biokdd2017 <http://www.dexa.org/biokdd2017>*
Lyon, France
August 28 - 31, 2017
In the recent years, there has been a rapid development of biological
technologies producing more and more *biological data*, i.e., data related
to biological macromolecules (DNA, RNA and proteins). The rise of *Next
Generation Sequencing* (NGS) technologies, also known as *high-throughput
sequencing* technologies, has contributed actively to the deluge of these
data. In general, these data are big, heterogeneous, complex, and distributed
in all over the world in databases. Analyzing this huge volume of data is a
challenging task, not only, because of its complexity and its multiple and
numerous correlated factors, but also, because of the continuous evolution
of our understanding of the biological mechanisms. Classical approaches of
biological data analysis are no longer efficient and produce only a very
limited amount of information, compared to the numerous and complex
biological mechanisms under study. From here comes the necessity to use
computer tools and develop new *in silico* high performance approaches to
support us in the analysis of biological data and, hence, to help us in our
understanding of the correlations that exist between, on one hand,
structures and functional patterns in biological macromolecules and, on the
other hand, genetic and biochemical mechanisms. *Biological **Knowledge
Discovery from Data* (BIOKDD) is a response to these new trends.
Topics of BIOKDD’17 workshop include, but not limited to:
*Data Preprocessing: *Biological Data Storage*, *Representation and Management
(data warehouses, databases, sequences, trees, graphs, biological networks
and pathways, …), Biological Data Cleaning (errors removal, redundant data
removal, completion of missing data, …), Feature Extraction (motifs, subgraphs,
…), Feature Selection (filter approaches, wrapper approaches, hybrid
approaches, embedded approaches, …).
*Data Mining: *Biological Data Regression (regression of biological
sequences, …), Biological Data Clustering/Biclustering (microarray data
biclustering, clustering/biclustering of biological sequences, …),
Biological Data Classification (classification of biological
sequences, …), Association
Rules Learning from Biological Data, Text Mining and Application to
Biological Sequences, Web Mining and Application to Biological Data,
Parallel, Cloud and Grid Computing for Biological Data Mining.
*Data Postprocessing:* Biological Nuggets of Knowledge Filtering,
Biological Nuggets of Knowledge Representation and Visualization,
Biological Nuggets of Knowledge Evaluation (calculation of the
classification error rate, evaluation of the association rules *via*
numerical indicators, e.g. *measurements of interest*, … ), Biological
Nuggets of Knowledge Integration.
*PAPER SUBMISSION DETAILS: *
Authors are invited to submit electronically original contributions in
English. Submitted papers should not exceed 5 pages in IEEE CSP
format *http://www.computer.org/portal/web/cscps/formatting
<http://www.computer.org/portal/web/cscps/formatting>*. All accepted papers
will be published in the proceedings of DEXA’17 Workshops with IEEE CSP*. *One
of the authors of an accepted paper must register to DEXA’17 conference and
present the paper at BIOKDD’17 workshop. For paper registration and
electronic submission see http://confdriver.ifs.tuwien.ac.at/dexa2017/
starting from January 2017.
*IMPORTANT DATES:* Submission of abstracts: March 11, 2017
Submission of full papers: March 18, 2017
Notification of acceptance: May 17, 2017
Camera-ready copies due: June 07, 2017
*PROGRAM COMMITTEE:*
Mourad Elloumi, LaTICE, University of Tunis, Tunisia (PC Chair)
Emanuel Weitschek, Uninetuno University, Rome, Italy
Daisuke Kihara, Purdue University, West Lafayette, USA
Bhaskar DasGupta, University of Illinois at Chicago, Chicago, USA
Giuseppe Lancia, University of Udine, Italy
Dominique Lavenier, GenScale, IRISA-CNRS, Rennes, France
Robert Harrison, Georgia State University, Atlanta, Georgia, USA
Hasan Davulcu, Arizona State University, Arizona, USA
Vladimir Makarenkov, University of Québec, Montréal, Canada
Ronnie Alves, Instituto Tecnológico Vale D.S, Belém, Brasil
Paul Yoo, Bournemouth University, UK
Davide Verzzotto, Genome Institute of Singapore, Singapore
Matteo Comin, University of Padova, Padova, Italy
Adrien Goëffon, University of Angers, France
Tolga Can, Middle East Technical University, Ankara, Turkey
Hasan Oğul, Başkent University Ankara, Turkey
Maad Shatnawi, Higher colleges of Technology, Abu Dhabi, UAE
Evangelos Theodoridis, Intel Labs Europe, London, UK.
Manoj Kumar Shukla, Amity School of Engineering, Amity University, Noida,
India
Abdelouahid Lyhyaoui, University Abdelmalek Essaadi, Tangier, Morocco
Gaurav Kumar, Virginia Commonwealth University, Richmond, USA
Giosuè Lo Bosco, University of Palermo, Italy
Yongchao Liu, Georgia Institute of Technology, Georgia, USA
Zina M. Ibrahim, King’s College, London, UK
***
** Call for Participation ***
22nd ACM International Conference on Intelligent User Interfaces
IUI 2017
St. Raphael Resort, Limassol, Cyprus
March 13-16, 2017
http://www.cs.ucy.ac.cy/~george/lm/lm.php?tk=Y29tcHV0YXRpb25hbC5zY2llbmNlCQ…
ACM IUI 2017 is the 22nd annual meeting of the intelligent interfaces
community and serves as a premier international forum for reporting
outstanding research and development on intelligent user interfaces.
ACM IUI is where the Human-Computer Interaction (HCI) community meets
the Artificial Intelligence (AI), with contributions from related fields such as
psychology, behavioral science, cognitive science, computer graphics, design
or the arts. Our focus is to improve the interaction between humans and
machines, by leveraging both more traditional HCI approaches, as well as
solutions that involve state-of-the art AI techniques such as machine
learning, natural language processing, data mining, knowledge
representation and reasoning. ACM IUI welcomes contribution from any
relevant arena: academia, business, or non-profit organizations.
The conference brings together people from academia, industry and
non-profit organizations and gives its participants the opportunity to present
and see cutting-edge IUI work in a focused and interactive setting. It is large
enough to be diverse and lively, but small enough to allow for extensive
interaction among attendees and easy attendance to the events that the
conference offers, ranging from oral paper presentations, poster sessions,
workshops, panels and doctoral consortium for graduate students.
The 22nd edition of the conference will be held in Limassol, Cyprus.
Limassol (or Lemesos) is a multicultural bustling town, flanked by two
ancient cities, Amathus and Kourion, and guarded by the Amathusian
Aphrodite and Appolo Hylates. It is a town of great visual diversity and
contrast from spectacular seafront views, historic places like the mediaeval
Castle, and Byzantine churches. Along the 17 km long sandy beaches, two
Marinas, world renowned 5 star hotels, and a most exciting dining, shopping,
nightlife and yachting scene create a year-round vibrant lifestyle well beyond
the expectations of a Mediterranean island.
The conference venue is the well known 5* beach hotel St. Raphael Resort,
situated on one of the largest Blue Flag accredited beaches, only a short
coastal drive from the lively centre of town, approximately 10 minutes away
(http://www.raphael.com.cy). The Larnaca International Airport is 35 minutes
away, and Paphos International Airport is 55 minutes away. There are shops,
restaurants and bars within walking distance and a bus stop exactly outside
the hotel. The conference organizers have secured very competitive rates for
accommodation, both at the venue hotel as well as a number of other hotels
at close distance (http://www.cs.ucy.ac.cy/~george/lm/lm.php?tk=Y29tcHV0YXRpb25hbC5zY2llbmNlCQ…). In
addition, the conference organization offers airport transfers to and from the
hotels at very reasonable prices.
This year IUI attracted an overwhelming number of submissions for all types
of contributions (papers, posters, demos, etc.). The list of accepted
contributions can be found here: http://www.cs.ucy.ac.cy/~george/lm/lm.php?tk=Y29tcHV0YXRpb25hbC5zY2llbmNlCQ… .
The program will consist of paper presentations, posters and demos sessions,
a Student Consortium and several workshops and tutorials. This exciting
program will be further enhanced with 3 keynotes by the Distinguisheed
ACM Speaker Panos Markopoulos (Eindhoven University of Technology),
George Samaras (University of Cyprus) and Shumin Zhai (Google). The
technical program will be complemented with a rich social program, including
a welcome reception and a conference dinner at a local traditional Greek
taverna with live entertainment.
We cordially invite you to attend IUI 2017 and the co-located workshops
and tutorials. Registration is open (http://www.cs.ucy.ac.cy/~george/lm/lm.php?tk=Y29tcHV0YXRpb25hbC5zY2llbmNlCQ…).
Committees
General Chairs
· Tsvika Kuflik, University of Haifa, Israel
· George A. Papadopoulos, University of Cyprus, Cyprus
Program Committee Chairs
· Fang Chen, NICTA, Australia
· Carlos Duarte, University of Lisbon, Portugal
· Wai-Tat Fu, University of Illinois at Urbana-Champaign, USA
Program Committee
http://www.cs.ucy.ac.cy/~george/lm/lm.php?tk=Y29tcHV0YXRpb25hbC5zY2llbmNlCQ…
Posters/Demos Chairs
· Andrina Granic, University of Split, Croatia
· Denis Parra. PUC, Chile
· Jingtaw Wang, University of Pittsburgh, USA
Workshops/Tutorials Chairs
· Shlomo Berkovsky, CSIRO, Australia
· Bart Kninijnburg, Clemson University, USA
Student Consortium Chairs
· Peter Brusilovsky, University of Pittsburgh, USA
· Katrien Verbert, KULeuven, Belgium
Student Volunteers Chairs
· Christos Mettouris, University of Cyprus, Cyprus
· Tobias Grosse-Puppendahl, Microsoft Research, UK
· Julia Sheidin, University of Haifa, Israel
Sponsorship Chairs
· Daniel Sonntag, DFKI, Germany (for Europe)
· Feng Tian, Institute of Software Chinese Academy of Sciences, China (for Asia)
Treasurer
· George A. Papadopoulos, University of Cyprus, Cyprus
Proceedings Chair
· Daniel Afergan, Google, USA
Web Master
· Marios Christou, Easy Conferences, Cyprus
· Kyriakos Georgiades, Easy Conferences, Cyprus
CALL FOR PAPERS - GraMSec 2017
The Fourth International Workshop on Graphical Models for Security
Santa Barbara, CA, USA - August 21, 2017
http://gramsec.uni.lu
Co-located with CSF 2017
SCOPE
Graphical security models provide an intuitive but systematic approach
to analyze security weaknesses of systems and to evaluate potential
protection measures. Cyber security researchers, as well as security
professionals from industry and government, have proposed various
graphical security modeling schemes. Such models are used to capture
different security facets (digital, physical, and social) and address a
range of challenges including vulnerability assessment, risk analysis,
defense analysis, automated defensing, secure services composition,
policy validation and verification. The objective of the GraMSec
workshop is to contribute to the development of well-founded graphical
security models, efficient algorithms for their analysis, as well as
methodologies for their practical usage.
TOPICS
The workshop seeks submissions from academia, industry, and government
presenting novel research on all theoretical and practical aspects of
graphical models for security. The topics of the workshop include, but
are not limited to:
• Graphical models for threat modeling and analysis
• Graphical models for risk analysis and management
• Graphical models for requirements analysis and management
• Textual and graphical representation for system, organizational, and
business security
• Visual security modeling and analysis of socio-technical and
cyber-physical systems
• Graphical security modeling for cyber situational awareness
• Graphical models supporting the security by design paradigm
• Methods for quantitative and qualitative analysis of graphical
security models
• Formal semantics and verification of graphical security models
• Methods for (semi-)automatic generation of graphical security models
• Enhancement and/or optimization of existing graphical security models
• Scalable evaluation of graphical security models
• Evaluation algorithms for graphical security models
• Dynamic update of graphical security models
• Game theoretical approaches to graphical security modeling
• Attack trees, attack graphs and their variants
• Stochastic Petri nets, Markov chains, and Bayesian networks for security
• UML-based models and other graphical modeling approaches for security
• Software tools for graphical security modeling and analysis
• Case studies and experience reports on the use of graphical security
modeling paradigm
INVITED SPEAKER
To be decided.
PAPER SUBMISSION
We solicit two types of submissions:
• Regular papers (up to 15 pages, excluding the bibliography and
well-marked appendices)
describing original and unpublished work within the scope of the workshop.
• Short papers (up to 7 pages, excluding the bibliography and
well-marked appendices)
describing original and unpublished work in progress.
The reviewers are not required to read the appendices, so the papers
should be intelligible without them. All submissions must be prepared
using the LNCS style:
http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0
Each paper will undergo a thorough review process. All accepted (regular
and short) papers will be included in the workshop's post-proceedings.
The GraMSec 2017 post-proceedings will be published in the Lecture Notes
in Computer Science (LNCS) series of Springer. Submissions should be
made using the GraMSec 2017 EasyChair web site:
https://www.easychair.org/conferences/?conf=gramsec17
IMPORTANT DATES
• Submission deadline: Sunday, May 21, 2017
• Acceptance notification: Friday, July 7, 2017
• Workshop: Monday, August 21, 2017
GENERAL CHAIR
• Sjouke Mauw, University of Luxembourg, Luxembourg
PROGRAM CHAIRS
• Peng Liu, Pennsylvania State University, USA
• Ketil Stølen, SINTEF Digital and University of Oslo, Norway
PC MEMBERS
Mathieu Acher, University Rennes 1, Inria, France
Massimiliano Albanese, George Mason University, USA
Ludovic Apvrille, Télécom ParisTech, France
Thomas Bauereiss, DFKI, Germany
Kristian Beckers, Technical University of Munich, Germany
Giampaolo Bella, University of Catania, Italy
Stefano Bistarelli, Università di Perugia, Italy
Marc Bouissou, EDF RD, France
Frédéric Cuppens, Télécom Bretagne, France
Nora Cuppens-Boulahia, Télécom Bretagne, France
Binbin Chen, Advanced Digital Sciences Center, Singapore
Hervé Debar, Télécom SudParis, France
Harley Eades, Augusta University, USA
Mathias Ekstedt, KTH - Royal Institute of Technology, Sweden
Ulrik Franke, Swedish Institute of Computer Science - SICS, Sweden
Frank Fransen, TNO, The Netherlands
Olga Gadyatskaya, University of Luxembourg, Luxembourg
Paolo Giorgini, University of Trento, Italy
Dieter Gollmann, Hamburg University of Technology, Germany
Joshua Guttman, WPI and MITRE, USA
René Rydhof Hansen, Aalborg University, Denmark
Maritta Heisel, Universität Duisburg-Essen, Germany
Hannes Holm, Swedish Defence Research Agency, Sweden
Siv Hilde Houmb, Secure-NOK AS, Norway
Sushil Jajodia, George Mason University, USA
Ravi Jhawar, University of Luxembourg, Luxembourg
Henk Jonkers, BiZZdesign, The Netherlands
Cristian Johansen, University of Oslo, Norway
Florian Kammueller, Middlesex University London, UK
Nima Khakzad, TU Delft, The Netherlands
Dong Seong Kim, University of Canterbury, New Zealand
Barbara Kordy, INSA Rennes, IRISA, France
Pascal Lafourcade, Université Clermont Auvergne, LIMOS, France
Jean-Louis Lanet, Inria, France
Per Håkon Meland, SINTEF Digital, Norway
Jogesh Muppala, HKUST, Hong Kong, SAR China
Simin Nadjm-Tehrani, Linköping University, Sweden
Andreas L. Opdahl, University of Bergen, Norway
Xinming Ou, University of South Florida, USA
Stéphane Paul, Thales Research and Technology, France
Wolter Pieters, TU Delft, The Netherlands
Ludovic Piètre-Cambacédès, EDF, FR
Sophie Pinchinat, University Rennes 1, IRISA, France
Vincenzo Piuri, University of Milan, Italy
Marc Pouly, Lucerne University of Applied Sciences and Arts, Switzerland
Nicolas Prigent, Supélec, France
Christian W. Probst, Technical University of Denmark, Denmark
David Pym, UCL, UK
Saša Radomirovic, University of Dundee, UK
Indrajit Ray, Colorado State University, USA
Arend Rensink, University of Twente, The Netherlands
Yves Roudier, Université Côte d'Azur, CNRS, I3S, UNS, France
Guttorm Sindre, NUST, Norway
Mariëlle Stoelinga, University of Twente, The Netherlands
Xiaoyan Sun, California State University, USA
Axel Tanner, IBM Research - Zurich, Switzerland
Alexandre Vernotte, KTH - Royal Institute of Technology, Sweden
Luca Viganò, King's College London, UK
Lingyu Wang, Concordia University, Canada
Jan Willemson, Cybernetica, Estonia
CONTACT
For inquiries please send an e-mail to gramsec17(a)easychair.org
The goal of the BDRT2017 conference is to provide an international forum
for scientists, engineers, and managers in academia, industry, and
government to address recent research results and to present and discuss
their ideas, theories, technologies, systems, tools, applications, work in
progress and experiences on all theoretical and practical issues arising in
the ambient systems paradigm, infrastructures, models, and technologies
that have significant contributions to the advancement of ambient systems
theory, practices and their applications.
International Workshop on Big Data and Networks Technologies
*(BDNT’2017)*
Held in parallel with
The 12th International Conference on Future Networks and Communications
July 24-26, 2017, Leuven, Belgium
https://bdnt2017.sciencesconf.org/
*Important dates: *
Paper submission deadline: March 30, 2017
Notification of Decision: April 28, 2017
Final Manuscript Due: May 28, 2017
Workshops Date:July 24-26, 2017
*Topics:*
- Multimedia and Social Computing
- Service Oriented Computing for Systems &Applications
- Smart, Sustainable Cities and Climate Change Management
- Smart Environments and Applications
- Real-time Big Data Stream Mining Architecture
- Systems Security and Privacy
- Systems Software Engineering
- Vehicular Networks and Applications
- Computer vision
- Mobile computing
- Agent Systems, Intelligent Computing and Applications
- Big Data and Analytics
- Cloud Computing
- Context-awareness and Multimodal Interfaces
- Emerging Networking, Tracking & Sensing Technologies
- Internet of Things (IoT)
- Mobile Networks, Protocols and Applications
- Modeling and Simulation in Transportation Sciences
- General: Distributed systems, networks & applications
- Digital signal and image processing
- Computational Science
- Decision science
- Business Intelligence
*Publication:*
All accepted papers will be scheduled for oral presentations and will be
printed in the conference proceedings published by Elsevier Science in the
open-access Procedia Computer Science series (on-line). At least one author
of each accepted paper is required to register and attend the conference to
present the work.
*Contact*
-
bdnt2017(a)gmail.com
- youseffarhaoui(a)gmail.com
--
cdlt
Yousef farhaoui
| ****************************************************
| Yousef FARHAOUI
| Department of Computer Science
| Faculty of sciences and Technic
| Moulay Ismail University
| B.P 509, Boutalamine,
| Errachidia, Morocco.
| Tel: +212 672377651
*****************************************************
*** Fifth Call for Papers ***
21st European Conference on Advances in Databases
and Information Systems
ADBIS 2017
Hilton Cyprus, Nicosia, Cyprus
24 - 27 September, 2017
http://www.cs.ucy.ac.cy/~george/lm/lm.php?tk=Y29tcHV0YXRpb25hbC5zY2llbmNlCQ…
The main objective of the ADBIS series of conferences is to provide a forum
for the dissemination of research accomplishments and to promote
interaction and collaboration between the database and information system
research communities from European countries and the rest of the world.
The ADBIS conferences provide an international platform for the presentation
of research on database theory, development of advanced DBMS
technologies, and their advanced applications.
The conference will consist of regular sessions with technical contributions
(regular papers, short papers) reviewed and selected by an international
program committee, as well as of invited talks and tutorials presented by
leading scientists. The official language of the conference will be English. A
Doctoral Consortium and different Workshops will be held in line with the
main conference.
TOPICS
We invite original papers describing results that broadly belong to both
theory and practice of databases and information systems. The list of
specific topics of interest follows, with a note that it is not exhaustive and
we welcome novel results addressing topics not included in the list.
· Data intensive sciences and databases
· Theoretical foundations of databases
· Management of large scale data systems
· Data models and query languages
· Database monitoring and (self-)tuning
· Data curation, annotation, and provenance
· Data warehousing, OLAP, and ETL tools
· Indexing, query processing and optimization
· Data mining and knowledge discovery
· Big data storage, replication, and consistency
· Modeling, mining and querying user generated content
· Data quality and data cleansing
· Web, XML and semi-structured databases
· Sensor databases and mobile data management
· Text databases and information retrieval
· Probabilistic databases, uncertainty and approximate querying
· Temporal and spatial databases
· Graph databases
· Databases on emerging hardware architectures
· Distributed data platforms, including Cloud data systems, key-value stores,
and Big Data systems
· Information extraction and integration
· Streaming data analysis
· Scalable data analysis and analytics
· Data and information visualization; and user interfaces
· Information quality and usability
· Information system architectures and networking
· Business process modeling and optimization
· Data and information flow engineering and management
· Context-aware and adaptive information systems
· Data and information intensive services
· Requirements engineering for databases and information systems
· Artificial intelligence in databases and information systems
· Data, information, and information systems security
· Innovative platforms for data and information handling
· Innovative approaches for database and information systems engineering
· Novel database and information systems applications
PAPER PUBLISHING
ADBIS accepted research papers will be published in a Springer Lecture
Notes in Computer Science volume. Papers must not exceed 14 pages in
the LNCS format. For camera-ready papers use Latex or Word style (find
here http://www.cs.ucy.ac.cy/~george/lm/lm.php?tk=Y29tcHV0YXRpb25hbC5zY2llbmNlCQ….
The program committee may decide to accept a submission as a short paper
if it reports interesting results but does not justify publication of a full paper.
ADBIS short research papers must not exceed 8 pages. The best paper
authored solely by students will receive an award. Best papers of the main
conference will be invited for submission in special issues of the ISI-indexed
journals Information Systems (http://www.journals.elsevier.com/information-systems/)
and Informatica (http://www.informatica.si/).
SUBMISSION GUIDELINES
· Papers must be written in English.
· Papers must contain previously unpublished work and not be submitted
concurrently to another conference.
· Papers are submitted using an electronic submissions system, as detailed
below.
· An Author of an accepted paper must register to ADBIS 2017 in order to
have the paper published.
· Accepted papers must be presented at the conference by one of the authors.
· ADBIS papers must be submitted via the EasyChair system:
http://www.cs.ucy.ac.cy/~george/lm/lm.php?tk=Y29tcHV0YXRpb25hbC5zY2llbmNlCQ… .
· Papers must be submitted as a single PDF document
· Authors of accepted papers must submit along with the camera-ready
version of their paper a copyright form filled
(http://www.cyprusconferences.org/adbis2017/files/springerform.pdf) and
signed. Please note that only authors employed by the EU (as an institution)
tick the relevant box. Authors who simply reside or work in an EU country
should not tick this box.
IMPORTANT DATES
· Full and Short Papers: March 30, 2017
· Notification of Acceptance: May 25, 2017
· Camera-ready Submission: June 15, 2017
COMMITTEES
Steering Committee Chair
· Leonid Kalinichenko, Russian Academy of Science, Russia
General Chair
· George A. Papadopoulos, University of Cyprus, Cyprus
Program Chairs
· Marite Kirikova, Riga Technical University, Latvia
· Kjetil Norvag, Norwegian University of Science and Technology, Norway
Proceedings Chair
· Christos Mettouris, University of Cyprus, Cyprus
Workshops Chairs
· Johann Gamper, Free University of Bozen-Bolzano, Italy
· Robert Wrembel, Poznan University of Technology, Poland
Doctoral Consortium Chairs
· Jerome Darmont, Universite Lyon 2, France
· Stefano Rizzi, University of Bologna, Italy
================================================================================
*** Apologies for multiple copies ***
C a l l F o r P a p e r s
Twenty-second European Symposium on Research in Computer Security
(ESORICS 2017)
Oslo, Norway -- September 11-15, 2017
WWW: https://www.ntnu.edu/web/esorics2017/
================================================================================
Overview
------------------------------------
ESORICS is the annual European research event in Computer Security. The
Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities. Papers offering novel research
contributions in computer security are solicited for submission to the
Symposium. The primary focus is on original, high quality, unpublished
research and implementation experiences. We encourage submissions of
papers discussing industrial research and development.
Important Dates
------------------------------------
* Paper submission deadline: April 19, 2017
* Notification to authors: June 16, 2016
* Camera ready due: July 26, 2016
Topics of Interest
------------------------------------
Topics of interest include, but are not limited to:
* access control
* accountability
* ad hoc networks
* anonymity
* applied cryptography
* authentication
* biometrics
* data and computation integrity
* database security
* data protection
* digital content protection
* digital forensics
* distributed systems security
* embedded systems security
* inference control
* information hiding
* identity management
* information flow control
* information security governance and management
* intrusion detection
* formal security methods
* language-based security
* network security
* phishing and spam prevention
* privacy
* privacy preserving data mining
* risk analysis and management
* secure electronic voting
* security architectures
* security economics
* security metrics
* security models
* security and privacy for big data
* security and privacy in cloud scenarios
* security and privacy in complex systems
* security and privacy in content centric networking
* security and privacy in crowdsourcing
* security and privacy in the IoT
* security and privacy in location services
* security and privacy for mobile code
* security and privacy in pervasive / ubiquitous computing
* security and privacy policies
* security and privacy in social networks
* security and privacy in web services
* security and privacy in cyber-physical systems
* security, privacy and resilience in critical infrastructures
* security verification
* software security
* systems security
* trust models and management
* trustworthy user devices
* usable security and privacy
* web security
* wireless security
Paper Submission Guidelines
------------------------------------
Submissions must be made through EasyChair at:
https://easychair.org/conferences/?conf=esorics2017
Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference/workshop with proceedings. The symposium proceedings will be
published by Springer in the Lecture Notes in Computer Science series
(LNCS).
All submissions should follow the LNCS template from the time they are
submitted. Submitted papers should be at most 16 pages (using 10-point
font), excluding the bibliography and well-marked appendices, and at
most 20 pages total. Committee members are not required to read the
appendices, so the paper should be intelligible without them. All
submissions must be written in English. Submissions are to be made to
the Submission web site. Only pdf files will be accepted.
Submissions not meeting these guidelines risk rejection without
consideration of their merits. Authors of accepted papers must guarantee
that their papers will be presented at the conference.
Papers must be received by the aforementioned dates, 11:59 p.m. American
Samoa time (UTC-11).
Organisation Committee
------------------------------------
General Chairs:
* Einar Snekkenes, Norwegian University of Science and Technology
(NTNU), Norway.
Organization Chair:
* Laura Georg, Norwegian University of Science and Technology (NTNU),
Norway.
Workshop Chair:
* Sokratis Katsikas, Norwegian University of Science and Technology
(NTNU), Norway.
Program Committee Chairs:
* Dieter Gollman, Technische Universität Hamburg-Harburg, Germany
* Simon Foley, IMT Atlantique, France
Program Committee:
Gail-Joon Ahn, Arizona State University, USA
Alessandro Armando, University of Genoa, Italy
Michael Backes, Saarland University, Germany
Giampaolo Bella, Università degli studi di Catania, Italy
Elisa Bertino, Purdue University, USA
Carlo Blundo, Università degli studi di Salerno, Italy
Rainer Böhme, University of Innsbruck, Austria
Colin Boyd, Norwegian University of Science and Technology, Norway
Stefan Brunthaler, SBA Research, Austria
Tom Chothia, University of Birmingham, UK
Sherman S. M. Chow, Chinese University of Hong Kong, Hong Kong
Mauro Conti, University of Padua, Italy
Cas Cremers, University of Oxford, UK
Frederic Cuppens, IMT Atlantique, France
Nora Cuppens-Boulahia, IMT Atlantique, France
Mads Dam, KTH, Sweden
Sabrina De Capitani di Vimercati, Università degli studi di Milano,
Italy
Herve Debar, Telecom SudParis, France
Roberto Di Pietro, Nokia Bell Labs, France
Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
Wenliang Du, Syracuse University, USA
Pavlos Efraimidis, Democritus University of Thrace, Greece
Hannes Federrath, University of Hamburg, Germany
Simone Fischer-Hübner, Karlstad University, Sweden
Riccardo Focardi, Università Ca’ Foscari di Venezia, Italy
Simon Foley, IMT Atlantique, France
Sara Foresti, Università degli studi di Milano, Italy
Katrin Franke, Norwegian University of Science and Technology, Norway
Felix Freiling, Friedrich-Alexander-Universität Erlangen-Nürnberg,
Germany
Joaquin Garcia-Alfaro, Telecom ParisSud, France
Dieter Gollmann, Hamburg University of Technology, Germany
Dimitris Gritzalis, Athens University of Economics and Business, Greece
Stefanos Gritzalis, University of the Aegean, Greece
Joshua Guttman, Worcester Polytechnic Institute, USA
Gerhard Hancke, City University of Hong Kong, China
Marit Hansen, Unabhängiges Landeszentrum für Datenschutz
Schleswig-Holstein, Germany
Feng Hao, Newcastle University, UK
Cormac Herley, Microsoft Research , USA
Xinyi Huang, Fujian Normal University, China
Michael Huth, Imperial College, UK
Aaron D. Jaggard, U.S. Naval Research Laboratory, USA
Sushil Jajodia, George Mason University, USA
Limin Jia, Carnegie Mellon University, USA
Wouter Joosen, KU Leuven, Belgium
Vasilis Katos, Bournemouth University, UK
Sokratis Katsikas, Norwegian University of Science and Technology,
Norway
Florian Kerschbaum, University of Waterloo, Canada
Dogan Kesdogan, Universität Regensburg, Germany
Kwangjo Kim, Korea Advanced Institute of Science and Technology, Korea
Steve Kremer, INRIA Nancy-Grand Est, France
Marina Krotofil, Honeywell, USA
Ralf Küsters, University of Trier, Germany
Junzuo Lai, Singapore Management University, Singapore
Kwok-yan Lam, Nanyang Technological University, Singapore
Costas Lambrinoudakis, University of Piraeus, Greece
Peeter Laud, Cybernetica AS, Estonia
Adam J. Lee, University of Pittsburgh, USA
Gabriele Lenzini, University of Luxembourg, Luxembourg
Yingjiu Li, Singapore Management University, Singapore
Antonio Lioy, Politecnico di Torino, Italy
Peng Liu, The Pennsylvania State University, USA
Javier Lopez, University of Malaga, Spain
Antonio Maña, University of Malaga, Spain
Pratyusa K. Manadhata, Hewlett Packard Labs, USA
Luigi V. Mancini, "Universita di Roma ""La Sapienza""", Italy
Heiko Mantel, TU Darmstadt, Germany
Olivier Markowitch, Université Libre de Bruxelles, Belgium
Fabio Martinelli, IIT-CNR, Italy
Sjouke Mauw, University of Luxembourg, Luxembourg
Catherine Meadows, Naval Research Laboratory, USA
John Mitchell, Stanford University, USA
Aikaterini Mitrokotsa, Chalmers University of Technology, Sweden
Refik Molva, EURECOM, France
Charles Morisset, Newcastle University, UK
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, Università di Bergamo, Italy
Dusko Pavlovic, University of Hawaii, USA
Günther Pernul, Universität Regensburg, Germany
David Pichardie, ENS-IRISA, Rennes
Frank Piessens , Katholieke Universiteit Leuven, Belgium
Wolter Pieters, Delft University of Technology, The Netherlands
Michalis Polychronakis, Stonybrook University, USA
Christina Pöpper, NYU Abu Dhabi, UAE
Joachim Posegga, University of Passau, Germany
Christian Probst, Technical University of Denmark, Denmark
Kai Rannenberg, Goeth University, Germany
Awais Rashid, Lancaster University, UK
Indrajiti Ray, Colorado State University, USA
Kui Ren, State University of New York at Buffalo, USA
Mark Ryan, University of Birmingham, UK
Peter Y.A. Ryan, University of Luxembourg, Luxembourg
Rene Rydhof Hansen, Aarhus University, Denmark
Andrei Sabelfeld, Chalmers University of Technology, Sweden
Rei Safavi-Naini, University of Calgary, Canada
Pierangela Samarati, Universitá degli studi di Milano, Italy
Ravi Sandhu, University of Texas at San Antonio, USA
Ralf Sasse, ETH Zürich, Switzerland
Nitesh Saxena, University of Alabama at Birmingham, USA
Andreas Schaad, Huawei European Research Center, Germany
Steve Schneider, University of Surrey, UK
Basit Shafiq, Lahore University of Management Sciences, Pakistan
Einar Snekkenes, Norwegian University of Science and Technology, Norway
Willy Susilo, University of Wollongong, Australia
Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Björn Tackmann, IBM Research, Switzerland
Qiang Tang, New Jersey Institute of Technology, USA
Nils Ole Tippenhauer, Singapore University of Technology and Design,
Singapore
jaideep Tsochou, Ionion University, Greece
Vijay Varadharajan, Macquarie University, Australia
Luca Viganò, King's College London, UK
Michael Waidner, Fraunhofer SIT & TU Darmstadt, Germany
Cong Wang, City University of Hong Kong, China
Ben Smyth, Huawei, France
Edgar Weippl, SBA Research, Austria
Stephen Wolthusen, Royal Holloway university, UK
Christos Xenakis, University of Piraeus, Greece
Jeff Yan, Lancaster University, UK
Meng Yu, University of Texas at San Antonio, USA
Ben Zhao, University of California at Santa Barbara, USA
Jianying Zhou, Institute for Infocomm Research, Singapore
Jörg Schwenk, Ruhr-Universität, Bochum
Publicity Chair
* Cristina Alcaraz, University of Malaga, Spain
We apologize if you receive multiple copies of this message.
Please disseminate this CFP to your colleagues & contacts.
==============================================================
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
John Wiley & Sons, Ltd.
Editor in Chief: Mohammad S. Obaidat
Impact Factor: 1.099
http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1099-1131/homepage/spe…
CALL FOR PAPERS
Special Issue on Communication and Computation Cooperation (3C): Principles, Algorithms and Systems
Scope
With growing popularity of mobile communications and the explosion of the resource hungry applications, mobile users are expecting to receive much higher experiences than before, which poses an increasingly high burden on the existing wired and wireless communications. Thanks to the fast development of the cloud computing and virtualization techniques, more and more communication and service related functions may be realized and implemented in cloud, as exemplified by the recent progress in cloud radio access networks (C-RAN), mobile cloud computing (MCC) and network function virtualization (NFV), etc. With the transition from conventional hardware based environment to a software based infrastructure, computing resource can be allocated more dynamically, conveniently and flexibly to the communications and other services. However, allocating more computation resource than networking or user expecting will contribute to a waste of the energy, whereas lack of computing resource in communications will result in packet loss or failure of information transmission. Therefore, the purpose of this special issue is to investigate the Communication and Computation Cooperation (3C), as well as the related principles, algorithms, protocols and systems.
This special issue expects to create a forum for researchers and practitioners from both academia and industry to publish the key results and techniques in all aspects of 3C. Topics of interest include, but are not limited to:
* Communication and computation cooperation and management systems
* Principles and critical R&D issues in 3C
* 3C related algorithms, designs and protocols
* 3C related techniques in Internet of things (IoT)
* 3C based approaches in sensor networks
* 3C research in C-RAN
* 3C based mobile cloud/edge/fog computing
* Quality of service (QoS) related problems in 3C
* 3C based cross layer optimization
* 3C in 5G communications
* 3C based offloading techniques
* 3C in software-defined networking (SDN)
* 3C aided device to device communications
* Energy and power minimization in 3C
* Wired and wireless network related function virtualization in 3C
* Security and privacy related issues in 3C
* Performance examination and analysis in 3C
* 3C assisted social networking
Instructions for Manuscripts
Submitted articles must describe original research which have not been published or currently under review by other journals or conferences. Submissions must be directly sent via the IJCS submission web site at
http://mc.manuscriptcentral.com/ijcs and select Special Issue: Communication and Computation Cooperation: Principles, Algorithms and Systems as manuscript type during step 1 of the submission process.
Paper submissions must conform to the layout and format guidelines in the International Journal of Communication Systems. Instructions for Contributors are in:
http://www3.interscience.wiley.com/journal/5996/home/ForAuthors.html
Important Dates
Manuscript Due: 1 April 2017
Decision Notification: 1 July 2017
Final Manuscript Due: 1 September 2017
Tentative Publication Date: December 2017
Guest Editors
Dr. Kezhi Wang, University of Essex, U.K., Email: kezhi.wang(a)essex.ac.uk<mailto:kezhi.wang@essex.ac.uk>; kezhi.wang(a)outlook.com<mailto:kezhi.wang@outlook.com>
Prof. Qun Jin, Waseda University, Japan, Email: jin(a)waseda.jp<mailto:jin@waseda.jp>
Prof. Hamid Sharif, University of Nebraska-Lincoln, USA, Email: hamidsharif(a)unl.edu<mailto:hamidsharif@unl.edu>
CALL FOR PAPERS - GraMSec 2017
The Fourth International Workshop on Graphical Models for Security
Santa Barbara, CA, USA - August 21, 2017
http://gramsec.uni.lu
Co-located with CSF 2017
SCOPE
Graphical security models provide an intuitive but systematic approach
to analyze security weaknesses of systems and to evaluate potential
protection measures. Cyber security researchers, as well as security
professionals from industry and government, have proposed various
graphical security modeling schemes. Such models are used to capture
different security facets (digital, physical, and social) and address a
range of challenges including vulnerability assessment, risk analysis,
defense analysis, automated defensing, secure services composition,
policy validation and verification. The objective of the GraMSec
workshop is to contribute to the development of well-founded graphical
security models, efficient algorithms for their analysis, as well as
methodologies for their practical usage.
TOPICS
The workshop seeks submissions from academia, industry, and government
presenting novel research on all theoretical and practical aspects of
graphical models for security. The topics of the workshop include, but
are not limited to:
• Graphical models for threat modeling and analysis
• Graphical models for risk analysis and management
• Graphical models for requirements analysis and management
• Textual and graphical representation for system, organizational, and
business security
• Visual security modeling and analysis of socio-technical and
cyber-physical systems
• Graphical security modeling for cyber situational awareness
• Graphical models supporting the security by design paradigm
• Methods for quantitative and qualitative analysis of graphical
security models
• Formal semantics and verification of graphical security models
• Methods for (semi-)automatic generation of graphical security models
• Enhancement and/or optimization of existing graphical security models
• Scalable evaluation of graphical security models
• Evaluation algorithms for graphical security models
• Dynamic update of graphical security models
• Game theoretical approaches to graphical security modeling
• Attack trees, attack graphs and their variants
• Stochastic Petri nets, Markov chains, and Bayesian networks for security
• UML-based models and other graphical modeling approaches for security
• Software tools for graphical security modeling and analysis
• Case studies and experience reports on the use of graphical security
modeling paradigm
INVITED SPEAKER
To be decided.
PAPER SUBMISSION
We solicit two types of submissions:
• Regular papers (up to 15 pages, excluding the bibliography and
well-marked appendices)
describing original and unpublished work within the scope of the workshop.
• Short papers (up to 7 pages, excluding the bibliography and
well-marked appendices)
describing original and unpublished work in progress.
The reviewers are not required to read the appendices, so the papers
should be intelligible without them. All submissions must be prepared
using the LNCS style:
http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0
Each paper will undergo a thorough review process. All accepted (regular
and short) papers will be included in the workshop's post-proceedings.
As the previous two years, the GraMSec 2017 post-proceedings are planned
to be published in the Lecture Notes in Computer Science (LNCS) series
of Springer (confirmation pending). Submissions should be made using the
GraMSec 2017 EasyChair web site:
https://www.easychair.org/conferences/?conf=gramsec17
IMPORTANT DATES
• Submission deadline: Sunday, May 21, 2017
• Acceptance notification: Friday, July 7, 2017
• Workshop: Monday, August 21, 2017
GENERAL CHAIR
• Sjouke Mauw, University of Luxembourg, Luxembourg
PROGRAM CHAIRS
• Peng Liu, Pennsylvania State University, USA
• Ketil Stølen, SINTEF Digital and University of Oslo, Norway
PC MEMBERS
Mathieu Acher, University Rennes 1, Inria, France
Massimiliano Albanese, George Mason University, USA
Ludovic Apvrille, Télécom ParisTech, France
Thomas Bauereiss, DFKI, Germany
Kristian Beckers, Technical University of Munich, Germany
Giampaolo Bella, University of Catania, Italy
Stefano Bistarelli, Università di Perugia, Italy
Marc Bouissou, EDF RD, France
Frédéric Cuppens, Télécom Bretagne, France
Nora Cuppens-Boulahia, Télécom Bretagne, France
Binbin Chen, Advanced Digital Sciences Center, Singapore
Hervé Debar, Télécom SudParis, France
Harley Eades, Augusta University, USA
Mathias Ekstedt, KTH - Royal Institute of Technology, Sweden
Ulrik Franke, Swedish Institute of Computer Science - SICS, Sweden
Frank Fransen, TNO, The Netherlands
Olga Gadyatskaya, University of Luxembourg, Luxembourg
Paolo Giorgini, University of Trento, Italy
Dieter Gollmann, Hamburg University of Technology, Germany
Joshua Guttman, WPI, USA
René Rydhof Hansen, Aalborg University, Denmark
Maritta Heisel, Universität Duisburg-Essen, Germany
Hannes Holm, Swedish Defence Research Agency, Sweden
Siv Hilde Houmb, Secure-NOK AS, Norway
Sushil Jajodia, George Mason University, USA
Ravi Jhawar, University of Luxembourg, Luxembourg
Henk Jonkers, BiZZdesign, The Netherlands
Cristian Johansen, University of Oslo, Norway
Florian Kammueller, Middlesex University London, UK
Nima Khakzad, TU Delft, The Netherlands
Dong Seong Kim, University of Canterbury, New Zealand
Barbara Kordy, INSA Rennes, IRISA, France
Pascal Lafourcade, Université Clermont Auvergne, LIMOS, France
Jean-Louis Lanet, Inria, France
Per Håkon Meland, SINTEF Digital, Norway
Jogesh Muppala, HKUST, Hong Kong, SAR China
Simin Nadjm-Tehrani, Linköping University, Sweden
Andreas L. Opdahl, University of Bergen, Norway
Xinming Ou, University of South Florida, USA
Stéphane Paul, Thales Research and Technology, France
Wolter Pieters, TU Delft, The Netherlands
Ludovic Piètre-Cambacédès, EDF, FR
Sophie Pinchinat, University Rennes 1, IRISA, France
Vincenzo Piuri, University of Milan, Italy
Marc Pouly, Lucerne University of Applied Sciences and Arts, Switzerland
Nicolas Prigent, Supélec, France
Christian W. Probst, Technical University of Denmark, Denmark
David Pym, UCL, UK
Saša Radomirovic, University of Dundee, UK
Indrajit Ray, Colorado State University, USA
Arend Rensink, University of Twente, The Netherlands
Yves Roudier, Université Côte d'Azur, CNRS, I3S, UNS, France
Guttorm Sindre, NUST, Norway
Mariëlle Stoelinga, University of Twente, The Netherlands
Xiaoyan Sun, California State University, USA
Axel Tanner, IBM Research - Zurich, Switzerland
Alexandre Vernotte, KTH - Royal Institute of Technology, Sweden
Luca Viganò, King's College London, UK
Lingyu Wang, Concordia University, Canada
Jan Willemson, Cybernetica, Estonia
CONTACT
For inquiries please send an e-mail to gramsec17(a)easychair.org
Research Fellow positions in Computer Security
University of Padua - SPRITZ Security and Privacy Research Group
JOB DESCRIPTION:
The SPRITZ <http://spritz.math.unipd.it/> Security and Privacy Research
Group at the University of Padova is looking for four research fellows to
participate in the project funded by EU H2020 titled “Solutions for access
and safe use of mobile scanners devices”. IoT is about connecting billions
of objects, things, devices. The overall objective of TagItSmart! (
tagitsmart.eu) is to create a set of tools and enabling technologies
integrated into a platform with open interfaces, enabling users across the
value chain to fully exploit the power of condition-dependent FunCodes, to
connect mass-market products with the digital world across multiple
application sectors.
The key requirements for the position are as follows:
-
Recent PhD (or significant research experience) in Computer Science,
Computer Engineering, or related areas.
-
Hands-on experience in some of the following areas will be plus:
-
Internet of Things (IoT)
-
Application/service provisioning architectures
-
Android security
-
Security and reliability in RFID/NFC scanning
-
Trusted Platform Module
-
Software design/implementation and prototyping skills.
-
Algorithms design and implementation skills.
-
Experience in working on EU projects is desirable.
-
Publications in high impact journals and well known conferences.
ABOUT UNIVERSITY OF PADOVA AND THE SPRITZ GROUP
The University of Padua is the University of Galileo Galilei, and the first
University that awarded a degree to a woman. The first ever report issued
by the National Research Assessment Committee set the University of Padova
as the highest ranking among leading Italian universities for the quality
of its research results. Based on the number of citations of articles and
publications by its researchers (source: ISI), the University of Padova
ranks among the top three Italian universities for total impact index,
productivity index, and presence index.
SPRITZ Security and Privacy Research Group is a group of researchers very
passionate in investigating security and privacy issues related to current
and future technologies. The SPRITZ group was founded (in 2011) and is led
by Prof. Mauro Conti (http://www.math.unipd.it/~conti/). The group is
mostly based at the University of Padua, while it enjoys worldwide
collaborations. For more information about our group please visit:
http://spritz.math.unipd.it/
HOW TO APPLY
Interested candidates are invited to contact Prof. Mauro Conti
<http://www.math.unipd.it/%7Econti/> directly (conti(a)math.unipd.it). For
more information about the position and how to apply please visit the
following link: http://www.math.unipd.it/it/news/?id=1971
Applications must be received by March 01, 2017.
--
Thanks,
Best Regards,
Chhagan Lal, PhD,
Research/Postdoc Fellow,
University of Padua - Department of Mathematics,
*SPRITZ - Security and Privacy Research Group*
*http://spritz.math.unipd.it/team.html
<http://spritz.math.unipd.it/team.html>*