Qin Liu | 30 Jun 11:22 2015

[Dbworld] TrustData 2015-Extended deadline July 26, 2015-10 Journal Special Issues

Apologies if you received multiple copies of this TrustData 2015 CFP.
Call for Papers for the 6th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2015)

Central South University, China
Hunan University, China

Technical Co-Sponsorship:
National Natural Science Foundation of China (NSFC)
School of Information Science and Enginerring, CSU
School of Software, CSU

Venue & Dates: 
Zhangjiajie, China, November 18-20, 2015

Conference Website:

The proliferation of new technologies such as Internet of Things and cloud computing calls for innovative
ideas to retrieve, filter, and integrate data from a large number of diverse data sources. Big Data is an
emerging paradigm applied to datasets whose volume/velocity/variability is beyond the ability of
commonly used software tools to manage and process the data within a tolerable period of time. More
importantly, Big Data has to be of high value, and should be protected in an efficient way. Since Big Data
involves a huge amount of data that is of high-dimensionality and inter-linkage, existing trust,
security, and privacy measures for traditional databases and infrastructures cannot satisfy its
requirements. Novel technologies for protecting Big Data are attracting researchers and pra
 ctitioners with more and more attention.
(Continue reading)

Nikola Knezevic | 30 Jun 10:54 2015

[Dbworld] (Deadline in a few days!) First IEEE Workshop on Security and Privacy in the Cloud (SPC 2015)

Dear all,

The deadline for SPC 2015 is approaching. I apologize for possible


First IEEE Workshop on Security and Privacy in the Cloud (SPC 2015)
Florence, Italy - September 30, 2015

Cloud computing is today the reference paradigm for large-scale data
storage and processing due to the convenient and efficient network
access to configurable resources that can be easily adjusted according
to the users' needs. Although the benefits of cloud computing are
tremendous, security and privacy concerns have still a detrimental
impact on the adoption and acceptability of cloud services.
In fact, users as well as companies that rely on cloud storage and
computation services lose the direct control over the systems
managing their data and applications, thus putting the confidentiality,
integrity and availability of the data at risk. The goal of this
workshop is to bring together researchers and practitioners who are
interested in discussing the security, privacy, and data protection
issues emerging in cloud scenarios, and possible solutions to them.

SPC 2015 will be held in Florence, Italy, in conjunction with the 
(Continue reading)

Georgios Meditskos | 30 Jun 10:49 2015

[Dbworld] DEADLINE EXTENDED SWT4IVA <at> ISWC2015 - Workshop on Semantic Web Technologies for Image/Video Analysis

*** Extended paper submission deadline:  July 8th, 2015 ***

1st Workshop on Semantic Web Technologies for Image and Video Analysis and Analytics, in conjunction with
ISWC 2015, Bethlehem, Pennsylvania, October 11-15, 2015 (http://nerone.diem.unisa.it/swt4iva/)

- Submission deadline: July 8, 2015
- Notifications: July 31, 2015
- Camera ready version: August 21, 2015
- Workshop: October 11-12, 2015

In the last years, a substantial body of work has focused on the development of cognitive approaches
leveraging on a symbolic model representation of the objects belonging to a scene and their relations.
Specifically in the domains of Video Surveillance and Ambient Intelligence, recent advances in image,
multimedia and video analysis, as well as in object detection and tracking, activity and gesture
recognition have highlighted the need to move away from the traditional pattern matching and
statistical approaches. Hybrid approaches that couple mining, learning and statistical reasoning
with knowledge-driven solutions have emerged that support the development of more flexible,
meaningful and robust solutions for improving the analytics aspects. Under this paradigm, Semantic Web technologies
  have attracted growing interest, bringing to the table the ability to formally capture intended
semantics and to support automated reasoning, integration, management and sharing of informa!
 tion. Ontologies provide the means for formally capturing domain information, whereas the underpinning
semantics formalise context-aware interpretation services that enable the effective coupling of
statistical and logic-based reasoning, making available new forms of business intelligence and video
analytics. However, the potential of Semantic Web technologies in addressing key requirements is yet to
be fully explored: temporal reasoning, scalability, uncertainty handling, reasoning with noisy and
missing information, as well as the theoretical aspects that underpin the combination of Semantic Web
technologies with other fields of research, such as open and closed-world assumption, impose new challenges.
(Continue reading)

JCSE Editorial Office | 30 Jun 10:20 2015

[Dbworld] Newly published papers

Dear Colleague:


We are pleased to announce the release of a new issue of Journal of Computing Science and Engineering (JCSE), published by the Korean Institute of Information Scientists and Engineers (KIISE). KIISE is the largest organization for computer scientists in Korea with over 4000 active members.


Journal of Computing Science and Engineering (JCSE) is a peer-reviewed quarterly journal that publishes high-quality papers on all aspects of computing science and engineering. JCSE aims to foster communication between academia and industry within the rapidly evolving field of Computing Science and Engineering. The journal is intended to promote problem-oriented research that fuses academic and industrial expertise. The journal focuses on emerging computer and information technologies including, but not limited to, embedded computing, ubiquitous computing, convergence computing, green computing, smart and intelligent computing, and human computing. JCSE publishes original research contributions, surveys, and experimental studies with scientific advances.


Please take a look at our new issue posted at http://jcse.kiise.org. All the papers can be downloaded from the Web page.


The contents of the latest issue of Journal of Computing Science and Engineering (JCSE)

Official Publication of the Korean Institute of Information Scientists and Engineers

Volume 9, Number 2, June 2015


pISSN: 1976-4677

eISSN: 2093-8020


* JCSE web page: http://jcse.kiise.org

* e-submission: http://mc.manuscriptcentral.com/jcse


Editor in Chief: Insup Lee (University of Pennsylvania)

Il-Yeol Song (Drexel University)

Jong C. Park (KAIST)

Taewhan Kim (Seoul National University)


JCSE, vol. 9, no. 2, June 2015


[Paper One]

- Title: An Optimization Algorithm with Novel Flexible Grid: Applications to Parameter Decision in LS-SVM

- Authors: Weishang Gao, Cheng Shao and Qin Gao

- Keyword: Optimization algorithm; Swarm intelligence; Evolutionary computation

- Abstract                                                                  

Genetic algorithm (GA) and particle swarm optimization (PSO) are two excellent approaches to multimodal optimization problems. However, slow convergence or premature convergence readily occurs because of inappropriate and inflexible evolution. In this paper, a novel optimization algorithm with a flexible grid optimization (FGO) is suggested to provide adaptive trade-off between exploration and exploitation according to the specific objective function. Meanwhile, a uniform agents array with adaptive scale is distributed on the gird to speed up the calculation. In addition, a dominance centroid and a fitness center are proposed to efficiently determine the potential guides when the population size varies dynamically. Two types of subregion division strategies are designed to enhance evolutionary diversity and convergence, respectively. By examining the performance on four benchmark functions, FGO is found to be competitive with or even superior to several other popular algorithms in terms of both effectiveness and efficiency, tending to reach the global optimum earlier. Moreover, FGO is evaluated by applying it to a parameter decision in a least squares support vector machine (LS-SVM) to verify its practical competence.


To obtain a copy of the entire article, click on the link below.
JCSE, vol. 9, no. 2, pp.39-50


[Paper Two]

- Title: Scratchpad Memory Architectures and Allocation Algorithms for Hard Real-Time Multicore Processors

- Authors: Yu Liu and Wei Zhang

- Keyword: Scratch-pad memory (SPM); Hard real-time system; Worst-case execution time (WCET); Multicore processors

- Abstract

Time predictability is crucial in hard real-time and safety-critical systems. Cache memories, while useful for improving the average-case memory performance, are not time predictable, especially when they are shared in multicore processors. To achieve time predictability while minimizing the impact on performance, this paper explores several time-predictable scratch-pad memory (SPM) based architectures for multicore processors. To support these architectures, we propose the dynamic memory objects allocation based partition, the static allocation based partition, and the static allocation based priority L2 SPM strategy to retain the characteristic of time predictability while attempting to maximize the performance and energy efficiency. The SPM based multicore architectural design and the related allocation methods thus form a comprehensive solution to hard real-time multicore based computing. Our experimental results indicate the strengths and weaknesses of each proposed architecture and the allocation method, which offers interesting on-chip memory design options to enable multicore platforms for hard real-time systems.


To obtain a copy of the entire article, click on the link below.
JCSE, vol. 9, no. 2, pp.51-72


[Paper Three]

- Title: A Semantic Aspect-Based Vector Space Model to Identify the Event Evolution Relationship within Topics

- Authors: Yaoyi Xi, Bicheng Li, and Yang Liu

- Keyword: Topic evolution; Event evolution relationship; Hierarchical Dirichlet process; Semantic similarity

- Abstract

Understanding how the topic evolves is an important and challenging task. A topic usually consists of multiple related events, and the accurate identification of event evolution relationship plays an important role in topic evolution analysis. Existing research has used the traditional vector space model to represent the event, which cannot be used to accurately compute the semantic similarity between events. This has led to poor performance in identifying event evolution relationship. This paper suggests constructing a semantic aspect-based vector space model to represent the event: First, use hierarchical Dirichlet process to mine the semantic aspects. Then, construct a semantic aspect-based vector space model according to these aspects. Finally, represent each event as a point and measure the semantic relatedness between events in the space. According to our evaluation experiments, the performance of our proposed technique is promising and significantly outperforms the baseline methods.


To obtain a copy of the entire article, click on the link below.
JCSE, vol. 9, no. 2, pp.73-82


[Paper Four]

- Title: A Holistic Approach to Optimizing the Lifetime of IEEE 802.15.4/ZigBee Networks with a Deterministic Guarantee of Real-Time Flows

- Authors: Kang-Wook Kim, Myung-Gon Park, Junghee Han and Chang-Gun Lee

- Keyword: Holistic optimization; Real-time; Wireless sensor networks

- Abstract

IEEE 802.15.4 is a global standard designed for emerging applications in low-rate wireless personal area networks (LRWPANs). The standard provides beneficial features, such as a beacon-enabled mode and guaranteed time slots for realtime data delivery. However, how to optimally operate those features is still an open issue. For the optimal operation of the features, this paper proposes a holistic optimization method that jointly optimizes three cross-related problems: cluster- tree construction, nodes??power configuration, and duty-cycle scheduling. Our holistic optimization method provides a solution for those problems so that all the real-time packets can be delivered within their deadlines in the most energyefficient way. Our simulation study shows that compared to existing methods, our holistic optimization can guarantee the on-time delivery of all real-time packets while significantly saving energy, consequently, significantly increasing the lifetime of the network. Furthermore, we show that our holistic optimization can be extended to take advantage of the spatial reuse of a radio frequency resource among long distance nodes and, hence, significantly increase the entire network capacity.


To obtain a copy of the entire article, click on the link below.
JCSE, vol. 9, no. 2, pp.83-97


[Paper Five]

- Title: A Conflict Detection Method Based on Constraint Satisfaction in Collaborative Design

- Authors: Kangkang Yang, Shijing Wu, Wenqiang Zhao and Lu Zhou

- Keyword: Collaborative design; Conflict detection; Constraint satisfaction; Immune algorithm; Back propagation neural network

- Abstract

Hierarchical constraints and constraint satisfaction were analyzed in order to solve the problem of conflict detection in collaborative design. The constraints were divided into two sets: one set consisted of known constraints and the other of unknown constraints. The constraints of the two sets were detected with corresponding methods. The set of the known constraints was detected using an interval propagation algorithm, a back propagation (BP) neural network was proposed to detect the set with the unknown constraints. An immune algorithm (IA) was utilized to optimize the weights and the thresholds of the BP neural network, and the steps were designed for the optimization process. The results of the simulation indicated that the BP neural network that was optimized by IA has a better performance in terms of convergent speed and global searching ability than a genetic algorithm. The constraints were described using the eXtensible Markup Language (XML) for computers to be able to automatically recognize and establish the constraint network. The implementation of the conflict detection system was designed based on constraint satisfaction. A wind planetary gear train is taken as an example of collaborative design with a conflict detection system.


To obtain a copy of the entire article, click on the link below.
JCSE, vol. 9, no. 2, pp.98-107


[Paper Six]

- Title: Priority-Based Network Interrupt Scheduling for Predictable Real-Time Support

- Authors: Minsub Lee, Hyosu Kim, and Insik Shin

- Keyword: Real-time scheduling; Interrupt handling; Network I/O management; Process-aware resource scheduling

- Abstract

Interrupt handling is generally separated from process scheduling. This can lead to a scheduling anomaly and priority inversion. The processor can interrupt a higher priority process that is currently executing, in order to handle a network packet reception interruption on behalf of its intended lower priority receiver process. We propose a new network interrupt handling scheme that combines interrupt handling with process scheduling and the priority of the process. The proposed scheme employs techniques to identify the intended receiver process of an incoming packet at an earlier phase. We implement a prototype system of the proposed scheme on Linux 2.6, and our experiment results show that the prototype system supports the predictable real-time behavior of higher priority processes even when excessive traffic is sent to lower priority processes.


To obtain a copy of the entire article, click on the link below.
JCSE, vol. 9, no. 2, pp.108-117


[Call For Papers]

Journal of Computing Science and Engineering (JCSE), published by the Korean Institute of Information Scientists and Engineers (KIISE) is devoted to the timely dissemination of novel results and discussions on all aspects of computing science and engineering, divided into Foundations, Software & Applications, and Systems & Architecture. Papers are solicited in all areas of computing science and engineering. See JCSE home page at http://jcse.kiise.org for the subareas.

The journal publishes regularly submitted papers, invited papers, selected best papers from reputable conferences and workshops, and thematic issues that address hot research topics. Potential authors are invited to submit their manuscripts electronically, prepared in PDF files, through http://mc.manuscriptcentral.com/jcse, where ScholarOne is used for on-line submission and review. Authors are especially encouraged to submit papers of around 10 but not more than 30 double-spaced pages in twelve point type. The corresponding author's full postal and e-mail addresses, telephone and FAX numbers as well as current affiliation information must be given on the manuscript. Further inquiries are welcome at JCSE Editorial Office, office-FliOkY8o34TYtjvyW6yDsg@public.gmane.org (phone: +82-2-588-9240; FAX: +82-2-521-1352).

Please do not post msgs that are not relevant to the database community at large.  Go to
www.cs.wisc.edu/dbworld for guidelines and posting forms.
To unsubscribe, go to https://lists.cs.wisc.edu/mailman/listinfo/dbworld
Eleni Veroni | 30 Jun 09:52 2015

[Dbworld] e-Democracy 2015: Submission Deadline Extended - July 8th

e-Democracy 2015: Citizen rights in the world of the new computing paradigms 
6th International Conference on e-Democracy

December 10-11, 2015, Athens, Greece

*** Submission Deadline Approaching: July 8th ***


Information and communication technologies move fast; faster than society, faster than governments,
faster than the law. Connectivity is already impressive, but the near future brings about the
interconnection of everything, via the Internet of Things. It also brings fundamental changes to our
computing paradigm, with cloud computing gaining momentum and being expected to become the prevalent
computing paradigm in the years to come. Increasingly more data are being collected, about almost
everything one can imagine; and they remain there, in cyberspace, for ever, sometimes even resisting
efforts to delete them. These data are so attractive that a new science, going by the name "big data" has
already emerged. All these developments constitute in most cases an improvement in our everyday lives,
but sometimes infringe our rights as citizens. The challenge, therefore, is to safeguard citizen rights
in the face of a new era, landmarked by new computing paradigms. 

This is the theme of the 6th occasion of the International Conference on e-Democracy that will be held in
Athens, the cradle of democracy, on 10-11 December 2015. The conference is organized by the Scientific
Council for the Information Society, in co-operation with the Hellenic Data Protection Authority and a
substantial number of European and Greek universities and academia. It is intended, similarly to
previous occasions, to provide a forum for presenting and debating the latest developments in the field,
from a technical, political, and legal point of view.   

The conference will include keynote addresses, tutorials, panels, Ph.D. colloquia and sessions,
workshops, special, regular and poster sessions. All papers will be peer reviewed. Acceptance will be
based on quality, relevance, and originality. Accepted papers will be published in the conference
proceedings and selected papers will be invited to participate (after the necessary enhancements) to
the evaluation process for inclusion in special issues of peer-reviewed journals.

The working language of the 6th International Conference on "e-Democracy '15: Challenges for Citizen
Rights in the World of the New Computing Paradigms" is English. It is possible, however, that papers on
Greek Law cases of e-Democracy issues be presented in Greek.

Topics of interest

The topics of interest include, but are not limited to, the following:

e-Democracy and e-Participation
- e-Campaigning, e-Politics
- e-Voting
- Information and Consultation Platforms
- Collaborative working environments for e-Democracy
- Social computing and e-Democracy

- Open and Big Data for e-Government
- Cloud computing for e-Government
- m-Government
- e-Government services and administrative burdens
- Business process modeling for e-Government systems
- Tools and models for e-Government development
- Case studies and European projects

Security, Privacy and Trust
- Security, Privacy and Trust in e-Business services
- Security, Privacy and Trust in e-Government services
- Security, Privacy and Trust in Online Social Network Services
- Cloud Computing Security and Privacy
- Identity Management, Identity Theft and Trust Management
- Information Audit and Trust
- Digital Rights Management
- Trust and Reputation in Digital Environments
- Cyber attacks and advances on network security
- Cryptographic Technologies
- Anonymisation Methodologies and Best Practices
- Privacy by Design and Default Methodologies
- Tracking Technologies and Do-Not-Track Systems
- Privacy Impact Assessment Methodologies
- Privacy Enhancing Location and Mobility Management
- Security and Privacy Audit, Risk and Governance
- Security and Data Protection Education
- Tradeoffs between security and efficiency, usability, reliability and cost

e-Crime, e-Fraud and Digital Forensics
- Cyber Crime Detection and Prevention
- Internet Fraud, Cyber War
- Computer Forensics and Anti-forensics

Social, legal and ethical issues
- Digital Divide
- Internet Addiction
- Transparency and Accountability in Data Protection
- Ethics in Digital Societies
- Surveillance Technologies and Legal Implications
- Freedom of Expression and Privacy
- Freedom of Information and Privacy
- Social factors of collaborative creativity

Important Dates

Full paper submission deadline:		July 8, 2015
Notification of decision:		August 9, 2015
Camera-ready deadline:			September 13, 2015

Instructions for Authors

Submitted papers must not substantially overlap with papers that have been published or that have been
simultaneously submitted to a journal or a conference with proceedings. All submissions should be
appropriately anonymised (i.e., papers should not contain author names or affiliations, or obvious
citations). Submissions should be at most 15 pages, including the bibliography and well-marked
appendices, and should follow the LNCS style (http://www.springeronline.com/lncs). Submissions are
to be made to the submission web site at https://easychair.org/conferences/?conf=edemocracy15. Only
pdf files will be accepted. Submissions not meeting these guidelines risk rejection without
consideration of their merits. Papers must be received by the deadline of 8 July 2015 (11:59 p.m. American
Samoa time). Authors of accepted papers must guarantee that their papers will be presented at the
conference. The conference proceedings will be published in the Springer’s Communications in Compu!
 ter and Information Science (CCIS) series.

The authors of selected accepted papers will be invited to extend their work for further publication in the
Emerald journal Information and Computer Security (http://www.emeraldinsight.com/journal/ics#).

Conference Steering Committee
Sokratis K. Katsikas, University of Piraeus, Greece (Chair)
Vassilis Zorkadis, Vice-President of SCIS, Greece (Vice-chair)
Philippos Mitletton, Secretary General of SCIS, Greece (Secretary)
Lazaros Iliadis, Democritus University of Thrace, Greece
Constantina Costopoulou, Agricultural University of Athens, Greece
Constantine Yialouris, Agricultural University of Athens, Greece
Elias Pimenidis, University of the West of England, UK
Spyros Voulgaris, Vrije Universiteit, The Netherlands
Irene Vassilaki, Board member of SCIS, Greece
Charalampos Patrikakis, Technological Educational Institute of Piraeus, Greece   

Conference Honorary Chair
Alexander B. Sideridis, Agricultural University of Athens, Greece

Program Committee Chair
Sokratis K. Katsikas, University of Piraeus, Greece

Program Committee
Isaac Agudo,University of Malaga,Spain
Evgenia Alexandropoulou,University of Macedonia,Greece
Zacharoula Andreopoulou,Aristotle University of Thessaloniki,Greece
Maria Bottis, Ionian University,Greece
Christos Bouras,University of Patras,Greece
Athena Bourka, ENISA, Greece
David Chadwick,University of Kent,UK
Vassilios Chryssikopoulos,Ionian University,Greece
Nathan Clarke,University of Plymouth,UK
Tina Costopoulou,Agricultural University of Athens,Greece
Ernesto Damiani,University of Milan,Italy
Sabrina De Capitani Di Vimercati,University of Milan,Italy
Christos Douligeris, University of Piraeus, Greece
Carmen Fernandez-Gago,University of Malaga,Spain
Simone Fischer-Hubner,Karlstad University,Sweden
Sara Foresti,University of Milan,Italy
Steven Furnell, University of Plymouth, UK
Jurgen Fu,University of Applied Sciences Upper Austria,Austria
Dimitris Geneiatakis,EC Joint Research Center Ispra,Italy
Christos Georgiadis,University of Macedonia,Greece
Dimitris Gouscos,University of Athens,Greece
Stefanos Gritzalis,University of the Aegean,Greece
Mp.Gupta,Indian Institute of Technology Delhi (IIT Delhi),India
Marit Hansen,Unabhangiges Landeszentrum fur Datenschutz Schleswig-Holstein,Germany
Lazaros Iliadis,Democritus University of Thrace,Greece
Dimitra Kaklamani,National Technical University of Athens,Greece
Christos Kalloniatis,University of the Aegean,Greece
Ioanna Kantzavelou,Technological Educational Institute of Athens,Greece
Sotiris Karetsos, Agricultural University of Athens, Greece
Maria Karyda,University of the Aegean,Greece
Vasilis Katos, Bournemouth University, UK
Spyros Kokolakis,University of the Aegean,Greece
Nicholas Kolokotronis,University of Peloponnese,Greece
Panayiotis Kotzanikolaou,University of Piraeus,Greece
Costas Lambrinoudakis,University of Piraeus,Greece
Maria Lambrou,University of the Aegean,Greece
Konstantinos Limniotis,University of Athens,Greece
Antonio Lioy,Politecnico di Torino,Italy
Javier Lopez,University of Malaga,Spain
Nikos Lorentzos,Agricultural University of Athens,Greece
Euripidis Loukis,University of the Aegean,Greece
Emmanouil Magkos,Ionian University,Greece
Vicky Manthou,University of Macedonia,Greece
Nikolaos Marianos,University of the Aegean,Greece
Giannis Marias,Athens University of Economics and Business,Greece
Olivier Markowitch,Universite Libre de Bruxelles (ULB),Belgium
Vashek Matyas, Masaryk University, Czech Republic
Vojtech Merunka,Czech Technical University in Prague,Czech Republic
Lilian Mitrou, University of the Aegean, Greece
Martin Molhanec,Czech Technical University in Prague,Czech Republic
Haris Mouratidis, University of Brighton, UK
Maria Ntaliani,Agricultural University of Athens,Greece
Christoforos Ntantogian,University of Piraeus,Greece
Martin Olivier,University of Pretoria,South Africa
Rolf Oppliger,eSECURITY Technologies,Switzerland
Andreas Pashalidis,K.U.Leuven,Belgium
Charalampos Patrikakis,National Technical University of Athens,Greece
Guenther Pernul,University of Regensburg,Germany
Elias Pimenidis,University of the West of England,UK
Nineta Polemi, University of Piraeus, Greece
Bart Preneel, K.U. Leuven, Belgium
Andreja Pucihar, University of Maribor, Slovenia
Gerald Quirchmayr,University of Vienna,Austria
Muttukrishnan Rajarajan,City University,UK
Kai Rannenberg,Goethe University Frankfurt,Germany
Panagiotis Rizomiliotis,University of the Aegean,Greece
Carsten Rudolph, Fraunhofer Institute for Secure Information Technology, Germany
Christoph Ruland,University of Siegen,Germany
Pierangela Samarati,University of Milan,Italy
Einar Snekkenes,Gjovik University College,Norway
Miguel Soriano,Universitat Politecnica de Catalunya (UPC),Spain
Diomidis Spinellis,Athens University of Economics and Business,Greece
Paul Spirakis,University of Patras,Greece
Stephanie Teufel,University of Fribourg, iimt,Switzerland
Marianthi Theocharidou, Athens University of Economics & Business, Greece
Yannis Theocharis,University of Mannheim,Germany
Aggeliki Tsochou,Ionian University,Greece
Irene Vassilaki, SCIS, Greece
Maro Vlachopoulou,University of Macedonia,Greece
Vasileios Vlachos,Technological Educational Institute of Larissa,Greece
Spyros Voulgaris,VU University Amsterdam,The Netherlands
Edgar Weippl,Vienna University of Technology,Austria
Christos Xenakis,University of Piraeus,Greece
Constantine Yialouris,Agricultural University of Athens,Greece
Jianying Zhou,Institute for infocomm research,Singapore
Vassilis Zorkadis,Hellenic Data Protection Authority,Greece
Please do not post msgs that are not relevant to the database community at large.  Go to
www.cs.wisc.edu/dbworld for guidelines and posting forms.
To unsubscribe, go to https://lists.cs.wisc.edu/mailman/listinfo/dbworld

Yuheng Hu | 30 Jun 00:52 2015

[Dbworld] CFP EASM 2015: 1st International Workshop on Event Analytics using Social Media Data

[Apologies for cross-posting.]

EASM 2015: 1st International Workshop on Event Analytics using Social Media Data

in conjunction with the
IEEE International Conference on Data Mining (ICDM 2015)

Date: Nov 14, 2015
Location: Atlantic City, New Jersey, USA

Social media channels enjoy many advantages over traditional media
channels, such as ubiquity, mobility, immediacy, and seamless
communication in reporting, covering and sharing real-world events,
e.g., the Boston bombings, the NBA finals, and the U.S Presidential
elections. Given these advantages, social media posts such as tweets
can typically reflect events as they happen, in real-time. Despite
these benefits, social media channels also tend to be noisy, chaotic,
and overwhelming. As a result, the vast amount of noisy social media
data poses tremendous challenges for conducting in-depth analysis,
which is critical to applications for event playback, journalistic
investigation, storytelling, etc. The purpose of this workshop is to
bring together researchers that are working in a variety of areas that
are all related to the larger problem of analyzing and understanding
events using social media responses, to discuss: 1) what are the
recently developed machine learning and data mining techniques that
can be leveraged to address challenges in analyzing events using
social media data, and 2) from challenges in analyzing events, what
are the practical research directions in the machine learning and data
mining community.

EASM 2015 solicits regular technical papers of up to 6 pages following
the IEEE author guidelines as well as short papers of up to 2 pages.
Regular papers will be presented in an oral session. Short papers will
be presented in a demo or poster session. Submissions must be original
and not submitted to or accepted by any other conference or journal.
All submissions will be peer-reviewed by at least three Program
Committee members. The review process will be double-blind. Therefore,
authors must conceal their identity (no author names, no affiliations,
no acknowledgment of sponsors, no direct references to previous work).

Topics of interest include, but are not limited to:
Novel approaches for event analysis on social media
Novel approaches for detecting events from social media
Novel applications of event analysis, e.g., Multimedia and cross-media
event analysis.
Domain-specific social media mining and analytics, such as: sports
events analysis, political event analysis, etc
User modeling and personalization for event recommendation
Opinion mining and sentiment analysis using social media data
Evaluation techniques targeted at social media
Industrial practices and implementations of event analysis systems

Submission Instructions
High quality original submissions are solicited for oral and poster
presentation at the workshop. Papers should not exceed a maximum of 8
pages, and must follow the IEEE ICDM format requirements of the main
conference. All submissions will be peer-reviewed, and all accepted
workshop papers will be published in the proceedings by the IEEE
Computer Society Press.

Important Dates

Paper Submission: July 20, 2015
Author Notification: September 1, 2015.
Workshop: November 14, 2015.

Submission Site:

Organizing Committee
Yuheng Hu, IBM Research (yuhenghu@...)
Yu-Ru Lin, University of Pittsburgh (yurulin@...)
Subbarao Kambhampati, Arizona State University (rao@...)

Yuheng Hu
Research Staff Member
IBM Research Almaden
Please do not post msgs that are not relevant to the database community at large.  Go to
www.cs.wisc.edu/dbworld for guidelines and posting forms.
To unsubscribe, go to https://lists.cs.wisc.edu/mailman/listinfo/dbworld

Qi Yu | 29 Jun 21:36 2015

[Dbworld] Visiting Lecturer Position at RIT

Visiting Lecturer Position at RIT



The Department of Information Sciences and Technologies at RIT invites applications for a Visiting Lecturer position, beginning fall 2015. The successful candidate will be able to teach a broad range of courses in one of the following areas:

  • Data modeling and analysis, including knowledge and expertise in structured and unstructured data, text analytics, NoSQL, and data mining/machine learning;

  • Web application development, including full stack development, scalable web architectures, appropriate use of Client and Server frameworks, and the entire Web development life cycle;

  • Database application development, including database drivers, connection pooling, data layer patterns, and common application development practices and methodologies.


Successful candidates will have the ability to teach both undergraduate and graduate courses, engage students, and perform department service.


We are seeking an individual who has the ability and interest in contributing to a community committed to Student Centeredness; Professional Development and Scholarship; Integrity and Ethics; Respect, Diversity and Pluralism; Innovation and Flexibility; and Teamwork and Collaboration. Select to view links to RITÕs core values, honor code, and diversity commitment.


This is a one-year appointment with the possibility of renewal.



The College:  The B. Thomas Golisano College of Computing and Information Sciences is the largest of RITÕs nine colleges, and has an enrollment of over 2600 undergraduate students and 600 graduate students. The college, with over 100 faculty members, is housed in a modern facility equipped with numerous teaching and research laboratories. The college is home to the departments of Computer Science, Computing Security, Information Sciences and Technologies, Software Engineering, the School of Interactive Games and Media and a college-wide Ph.D. program, providing many opportunities for cooperation and research collaboration within and beyond the college. 


The Department: The Information Sciences & Technologies Department (IST) is one of six administrative units within the College of Computing and Information Sciences and oversees academic and curricula development for both undergraduate and graduate students pursuing degrees in two undergraduate BS programs, four graduate programs, and two advanced certificate programs. The IST department provides leadership, administrative, financial, and logistical support to over 700 undergraduate and graduate students with 30 faculty and 8 staff.



- MS in Information Technology or a related field

- Experience teaching at the undergraduate or graduate level



Apply online at http://careers.rit.edu/faculty. Search for Requisition Number 1824.

Please do not post msgs that are not relevant to the database community at large.  Go to
www.cs.wisc.edu/dbworld for guidelines and posting forms.
To unsubscribe, go to https://lists.cs.wisc.edu/mailman/listinfo/dbworld
Ayser Armiti | 29 Jun 21:14 2015

[Dbworld] Internship Opportunity in Big Data at moovel GmbH


	Big Data Intern (m/f)  - Software Engineering


moovel GmbH stands for modern mobility. Our innovative products, car2go, car2go black, Park2gether and
moovel, are a single source of trendsetting mobility services for our customers. Our goal is to radically
simplify individual mobility. moovel GmbH, which emerged from Daimler Mobility Services GmbH, is a
wholly-owned subsidiary of Daimler AG and is assigned to Daimler Financial Services AG for financial

The moovel Lab is a creative working environment that focuses on improving urban life. For our project
"Using Social Media to Improve Mobility", we are looking for a passionate and talented student to work on
the management and visualization of social network data. 

+ Writing and maintaining a web crawler 
+ Data preprocessing and loading into a NoSQL DBMS 
+ Implementation and integration of NLP and data mining algorithms 
+ Developing a web-based interface to visualize our results and findings 

Skills Requirements: 
+ Strong background of algorithms and data structures 
+ Excellent programming skills (Java,Python) 
+ Experience in NoSQL-Based DBMS, e.g.MongoDB 
+ Knowledge of Unix/Linux 
+ Strong verbal and written communications skills 

+ Experience in NLP and Text mining (named-entity recognition, sentiment analysis) 
+ Experience in open-source tools (StanfordNLP, UIMA, Apache Mahout, TweetNLP etc.) 
+ Experience in web development (HTML5, JavaScript, CSS etc.) 

Location: Stuttgart
Duration of internship: 3 months 
Start date: Sept 1, 2015

Please apply only online and add your CV, letter of motivation (online text field) and certificates to your
application (max. 6 MB).

Please do not post msgs that are not relevant to the database community at large.  Go to
www.cs.wisc.edu/dbworld for guidelines and posting forms.
To unsubscribe, go to https://lists.cs.wisc.edu/mailman/listinfo/dbworld

Yahya Slimani | 29 Jun 19:16 2015

[Dbworld] Deadline Approaching

Call for Papers

Knowledge Discovery and Data Analysis
Nov 15, 2015 – Nov 18, 2015
ESI, Alger’s (Algeria)

KDDA’2015 is an annual leading International Conference on Knowledge Discovery and Data Analysis. The
purpose of the conference is to bring together researchers and actors from academia, industry, and
government to advance the science, engineering, and technology in Data science in general. 

The 1st KDDA’2015 will be held in Alger’s, Algeria. This conference will be organized by the High School
of Computer Science of Oued-Smar (ESI, http://www.esi.dz).  The conference will include four invited
talks and regular papers.  

Paper submission details: 
We invite submission of high-quality papers reporting original research on all aspects of Knowledge
Discovery and Data Analysis. We especially encourage submissions that promote the advancement of KDDA
as a scientific and engineering discipline and submissions that bridge between different disciplines.
All submitted papers will be judged based on their technical soundness, potential impact, rigor,
significance, originality, repeatability, relevance, and clarity.
Papers submitted to KDDA’2015 should be original work, not previously published in a peer reviewed
conference or journal. Substantially similar versions of the paper submitted to KDDA’2015 should not
be under review in another peer-reviewed conference or journal during the KDDA’2015 reviewing period. 
Duplicate submissions are not allowed. Authors are expected to agree to the following terms: "I
understand that the paper being submitted must not overlap substantially with any other paper that I am a
co-author of and that is currently submitted elsewhere. Furthermore, previously published papers with
any overlap are cited prominently in this submission." 

Duplicate submissions will be rejected immediately without review.  

Author information’s: 
Authors are welcome to submit original contributions on all aspects of Knowledge Discovery and Data
Analysis, ranging from theoretical foundations to novel models and algorithms for data mining problems
in science, business, medicine, and engineering. Papers on new and emerging topics are also welcome, as
are application-oriented papers that make innovative technical contributions to research. 
As a rule, all the contributions will be peer-reviewed by three members of the Program Committee. All the
accepted contributions will be published in the proceedings book of the conference. 
Authors are invited to electronically submit original research contributions or experience reports in
English. The submitted manuscript should closely reflect the final paper as it will appear in the

Formatting instructions: 
Your paper should not exceed 15 pages including all text, figures, tables, and references, and be
formatted to Lecture Notes of Computer Science (LNCS) Series by Springer-Verlag
http://www.springer.de/comp/lncs/authors.html  (see Information for LNCS Authors). Only papers in
PDF format will be accepted. Any submission that exceeds length limits or deviates from formatting
requirements may be rejected without review. Only papers using the LaTeX typesetting system will be
accepted. All submitted papers will be judged through triple-blind reviewing, where the identities of
the authors are withheld from the reviewers. As an author, you are required to make a good-faith effort to
preserve the anonymity of your submission, while at the same time allowing the reader to fully grasp the
context of related past work, including your own. Common sense and careful writing will go a long way
towards preserving anonymity. Please take the following steps when preparing your submission:
- Remove the names and affiliations of authors from the title page.
- Remove acknowledgment of identifying names and funding sources.
- Use care in naming your files. Source file names (e.g., "Alice-n-Bob.dvi") are often embedded in the
final output as readily accessible comments.
- Use care in referring to related work, particularly your own. Do not omit references to provide
anonymity, as this leaves the reviewer unable to grasp the context. Instead, reference your past work in
the third person, just as you would any other piece of related work by another author. 

Electronic submission: 
The papers, in PDF format, must be submitted only electronically before the submission deadline (See
Important dates). The submission site will be open from July 15, 2015. All abstracts, submissions and
reviews are handled by the Easy Chair conference system (http://www.easychair.org/).  

The accepted papers from this conference will be submitted for possible publication in several indexed
special issues of prestigious international journals.
Distinguished papers, after further revisions, will be submitted for inclusion into a Special Issue of
J.UCS journal (http://www.jucs.org/).  The aim of this special issue is to select and publish papers that
provide new advances and address new problems and challenges in Knowledge Discovery and Data Analysis.  

Areas of interest include, but are not limited to: 
* Data mining foundations and theory
* Data mining algorithms (supervised, semi-supervised and unsupervised)
* Mining large-scale data
* Mining spatial and temporal data, text, web, graph, stream data, image, video, multimedia
* Applications of data mining: web, multimedia, finance, genomics, bioinformatics, social sciences and
social networks
* Methods for analyzing scientific data
* Statistical techniques for big data
* Systems for large-scale data
* Big Data placement, scheduling, and optimization
* Techniques, processes, and methods for collecting and analyzing Big Data
* Parallel and distributed data mining (Cloud, MPI, Hadoop MapReduce)
* Foundational models for Big Data 
* Algorithms and programming techniques for Big Data 
* Big Data search and mining
* Data integration and indexing for data mining
* KDD methodology and process
* Security and privacy issues in data mining and Big Data
* Information Retrieval for digital libraries and scientific information portal
* Information Retrieval for scientific domains, e.g. social sciences, life sciences, etc.
* Query expansion and relevance feedback approaches
* Classification, categorization and clustering approaches
* Information extraction (including topic detection, entity and relation extraction)
* Recommendations based on explicit and implicit user feedback

Important dates: 

* Abstract registration due		: July 15, 2015
* Submission due                       	: July 31, 2015
* Author notification                 	: October 20, 2015
* Camera-ready papers due       	: November 2, 2015
* Conference date                     	: November 15-18, 2015 

Conference chairs:
Mouloud KOUDIL, ESI, Oued-Smar (Algeria) 
Yahya SLIMANI, ISAMM, Université de Manouba (Tunisia)

Organization Committee:
Fatema Si-Tayeb, ESI, Oued-Smar (Algeria), Chair
Karima Benatchba, ESI, Oued-Smar (Algeria), Co-Chair
Amina Anane, ESI, Oued-Smar (Algeria)
Djahida Belayadi, ESI, Oued-Smar (Algeria)
Mohamed Bellal, ESI, Oued-Smar (Algeria)
Mohamed Benali, ESI, Oued-Smar (Algeria)
Mohamed El Hadi Benelhadj, Université de Constantine 2 (Algeria)
Moez Ben Haj Hmida, ENIT (Tunisia)
Adel Boukhadra, ESI, Oued-Smar (Algeria)
Daoud Boumazouza, ESI, Oued-Smar (Algeria)
Lynda Bounif, ESI, Oued-Smar (Algeria)
Lydia Bouzar, ESI, Oued-Smar (Algeria)
Yacine Chalal, ESI, Oued-Smar (Algeria)
Rachid Chalal, ESI, Oued-Smar (Algeria)
Nassira Cherid, ESI, Oued-Smar (Algeria)
Hachemi Dellys, ESI, Oued-Smar (Algeria)
Riad Hadji, ESI, Oued-Smar (Algeria)
Boualem Khelouat, ESI, Oued-Smar (Algeria)
Leila Hamdad, ESI, Oued-Smar (Algeria)
Lakhdar Laib, ESI, Oued-Smar (Algeria)
Amina Lammari, ESI, Oued-Smar (Algeria)
Naima Lounes, ESI, Oued-Smar (Algeria)
Lila Meziani, ESI, Oued-Smar (Algeria)
Fahima Nader, ESI, Oued-Smar (Algeria)
Souhila Sadeg, ESI, Oued-Smar (Algeria)
Mohamed El Amine Tali, ESI, Oued-Smar (Algeria)
Lilia Zaouche, ESI, Oued-Smar (Algeria)

Program Committee (PRELIMINARY - To be completed later):
* Halis Altun, Mevlana University, Turkey
* Zeyar Aung, Masdar Institute of Science and Technology, Abu Dhabi, United Arab Emirates
* Boualem Benattallah, University of New South Wales, Australia
* Marenglen Biba, University of New York in Tirana, Albania
* Athman Bougattaya, RMIT University, Australia
* Mohand Boughanim, IRIT Toulouse, France
* Daniela Barreiro Claro, Universidade Federal da Bahia, Brazil
* Schahram Dustdar, Vienna University of Technology, Austria
* Wei Gao, Qatar Computing Research Institute, Qatar
* Mathias Gery, Université Jean Monnet, Saint-Etienne, France
* Norbert Gulke, Leibniz-FH - School of business, Hannover, Germany
* Fikret Gurgen, Bogazici University, Turkey
* Mohand-Said Hacid, Université de Lyon 1, France
* Jaap Kamps, Faculty of Humanities, University of Amsterdam, The Netherlands
* Bekir Karlik, Secuk University, Turkey
* Tahar Kechadi, University College Dublin Belfield, Ireland
* Alexios Kotsifakos, Software Engineer at Microsoft, Redmond, USA
* Marin Krulis, Charles University, Prague, Czech
* Chiraz Laatiri, ISAMM Manouba, Tunisia
* Alexey Lastovetsky, UCD School of Computer Science and Informatics, Dublin, Ireland
* Hoai An Le Thi, Université de Metz, France   
* Antoni Lig?za, AGH University of Science and Technology, Poland
* Christos Makris, University of Patras, Greece
* Donato Malerba, Università degli Studi di Bari Aldo Moro, Italy  
* Tanu Malik, University of Chicago, USA
* Stéphane Marchand-Maillet, University of Geneva, Switzerland
* Jean Martinet, Université de Lille 1, France
* Edgar Meij, Yahoo Labs Barcelona, Spain
* Ahmed Moussa, ENSA Université Abdelmalek Essaadi,  Tanger, Maroc
* Lahouari Nourine, Université Clermont-Ferrand, France
* Petra Perner, Institute of Computer Vision and Applied Computer Sciences, Leipzig, Germany
* Jean-Marc Petit, INSA Lyon, France
* Tommi A Pirinen, Dublin City University, Ireland
* Pascal Poncelet, Université Montpellier 2, France
* Florin Rusu, University of California, USA
* Lakhdar Sais, Université d’Artois, France
* Maribel Yasmina Santos, University of Minho, Portugal
* Yahya Slimani, ISAMM Manouba, Tunisia
* Domenico Talia, Università della Calabria, Italy
* Thomas Triplet, Computer Research Institute of Montreal (CRIM), Canada
* Yannis Tzitzikas, University of Crete, Greece
* Genoveva Vargas, Solar | CNRS | LIG-LAFMIA, France
* Marco Viviani, Università degli Studi di Milano-Bicocca / DISCo, Italy
* Can Wang, Commonwealth Scientific and Industrial Research Organization, Australia
* Rui Wang, University of Western Australia, Australia
* Huayu Wu, Institute for Infocomm Research (I2R), Singapore, Malaysia
* Yuqing Melanie Wu, Indiana University, Bloomington, USA
* Guandong Xu, University of Technology, Sydney, Australia
* Osmar R. Zaïane, University of Alberta, Canada
* Mohamed Zaki, Rensselaer Polytechnic Institute, New York, USA
* Qin Zhang, Indiana University, Bloomington, USA
* Yanchang Zhao, RDataMining, Australia

Please do not post msgs that are not relevant to the database community at large.  Go to
www.cs.wisc.edu/dbworld for guidelines and posting forms.
To unsubscribe, go to https://lists.cs.wisc.edu/mailman/listinfo/dbworld

Matti Heikkurinen | 29 Jun 18:45 2015

[Dbworld] IEEE eScience 2015 - early registration available until 10th July

The 11th International IEEE eScience Conference -  August 31st -September 4th 2015 in Munich, Germany. 


Programme: http://escience2015.mnm-team.org/?page_id=73
Registration: http://escience2015.mnm-team.org/?page_id=192
Early registration rate until 10th July 2015!

About eScience and IEEE eScience Conference:

The objective of the IEEE eScience Conference is to promote and encourage all aspects of eScience and its
associated technologies, applications, and tools. The term eScience is meant in its broadest meaning
– effectively any technical, organisational or cultural aspect of the digital revolution of
research is a relevant topic. In short, eScience promotes innovation in collaborative,
computationally- or data-intensive research across all disciplines, throughout the research

More background of eScience as a discipline: http://escience2015.mnm-team.org/?m=201412. 


General Chair: 
  Dieter Kranzlmüller (LMU/LRZ), Hans-Joachim Bungartz (TUM/LRZ)
Program Co-Chair:  
  Nils gentschen Felde (LMU), Shantenu Jha (Rutgers)
Workshop Chair: 
  Antonella Galizia (IMATI)
Dissemination Chair: 
  Matti Heikkurinen (LMU)

Environmental computing committee:
  Anton Frank (LRZ)
  Antti Pursula (CSC)
  Frank Seinstra (NLeSC)
  Horst Schwichtenberg (SCAI) 
  Achim Streit (KIT)
  John Donners (SURF)
  Risto Makkonen (UH) 
  Tiziana Ferrari (EGI.eu)

Programme Committee:

Practical information:

The event will be held at the main building of the Ludwig-Maximilians-Universität München (LMU) in
downtown Munich. In addition, the conference programme also includes a visit to Leibniz Supercomputing
Centre with tours of the Supercomputer and Virtual Reality facilities, as well as a Bavarian style social
event at Rosenheimer Herbstfest.
Please do not post msgs that are not relevant to the database community at large.  Go to
www.cs.wisc.edu/dbworld for guidelines and posting forms.
To unsubscribe, go to https://lists.cs.wisc.edu/mailman/listinfo/dbworld

Panagiotis Bouros | 29 Jun 16:45 2015

[Dbworld] LocalRec <at> RecSys 2015 -- DEADLINE EXTENSION and JOURNAL SPECIAL ISSUE

LocalRec  <at>  RecSys 2015 -- deadline extension and special issue announcement

Important Updates

1. LocalRec accepts submissions until July 6, 2015 (11:59pm PST). 

2. Selected best papers will be invited for an upcoming special issue of the Journal of Information
Technology & Tourism (JITT) published by Springer:

Call For Papers

First ACM RecSys Workshop on Location-Aware Recommendations 2015 (LocalRec'15)
Held in conjunction with the 9th ACM Conference on Recommender Systems (RecSys'15)

Topic: Location-aware recommendations
Venue: Vienna, Austria
Date: September 19, 2015 (morning)
URL: http://www.ec.tuwien.ac.at/LocalRec2015/

Driven by technological advances in hardware (positioning systems, environmental sensors), software
(standards, tools, network services), and aided by various open movements (open, linked, government
data) and the ever-growing mentality of sharing for the greater good (crowdsourcing, crowdfunding,
collaborative and volunteered geographic information), the amount of available geo-referenced data
has seen dramatic explosion over the past few years. Human activities generate data and traces that are
now often transparently annotated with location and contextual information. At the same time, it has
become easier than ever to collect and combine rich and diverse information about locations. Exploiting
this torrent of geo-referenced data provides a tremendous potential to materially improve exi
 sting and offer novel types of recommendation services, with clear benefits in many domains, including
social networks, marketing, and tourism.

Fully exploiting the potential of location-aware recommendations, requires addressing many core
challenges and combining ideas and techniques from various research communities, such as recommender
systems, data management, geographic information systems, social network analytics, text mining.
Bringing together scholars and practitioners from these communities, the aim of this workshop is to
provide a unique forum for discussing in depth and collecting feedback about the challenges,
opportunities, novel techniques and applications of location-aware recommendations, in order to fuel
better and novel recommender systems beyond the current research frontiers.

We solicit original contributions of long and short papers addressing the following non-comprehensive
list of topics:
Location-based social networks
  * friend/communities recommendations
  * event, venue, and other location-aware recommendations
  * extracting preferences, tips, ratings, patterns, habits
  * modeling geo-social influence of users and locations
Location-based marketing
  * viral campaigning
  * event planning
  * location-based advertising
Tourism and mobile commerce
  * trip planning and recommendations
  * automatic guide and tour generation
  * exhibition arrangement
Evaluation of location-aware recommender systems
  * collaborative filtering vs. content-based recommendations
  * case and empirical studies
  * evaluation methods and metrics
  * datasets and benchmarks
Security and privacy implications
  * spatial anonymization and cloaking
  * attack and threat scenarios

Selected best papers will be invited for a special issue of the Journal of Information Technology & Tourism
(JITT) published by Springer.

Submitted papers must be uploaded in PDF format and formatted according to the standard double-column ACM
SIG proceedings guidelines that also apply to the RecSys conference submissions, through the EasyChair
submission site:
Long paper submissions can be up to 8 pages while short papers up to 4 pages long.

Important Dates
  Abstract/Paper Deadline: EXTENDED to July 6, 2015 (11:59pm PST)
  Notification: July 20, 2015 (11:59pm PST)
  Camera-Ready: July 27, 2015 (11:59pm PST)

Organization Committee
  Panagiotis Bouros, Humboldt-Universitaet zu Berlin, Germany
  Neal Lathia, University of Cambridge, United Kingdom
  Matthias Renz, Ludwig-Maximilians-Universitaet Munich, Germany
  Francesco Ricci, Free University of Bozen-Bolzano, Italy)
  Dimitris Sacharidis, Technische Universitaet Wien, Austria

Programm Committee
  Jie Bao, Microsoft Research
  Matthias Braunhofer, Free University of Bozen-Bolzano, Italy
  Chi-Yin Chow, City University of Hong Kong
  Victor Codina, Barcelona Digital Technology Centre, Spain
  Huiji Gao, Arizona State University, USA
  Haosheng Huang, Technische Universitaet Wien, Austria
  Christian S. Jensen, Aalborg University, Denmark
  Marius Kaminskas, University College Cork, Ireland
  Wang-Chien Lee, Pennsylvania State University, USA
  Bernd Ludwig, Universitaet Regensburg, Germany
  Nikos Mamoulis, The University of Hong Kong
  Mario Nascimento, University of Alberta, Canada
  Anastasios Noulas, University of Cambridge, United Kingdom
  Alexei Pozdnouhkov, UC Berkeley, USA
  Mohamed Sarwat, Arizona State University, USA
  Dimitrios Skoutas, Athena RC, Greece
  Wolfgang Woerndl, Technische Universitaet Muenchen, Germany
  Sen Xu, Pennsylvania State University, USA
  Man Lung Yiu, Hong Kong Polytechnic University
Please do not post msgs that are not relevant to the database community at large.  Go to
www.cs.wisc.edu/dbworld for guidelines and posting forms.
To unsubscribe, go to https://lists.cs.wisc.edu/mailman/listinfo/dbworld