Zifang Huang | 1 Nov 02:38 2014

[Dbworld] CFP: The First IEEE International Conference on Multimedia Big Data

Call for Papers

---------------

The First IEEE International Conference on Multimedia Big Data

IEEE BigMM2015

April 20-22, 2015, Beijing, China

http://www.BigMM.org 

Sponsored by IEEE Computer Society

Multimedia is increasingly becoming the "biggest big data" as the most important and valuable source for
insights and information. It covers from everyone's experiences to everything happening in the world.
As such, multimedia big data is spurring on tremendous amount of research and development of related
technologies and applications. 

The IEEE International Conference on Multimedia Big Data (BigMM), jointly sponsored by the IEEE-TCMC
(Technical Committee on Multimedia Computing) and IEEE-TCSEM (Technical Committee on Semantic
Computing), is a world's premier forum of leading scholars in the highly active multimedia big data
research, development and applications. The first BigMM conference, with the theme "Multimedia: The
Biggest Big Data", will be held in Beijing, China, from April 20 to 22, 2015, hosted by Peking University.

Please refer to the conference website for further information: 

http://www.BigMM.org/

The conference solicits high-quality original research papers in any aspect of multimedia big data.
(Continue reading)

Brandon Brooks | 31 Oct 21:47 2014

[Dbworld] Exciting Opportunity for Java Engineers w/ a strong background in Databases!! <at> Boston Teradata


Senior Java Software Engineer (Database)-157695
Description
Java Software Engineer 
Teradata is looking for individuals to join our Teradata Labs Development Center for Hadoop. At Teradata
we are building the next generation database on top of the Hadoop platform to provide structured and
unstructured data analysis at massive scale (Big Data). This position will be responsible for
extending, enhancing, and supporting the functionality of the company’s database product as well as
providing technical oversight and mentorship for less experienced engineers. 
Duties include: 
? Building new functionality to extend SQL support of the company’s product in Java
? Optimizing performance of queries within the product and rate of data loading through changes in the java
query engine or changes to the system architecture 
? Modifying the company’s product code to be more supportable 
? Applying strong familiarity with at least two of: algorithms, compiler internals, database systems, or
distributed systems concepts
? Assisting company’s support team as well as end users to resolve defects in software
? Building and maintaining infrastructure to support the company’s software development processes
? Mentoring new engineers of all types to help them produce better code and better product
? Training new engineers on software developments topics that are relevant to the position
? Interviewing prospective engineer hires and relaying the technological and business value the company
delivers 
? Defining the best practices that the company’s engineers should use to be efficient and effective at
creating maintainable code 
? Identifying patentable intellectual property and assisting in pursuing patents
Qualifications
Requirements: 

? Bachelor’s degree (or foreign equivalent) in Computer Science, Computer Engineering, or related
technology field; 
(Continue reading)

Ahmad Malik | 31 Oct 20:24 2014
Picon

[Dbworld] IGI: Call for Chapters: Handbook of Research on Innovations in Access Control and Management

Call for Chapters: Handbook of Research on Innovations in Access Control and Management

Published by IGI global, USA.

The CFC can be found from:
http://www.igi-global.com/publish/call-for-papers/call-details/1456

Proposals submission: November 15, 2014 (2 to 3 page proposal)
Full Chapters Due: January 31, 2015
Final Submission Date: May 30, 2015

Introduction

For release in the Advances in Information Security, Privacy, and Ethics (AISPE) Book Series.

ISSN: 1948-9730

The Advances in Information Security, Privacy, & Ethics (AISPE) Book Series provides cutting-edge
research on the protection and misuse of information and technology across various industries and
settings. Comprised of scholarly research on topics such as identity management, cryptography, system
security, authentication, and data protection, this book series is ideal for reference by IT
professionals, academicians, and upper-level students.

* * *

Access control has been an important research area for a long time. In the past, access control list and
access matrix were used, but, currently, the NIST standard RBAC model is the most common trend. Other
latest emerging trends are access control for collaborative systems, like social networks, and access
control for big data. On one side, due to the advancement of collaborative technologies, the need for
information sharing is increasing in collaborative projects. Excess information sharing in
(Continue reading)

Alexander Artikis | 31 Oct 18:27 2014
Picon

[Dbworld] 2nd CFP: EPForDM workshop <at> EDBT 2015

************************* Call for Papers ***************************

Event Processing, Forecasting and Decision-Making in the Big Data Era 
(EPForDM)

EDBT 2015 Workshop
March 27, 2015

http://cer.iit.demokritos.gr/epfordm

**********************************************************************

The Big Data era has posed a number of challenges in applications related to event processing. In
particular, the data volume, velocity and distribution necessitate the design on new scalable
approaches for the efficient and timely processing of the produced data. The lack of veracity in the
handled data/events further complicates the problem. Moreover, key challenges concern the use of the
voluminous data in order to forecast future events and perform proactive event-driven decision-making.

Event forecasting is important because eliminating or mitigating an anticipated problem, or
capitalizing on a forecast opportunity, can substantially improve our quality of life, and prevent
environmental and economic damage. For example, changing traffic-light priority and speed limits to
avoid traffic congestions will reduce carbon emissions, optimize transportation and increase the
productivity of commuters. At the business level, making smart decisions ahead of time can become a
differentiator leading to significant competitive advantage. In a wide range of applications,
prevention is more effective than the cure. To prevent problems and to capitalize on opportunities
before they even occur, a proactive event-driven decision-making paradigm is necessary. Decisions are
triggered by fore
 casting events instead of reacting to them once they happen. Moreover, decisions are made in real-time and
require on-the-fly processing of Big Data, that is, extremely large amounts of noi!
 sy data flooding in from various locations, as well as historical data.
(Continue reading)

Fulvio Frati | 31 Oct 18:03 2014
Picon

[Dbworld] [CFP] 11th Intl. Conf. on Open Source Systems (OSS2015)

[Apologies if you receive multiple copies of this CFP]

*******************************************************************************************
11th Intl. Conf. on Open Source Systems (OSS2015)
co-located with the 2015 International Conference on Software Engineering (ICSE2015)

Florence, Italy – 16-17 May 2015
http://www.oss2015.org
*******************************************************************************************

*** Theme: Open Frameworks: from Service to Cloud ***

Free and Open Source Software (FOSS) has had a disruptive effect on the commercial software industry and
the ways that organizations and individuals create, distribute, acquire and use software and
software-based services. In addition to the many standalone FOSS projects, FOSS is at the heart of modern
network-based computing infrastructures and can be found in the vast majority of applications that run
in these environments. 

Many organizations that have been known for developing proprietary software are now actively involved
with FOSS. FOSS adoption continues to grow among businesses, governments, and other organizations.
FOSS remains important for educators and researchers, as well as an important aspect of e-government and
information society initiatives, providing access to high-quality software and the code used to create
it. 

Also, FOSS has taken the lead in a number of crucial ICT domains, like Cloud Computing, where open source
cloud stacks are widely adopted, and Big Data, where a wealth of FOSS solutions is now being built around Hadoop.

The 11th International Conference on Open Source Systems (OSS 2015) will celebrate a decade of advances in
the use of free and open source software by emphasizing areas and topics that will drive future use over the
next decade. This will be achieved through a combination of high-quality research papers, tutorials,
(Continue reading)

M Younas | 31 Oct 17:41 2014
Picon

[Dbworld] CFP: The 9th INTERNATIONAL IEEE SYMPOSIUM ON SERVICE-ORIENTED SYSTEM ENGINEERING (SOSE 2015)

--------------Call for Papers-------

The 9th INTERNATIONAL IEEE SYMPOSIUM ON SERVICE-ORIENTED SYSTEM ENGINEERING (SOSE 2015)

March 30 - April 3, 2015
San Francisco Bay, USA

http://sose2015.com/index.html

Service-Oriented Computing (SOC) exploits services as the fundamental elements for developing
computer-based systems, and represents a paradigm shift away from traditional distributed systems.
Service-oriented systems are becoming increasingly ubiquitous, large-scale, and complex. Such
systems are often distributed across large numbers of resources in different geographical locations
running on heterogeneous infrastructure, with a large and increasing number of diverse users demanding
new techniques for data management and processing.

With SOC coming of age, conceptually well-founded and, at the same time, practical approaches supporting
the whole range of engineering service-oriented systems, i.e., models, architectures,
infrastructures, design, implementation, deployment, testing, delivery, consumption,
maintenance, evaluation and evolution, are still missing in almost all non-basic areas. Hence, the main
themes of the 2015 symposium try to put a new focus on these important aspects of SOC:

- Methods, Languages and Tools for process-based SOC systems engineering
- Advanced models and infrastructures in Service-oriented engineering

Continuing the tradition of the last eight SOSE Symposia, the 9th SOSE will provide a forum for researchers
and practitioners to exchange latest observations, insights, achievements and visions in
Service-Oriented System Engineering. Particularly, SOSE 2015 invites original submissions in all
areas of process and system engineering, as well as software engineering methods, techniques, tools,
applications, and experiments for process- and service-oriented systems and software services. 
(Continue reading)

Thanh Lam Hoang | 31 Oct 16:18 2014
Picon

[Dbworld] Research Scientist - Data Mining IBM Research Dublin

Job description

The Smarter Cities Technology Centre (SCTC) at the IBM Dublin Research Laboratory, Ireland is accepting
applications for full-time researchers from entry-level through principal investigators.

We are hiring researchers in data mining, statistical analysis, predictive modeling, and machine
learning. We are especially interested in candidates with strong background and experience in dealing
with data, control, or planning of urban or environmental systems such as transportation and mobility
services, sustainable energy (smart grid, renewable energy, intelligent buildings), and water
management. Projects will involve identifying applications of data-intensive machine learning,
invention of effective algorithms for these applications, and incorporation of these algorithms in
distributed and parallel software systems.

The successful candidate will have demonstrated ability to define research plans, carry out leading
research, and publish research results through professional journals, academic conferences, and
patents. As a researcher you will be expected to organize challenging problems, develop new solutions,
and work with business & development teams to ensure these solutions have a significant impact.

We offer:
•A stimulating, cross-disciplinary environment in a leading research organization,
•Opportunities for a unique combination of scientific and industrial research into real-world problems
•Excellent ties to research groups worldwide
•Up-to-date infrastructure and resources
•The ability to take part in large-scale international research projects
Desired Skills and Experience

    Doctorate Degree
    At least 2 years experience in data mining, statistical analysis, predictive modeling or machine learning
    At least 2 years experience in software programming with C++ or Java
    English: Fluent 
(Continue reading)

Henrik Leopold | 31 Oct 13:59 2014
Picon

[Dbworld] BPM 2015 - Call for Workshop Proposals

BPM 2015 - Call for Workshop Proposals


BPM 2015 is the 13th conference in a series that provides the most distinguished and specialized forum for researchers and practitioners in business process management (BPM). The conference has a record of attracting innovative research of highest quality related to all aspects of business process management, including theories, frameworks, methods, techniques, architectures, and empirical findings.


Submissions are invited for workshop proposals to be included in the BPM 2015 workshop program. Workshops facilitate the exchange of ideas and experiences among active researchers and stimulate discussions on new and emerging perspectives in line with the conference topics. Workshops may focus on specific research topics or be devoted to applications or standardization issues.


All workshop papers will be published by Springer as a post-workshop proceedings volume in the series Lecture Notes in Business Information Processing (LNBIP). These proceedings will be made available to all registered participants approximately four months after the workshops, while preliminary proceedings will be distributed during the workshop.

Different criteria will be considered by the general workshop chairs for deciding whether or not a proposal is accepted. The workshop proposers should have a strong affinity with the proposed workshop topic and be well connected with experts on that topic. The workshop itself should provide a forum for important, innovative and timely BPM subtopics. Furthermore, we encourage the workshop proposers to integrate mechanisms in their workshop to stimulate discussion and interaction beyond what is possible in a plenary conference session. Beyond these aspects, the workshop chairs will ensure that the accepted workshops as a whole cover a broad spectrum of the BPM research discipline. To this end, there will be a negotiation phase in which we seek to consolidate and mark off promising workshop proposals that show overlap. Note that the final decision on the acceptance format of a workshop will be made by the general workshop chairs considering the af! orementioned criteria and the overall impression of the proposal.


Please submit your workshop proposal including at least the following information:


•         The title of the workshop and an acronym;


•         An outline of the workshop theme, goals, planned activities, and intended audience;


•         An indication of whether the workshop is planned as a full day or a half day event;


•         The targeted or past acceptance rate(s) and number of submissions;


•         A brief biography of each organizer;


•         The activities envisioned to stimulate submissions to the workshop; 


•         The tentative PC and call for papers.


Workshop proposals may be submitted as an A4 PDF document via 

https://www.easychair.org/conferences/?conf=bpmws2015 until the deadline indicated below.

 

Important Dates


•         04 Dec 2014:         Deadline for submitting workshop proposals


•         18 Dec 2014:         Notification of proposal acceptance, rejection, or invitation to negotiation


•         29 May 2015:       Workshop papers submission deadline (tentative)


•         29 June 2015:       Workshop papers notification deadline (tentative)


•         20 July 2015:         Workshop camera-ready papers deadline


•         31 Aug 2015:        Workshops

 

General Workshop Chairs


Hajo Reijers, VU University Amsterdam | Eindhoven University of Technology, The Netherlands


Manfred Reichert, University of Ulm, Germany

_______________________________________________
Please do not post msgs that are not relevant to the database community at large.  Go to
www.cs.wisc.edu/dbworld for guidelines and posting forms.
To unsubscribe, go to https://lists.cs.wisc.edu/mailman/listinfo/dbworld
Antonis Bikakis | 31 Oct 12:02 2014
Picon
Picon

[Dbworld] Lecturer In Computer Science and Information Technology (corrected link)

The UCL Department of Information Studies offers postgraduate qualifications and training for the
various information professions, and collaborates in the delivery of an inter-faculty BSc in
Information Management for Business. It also has a strong international reputation for research and was
very highly rated in the 2008 Research Assessment Exercise.

Duties and Responsibilities

We are seeking an enthusiastic and innovative individual to appoint to a full-time lectureship from 1
January 2015. The research focus of the post will ideally be in areas related to statistical and/or
inductive machine learning, automated decision making, crowdsourcing, and multi-agent systems, and
in interdisciplinary applications of these areas to other areas of research within the Department
and/or UCL. The initial teaching focus will be on developing and expanding the computer science elements
of the BSc in Information Management for Business. The successful candidate will also be expected to
teach at Master’s level, supervise research students if/when opportunities arise, and undertake
some administrative duties.

Key Requirements

Applicants should hold a PhD in a relevant subject, and should have some prior experience of teaching at
university level. Candidates should be able to demonstrate an ability and commitment to conduct high
quality research with a view to producing high quality publications, and an enthusiasm for
collaborative, interdisciplinary work.

Closing Date: 16 Nov 2014
Interview Date: 16 December 2014

For further information please visit: https://www.ucl.ac.uk/dis/occasional/vacancies
_______________________________________________
Please do not post msgs that are not relevant to the database community at large.  Go to
www.cs.wisc.edu/dbworld for guidelines and posting forms.
To unsubscribe, go to https://lists.cs.wisc.edu/mailman/listinfo/dbworld

Peter Wood | 31 Oct 10:42 2014
Picon

[Dbworld] Lecturer A/B in Computer Science position (London)

The Department of Computer Science and Information Systems at Birkbeck, University of London, is seeking
suitable applicants for the post of Lecturer A/B in Computer Science.  Details are given below, with
further information, including how to apply, available from jobs.bbk.ac.uk.

Reference Number	11410
Location		London, Bloomsbury
School/Department	Computer Science and Information Systems
Position Type		Open ended (Permanent)
Hours			35
Salary from/to		£35343 - £49020

Purpose and Main Duties

Birkbeck, University of London, is a research-intensive institution ranked in the top 1% of universities
in the world by Times Higher Education.  The School of Business, Economics and Informatics brings
together the College’s business-facing departments and has expanded by over 70% since its
creation in 2009. We are based in the heart of Bloomsbury, a few minutes walk from the British Library,
British Museum and other University of London colleges.

The Department of Computer Science and Information Systems is one of four in the School and it brings
together research and teaching expertise related to its major research activities in Information
Management and Web Technologies, and in Computational Intelligence. You will be expected to contribute
to, or complement, one or both of these research groups. 

Candidate Requirements

We would particularly welcome applicants with expertise in software engineering, programming
languages and systems, or data mining. All academic staff of the department contribute to our
multidisciplinary collaborations at the London Knowledge Lab.

Applicants are expected to have teaching experience and, in particular, to be able to develop and deliver
undergraduate and postgraduate courses in computer programming, fundamentals of computing and in one
or more of the following areas: distributed/parallel systems, networking and software engineering.

We require applicants to have completed a Ph.D. or equivalent in a relevant field and have established an
international reputation for outstanding research in Computer Science. It is expected that you will
have experience commensurate with the level of the post.

Further Information

Salary range: 

Lecturer A: £35,343 rising to £40,460 per annum inclusive of London Allowance.

Lecturer B: £41,577 rising to £49,020 per annum inclusive of London Allowance.

The closing date for completed applications is Friday 9 January 2015 at midnight.

Interviews are due to take place in mid February 2015

This post is full time, 35 hours per week (1.0fte) and open-ended. The appointment is subject to a
probationary period. Birkbeck also provides a generous defined salary pension scheme, 31 days paid
leave, flexible working arrangements and other great benefits. 

Informal enquiries should be addressed to the Assistant Dean, Prof Mark Levene (m.levene@...)

If you have difficulties accessing this post please email, humanresources <at> bbk.ac.uk, quoting the
reference 11410 in the subject header.

Birkbeck is committed to providing the highest quality academic and working environment where all staff,
students, visitors and contractors are employed, welcomed, respected and treated in a consistent and
non-discriminatory manner. This approach will be applied irrespective of race, gender, disability,
age, sexual orientation, religion or faith, political belief and social status.

_______________________________________________
Please do not post msgs that are not relevant to the database community at large.  Go to
www.cs.wisc.edu/dbworld for guidelines and posting forms.
To unsubscribe, go to https://lists.cs.wisc.edu/mailman/listinfo/dbworld

Georgios Karopoulos | 31 Oct 09:58 2014
Picon

[Dbworld] [Extension] SI on Security and Privacy in Unified Communications: Challenges and Solutions

[Apologies if you receive multiple copies of this message]

Manuscript submission: extended to November 21, 2014

========================================================================

*Call for Papers*

Computer Communications Journal, Elsevier
(Current Impact Factor: 1.352)

Special Issue on:
Security and Privacy in Unified Communications: Challenges and Solutions

Direct Link:
http://www.journals.elsevier.com/computer-communications/call-for-papers/special-issue-on-security-and-privacy-in-unified-communicati/

========================================================================

Unified Communications (UC) merge different communication technologies, types of products, and
services, from various manufacturers, operators, and countries, following diverse policies and
standards. Specifically, in the context of UC, a range of communication tools are integrated in a way that
both corporations and individuals are able to manage all their communications in one entity instead of
doing it disjointly. It is therefore said that UC bridges the opening between the various computer
related communication technologies and Voice over IP (VoIP). However, this high level of heterogeneity
expands the risks related to security and privacy that stakeholders should deal with. To eliminate or
even prevent the increasing threats to end-users and operators, it is important to explore this growing
and timely research topic.
This feature topic will benefit the research community towards identifying challenges and
disseminating the latest methodologies and solutions to UC security and privacy issues. Its objective
is to publish high-quality articles presenting open issues, algorithms, protocols, policies,
frameworks, standards, and solutions for UC related to security and privacy. Only technical papers
describing previously unpublished, original, state-of-the-art research, and not currently under
review by a conference or a journal will be considered. Reviews and case studies which address
state-of-art research and state-of-practice industry experiences are also welcomed. We solicit
papers in a variety of topics related to unified communications security and privacy, including, but not
limited to:

- Authorization and access control for UC services
- Denial of service prevention schemes for UC
- Reliability and availability issues on UC
- Penetration testing, intrusion detection and prevention
- End-to-end security solutions
- Cryptographic protocols for UC
- Voice security
- Signaling security and privacy
- Multimedia application security and privacy analysis
- Multimedia communication platforms vulnerabilities and attacks
- Security and privacy in mobile communication services
- Smartphone multimedia apps security and privacy
- Social networking security and privacy
- Testbed and case studies for secure and private UC services
- Trust establishment in UC
- IP Multimedia Subsystem (IMS) security
- Privacy and identity management 
- Privacy enhancing technologies for UC
- Privacy models for UC
- Security and privacy assessment for UC
- Security policies
- Auditing, verification, and validation of UC services
- Risk analysis and management
- Cyber-security issues affecting UC
- Protection of UC as a Critical Information Infrastructure
- VoIP peering security issues

All received submissions will be sent out for peer review by at least two experts in the field and evaluated
with respect to relevance to the special issue, level of innovation, depth of contributions, and quality
of presentation. Guest editors will make an initial determination of the suitability and scope of all
submissions. Papers that either lack originality, clarity in presentation or fall outside the scope of
the special issue will not be sent for review and the authors will be promptly informed in such cases.
Submitted papers must not be under consideration by any other journal or publication.

Schedule

Manuscript submission deadline: November 21, 2014
Pre-notification (first round): January 30, 2015
Final-notification (second round): April 3, 2015
Publication of special issue: 2015 (Tentative)

Submission Details

Authors should follow the instructions available at http://ees.elsevier.com/comcom - kindly click the
“Guide for Authors” link in the top box on the right side. When submitting the article, select “UC
Security and Privacy” in the “Select an Article Type” box in the submission process.

Guest Editors

Georgios Karopoulos
Joint Research Centre (JRC), Italy
e-mail: georgios.karopoulos@...

Georgios Portokalidis 
Stevens Institute of Technology, USA
e-mail: gportoka@...

Josep Domingo-Ferrer
Universitat Rovira i Virgili, Catalonia
e-mail: josep.domingo@...

Ying-Dar Lin 
National Chiao Tung University (NCTU), Taiwan
e-mail: ydlin@...

Dimitris Geneiatakis
Joint Research Centre (JRC), Italy
e-mail: dimitrios.geneiatakis@...

Georgios Kambourakis
University of the Aegean, Greece
e-mail: gkamb@...
_______________________________________________
Please do not post msgs that are not relevant to the database community at large.  Go to
www.cs.wisc.edu/dbworld for guidelines and posting forms.
To unsubscribe, go to https://lists.cs.wisc.edu/mailman/listinfo/dbworld


Gmane