Jez | 25 May 08:25 2015

When to (not) use -no-naked-pointers?


I noticed that 4.02 now has the no-naked-pointers option. I'd like to better understand when I shouldn't use it -- i.e. what kinds of operations create naked pointers? I suppose that these pointers can only be generated by C code; an example of when their use may arise would be nice :)

Announce Announcements | 22 May 16:27 2015

Second IEEE/ACM International Conference on Big Data Computing (BDC 2015): Second Call for Papers

*** Second Call for Papers ***

Second IEEE/ACM International Conference on Big Data Computing
(BDC 2015)

December 07-10, 2015, St. Raphael Resort, Limassol, Cyprus

Co-located with the 8th IEEE/ACM International Conference
on Utility and Cloud Computing (UCC 2015)


Rapid advances in digital sensors, networks, storage, and computation along
with their availability at low cost is leading to the creation of huge collections
of data -- dubbed as Big Data. This data has the potential for enabling new
insights that can change the way business, science, and governments deliver
services to their consumers and can impact society as a whole. This has led
to the emergence of the Big Data Computing paradigm focusing on sensing,
collection, storage, management and analysis of data from variety of sources
to enable new value and insights.

To realize the full potential of Big Data Computing, we need to address
several challenges and develop suitable conceptual and technological
solutions for dealing them. These include life-cycle management of data,
large-scale storage, flexible processing infrastructure, data modeling,
scalable machine learning and data analysis algorithms, techniques for
sampling and making trade-off between data processing time and accuracy,
and dealing with privacy and ethical issues involved in data sensing, storage,
processing, and actions.

The International Symposium on Big Data Computing (BDC) 2015 -- held in
conjunction with 8th IEEE/ACM International Conference on Utility and Cloud
Computing (UCC) 2015, December 7-10, 2015, St. Raphael Resort, Limassol,
Cyprus, aims at bringing together international researchers, developers,
policy makers, and users and to provide an international forum to present
leading research activities, technical solutions, and results on a broad range
of topics related to Big Data Computing paradigms, platforms and their
applications. The conference features keynotes, technical presentations,
posters, and workshops.


Authors are invited to submit original unpublished research manuscripts
that demonstrate current research in all areas of Big Data Computing.

Topics of interest include but are not limited to:

I. Big Data Science
· Analytics
· Algorithms for Big Data
· Energy-efficient Algorithms
· Big Data Search
· Big Data Acquisition, Integration, Cleaning, and Best Practices
· Visualization of Big Data

II. Big Data Infrastructures and Platforms
· Programming Systems
· Cyber-Infrastructure
· Performance evaluation
· Fault tolerance and reliability
· I/O and Data management
· Storage Systems (including file systems, NoSQL, and RDBMS)
· Resource management
· Many-Task Computing
· Many-core computing and accelerators

III. Big Data Security and Policy
· Management Policies
· Data Privacy
· Data Security
· Big Data Archival and Preservation
· Big Data Provenance

IV. Big Data Applications
· Scientific application cases studies on Cloud infrastructure
· Big Data Applications at Scale
· Experience Papers with Big Data Application Deployments
· Data streaming applications
· Big Data in Social Networks
· Healthcare Applications
· Enterprise Applications

One or more best paper awards will be given for outstanding contributed


Authors are invited to submit papers electronically. Submitted manuscripts
should be structured as technical papers and may not exceed 10 letter size
(8.5 x 11) pages including figures, tables and references. Authors should
submit the manuscript in PDF format and make sure that the file will print
on a printer that uses letter size (8.5 x 11) paper. The official language of
the meeting is English. All manuscripts will be reviewed and will be judged
on correctness, originality, technical strength, significance, quality of
presentation, and interest and relevance to the conference attendees. Papers
conforming to the above guidelines can be submitted through the BDC 2015
paper submission system:

Submitted papers must represent original unpublished research that is not
currently under review for any other conference or journal. Papers not
following these guidelines will be rejected without review and further action
may be taken, including (but not limited to) notifications sent to the heads of
the institutions of the authors and sponsors of the conference. Submissions
received after the due date, exceeding length limit, or not appropriately
structured may also not be considered. Authors may contact the conference
PC Chair for more information.

At least one author of each paper must be registered for the conference in
order for the paper to be published in the proceedings. Presentation of an
accepted paper at the conference is a requirement of publication. Any paper
that is not presented at the conference will not be included in IEEE Xplore.


Selected papers from BDC 2015 will be invited to extend and submit to the
Special Issue on Big Data Computing in the IEEE Transaction on Cloud


· Paper submissions due: 03 July, 2015
· Notification of acceptance: 21 August, 2015
· Camera ready papers due: 21 September, 2015

· Early and author registration deadline: 21 September, 2015

· Proceedings-published posters due: 28 August, 2015
· Notification of acceptance: 18 September, 2015
· Camera ready posters due: 21 September, 2015


General Chairs
· Rajkumar Buyya, University of Melbourne, Australia
· George Papadopoulos, University of Cyprus

Program Committee Chairs (bdc15-chairs <at>
· Amy Apon, National Science Foundation, USA
· Ioan Raicu, Illinois Institute of Technology & Argonne National Laboratory,
· Manish Parashar, Rutgers University, USA

Program Committee Vice Chairs
· Ilkay Altintas, University of California, San Diego, USA
· Omer Rana, Cardiff University, UK

Program Committee Members
· Alexander Rasin, DePaul University, USA
· Alok Choudhary, Northwestern University, USA
· Abhishek Chandra, University of Minnesota, USA
· Andre Luckow, BMW IT Research Center, USA
· Daniel Katz, University of Chicago and Argonne National Lab, USA
· Dongfang Zhao, Illinois Institute of Technology, USA
· Douglas Thain, University of Notre Dame, USA
· Florian Schintke, Zuse Institute Berlin, Germany
· Giuliano Casale, Imperial College London, UK
· Jaliya Ekanayake, Microsoft, USA
· Jessica Chen-Burger, Heriot-Watt University, UK
· Judy Qiu, Indiana University, USA
· Justin Wozniak, Argonne National Lab, USA
· Ke Wang, Illinois Institute of Technology, USA
· Kesheng (John) Wu, Lawrence Berkeley National Lab, USA
· Kyle Chard, University of Chicago and Argonne National Lab, USA
· Lavanya Ramakrishnan, Lawrence Berkeley National Laboratory, USA
· Marco Netto, IBM Research, Brazil
· Matei Ripeanu, University of British Columbia, Canada
· Matei Stroila, HERE, USA
· Nagiza Samatova, North Carolina State University, USA
· Paolo Missier, Newcastle University, UK
· Paul Watson, NewCastle University, UK
· Peter Burnap, Cardiff University, UK
· Rahul Potharaju, Microsoft, USA
· Rajkumar Kettimuthu, Argonne National Lab and University of Chicago, USA
· Robert Ross, Argonne National Lab, USA
· Samer Al-Kiswany, University of British Columbia, Canada
· Scott Klasky, Oak Ridge National Lab, USA
· Wei Tang, Argonne National Lab, USA
· Weidong Shi, University of Houston, USA
· Xiaolin (Andy) Li, University of Florida, USA
· Yanlong Yin, Bloomberg, USA
· Yong Chen, Texas Tech University, USA
· Yong Zhao, University of Electronic Science and Technology, China
· Zhao Zhang, University of California, Berkeley, USA

Cyber Chair
· Dongfang Zhao, Illinois Institute of Technology, USA

Local Organizing Committee Chair
· George Angelos Papadopoulos, University of Cyprus, Cyprus

This is not SPAM. If you want to be removed from this list,
please send an email to [announce <at>] with the
single word 'remove' in the subject of the email.
GRLMC | 23 May 12:42 2015

InfoSec 2015: registration deadline 3 June

*To be removed from our mailing list, please respond to this message with
UNSUBSCRIBE in the subject line*



InfoSec 2015

Bilbao, Spain

July 6-10, 2015

Organized by
Deusto University
Rovira i Virgili University


--- 6th registration deadline: June 3, 2015 ---



InfoSec 2015 will be a major research training event addressed to graduates
and postgraduates in the first steps of their academic career. With a global
scope, it aims at updating them about the most recent advances in the
critical and fast developing area of information security, which covers a
large spectrum of current exciting academic research and industrial
innovation. It refers to procedures to defend information from unauthorized
access, use, modification, recording or destruction, with a critical role to
play in order to avoid or minimize risks in the digital world. Renowned
academics and industry pioneers will lecture and share their views with the

Most information security subareas will be displayed, namely: computer
security, cryptography, privacy, cyber security, mobile security, network
security, world wide web security, fraud prevention, data protection, etc.
Main challenges of information security will be identified through 4 keynote
lectures, 28 six-hour courses, and 1 round table, which will tackle the most
active and promising topics. The organizers believe outstanding speakers
will attract the brightest and most motivated students. Interaction will be
a main component of the event. An open session will give participants the
opportunity to present their own work in progress in 5 minutes.


Graduates and postgraduates from around the world. There are no formal
pre-requisites in terms of academic degrees. However, since there will be
differences in the course levels, specific background knowledge may be
required for some of them.

InfoSec 2015 is also appropriate for more senior people who want to keep
themselves updated on recent developments and future trends. They will
surely find it fruitful to listen and discuss with major researchers,
industry leaders and innovators.


In addition to keynotes, 3-4 courses will run in parallel during the whole
event. Participants will be able to freely choose the courses they will be
willing to attend as well as to move from one to another.


InfoSec 2015 will take place in Bilbao, the capital of the Basque Country
region, famous for its gastronomy and the seat of the Guggenheim Museum. The
venue will be:

DeustoTech, School of Engineering
Deusto University
Avda. Universidades, 24
48014 Bilbao


Jan Camenisch (IBM Research, Zurich), Privacy in a Digital World: a Lost

Hao Chen (University of California, Davis), (In)security of Mobile Apps in
Untrusted Networks

Jennifer Seberry (University of Wollongong), The Global Village: the
Beginning of the Need for Computer Security [via videoconference]

Gene Tsudik (University of California, Irvine), Off-line Proximity-based
Social Networking


N. Asokan (Aalto University), [intermediate] Mobile Security: Overview of
Hardware Platform Security and Considerations of Usability

Jan Camenisch (IBM Research, Zurich), [introductory/intermediate]
Technologies to Protect Online Privacy

Hao Chen (University of California, Davis), [intermediate/advanced] Security
of the Mobile App Ecosystem

Nicolas T. Courtois (University College London), [introductory/intermediate]
Security of ECDSA in Bitcoin and Crypto Currency

Claude Crépeau (McGill University, Montréal), [introductory/intermediate]
Quantum Computation, Cryptography and Cryptanalysis

Joan Daemen (ST Microelectronics Belgium, Diegem),
[introductory/intermediate] Sponge Functions, Keccak and SHA-3

Sajal K. Das (Missouri University of Science and Technology, Rolla),
[intermediate/advanced] Securing Cyber-Physical Systems: Challenges and

Sabrina De Capitani di Vimercati (University of Milan),
[introductory/intermediate] Security and Privacy in the Cloud

Hervé Debar (Télécom SudParis), [introductory/intermediate] Detection and
Reaction to Attacks: from Intrusion Detection to Cyber-Defense

Rosario Gennaro (City University of New York), [intermediate/advanced] A
Survey of Verifiable Delegation of Computation

Trent Jaeger (Pennsylvania State University, University Park),
[intermediate/advanced] How to Add Security Enforcement to Legacy Programs

Antoine Joux (Pierre et Marie Curie University, Paris),
[introductory/intermediate] Discrete Logarithms in Finite Fields

Lars R. Knudsen (Technical University of Denmark, Lyngby),
[introductory/intermediate] Block Ciphers: the Workhorses in Cryptography

Songwu Lu (University of California, Los Angeles),
[introductory/intermediate] Cellular Network Security: Issues and Defenses

Catherine Meadows (Naval Research Laboratory, Washington DC),
[introductory/intermediate] Formal Analysis of Cryptographic Protocols

Nasir Memon (New York University), [introductory/intermediate] User

Ethan L. Miller (University of California, Santa Cruz),
[intermediate/advanced] Securing Stored Data in a Connected World

Stefano Paraboschi (University of Bergamo), [introductory/intermediate] Data
Protection in Network-enabled Systems

Bart Preneel (KU Leuven), [introductory/intermediate] Cryptology: State of
the Art and Research Challenges

Jean-Jacques Quisquater (Catholic University of Louvain),
[introductory/intermediate] The History of RSA: from Babylon to Smart Cards

Shantanu Rane (Palo Alto Research Center), [introductory/intermediate]
Privacy-preserving Data Analytics: Problems, Solutions and Challenges

Mark Ryan (University of Birmingham), [introductory/intermediate] Designing
Security Protocols: Electronic Voting, and Electronic Mail

Stefan Saroiu (Microsoft Research, Redmond), [advanced] Protecting Data on
Smartphones and Tablets Using Trusted Computing

Milind Tambe (University of Southern California, Los Angeles),
[introductory/intermediate] Introduction to the Emerging Science of Security

Gene Tsudik (University of California, Irvine), [intermediate/advanced]
Security and Privacy in Candidate Future Internet Architectures

Yang Xiao (University of Alabama, Tuscaloosa), [introductory/advanced]
Security in Smart Grids

Wenyuan Xu (University of South Carolina, Columbia), [intermediate] Security
and Privacy Analysis of Embedded Systems

Yuliang Zheng (University of North Carolina, Charlotte), [introductory]
Cryptography and the Future of Money


An open session will collect 5-minute presentations of work in progress by
participants. They should submit a half-page abstract containing title,
authors, and summary of the research to adrian.dediu <at> by June 29 at
the latest.


Adrian Horia Dediu
Carlos Martín-Vide (co-chair)
Borja Sanz (co-chair)
Florentina Lilica Voicu


The registration form can be found at:

The selection of up to 8 courses requested in the registration template is
only tentative and non-binding. For the sake of organization, it will be
helpful to have an approximation of the respective demand for each course.

Since the capacity of the venue is limited, registration requests will be
processed on a first come first served basis. The registration period will
be closed and the on-line registration facility disabled when the capacity
of the venue will be complete. It is much recommended to register prior to
the event.


Fees are a flat rate covering the attendance to all courses during the week.
There are several early registration deadlines. Fees depend on the
registration deadline.


Accommodation for participants is available at the Colegio Mayor Deusto
(student hostel). Since there may exist problems to find accommodation in
Bilbao at a reasonable price during the week of the event, the organizers'
advice is to book as soon as possible, and anyway by May 27. To do it, write
to Carlson Wagonlit Travel at estudiantesud <at>


Participants will be delivered a certificate of attendance.


florentinalilica.voicu <at>


Deusto University
Rovira i Virgili University

Este mensaje no contiene virus ni malware porque la protección de avast! Antivirus está activa.


Caml-list mailing list.  Subscription management and archives:
Beginner's list:
Bug reports:
Vincent Balat | 22 May 18:28 2015

Job: Ocaml Engineer in Paris


L'équipe Ocsigen recherche un/une développeur/se avec de bonnes connaissances en OCaml pour participer au développement d'une application Web Ocsigen (Eliom + Js_of_ocaml) dans une start-up située à Paris.

Contactez-moi pour plus d'information !

The Ocsigen team is looking for a full time OCaml developer with good OCaml skills to work on the development of a Web application using Ocsigen (Eliom + Js_of_ocaml) in a start-up located in Paris.

Please contact me for more information!

Vincent Balat

Announce Announcements | 21 May 16:17 2015

CONTEXT 2015: Final Call for Papers and Posters (extended deadline!)

*** Final Call for Papers and Posters ***

The 9th International and Interdisciplinary Conference on Modeling
and Using Context (CONTEXT 2015)

2–6 November 2015, Lordos Beach Hotel, Larnaca, Cyprus

*** Extended Deadline: June 15, 2015 ***

The CONTEXT conferences are the world’s prime forum for presentation and
exchange of insights and cutting-edge results from the wide range of
disciplines concerned with context.

The main theme of CONTEXT 2015 is “Back to the roots”, focusing on the
importance of interdisciplinary cooperations and studies of the phenomenon.
Context, context modeling and context comprehension are central topics in
linguistics, philosophy, sociology, artificial intelligence, computer science,
art, law, organizational sciences, cognitive science, psychology, etc. and are
also essential for the effectiveness of modern, complex and distributed
software systems.

CONTEXT 2015 invites high-quality contributions from researchers and
practitioners in foundational studies, applications and evaluations of
modeling and use of context in all relevant fields. Areas of interest include,
but are not limited to, the role of context seen from different perspectives in:

• Agent-based architectures
• Ambient intelligence
• Cognition and perception by humans and artifacts
• Context-aware and situated systems
• Context modeling tools
• Communication and dialogue
• Data analysis and visualization
• Decision making
• Discourse comprehension and representation
• Engineering, e.g., in transport networks, industrial plants etc.
• Experimental philosophy and experimental pragmatics
• (Formal) models of context
• Human-computer interaction
• Knowledge representation
• Language acquisition and processing
• Learning, knowledge management and sharing
• Logic and reasoning
• Machine learning
• Ontology/ies
• Semantics and Pragmatics
• Smart and interactive spaces
• Understanding art, images, music and theatre


Accepted papers and poster abstracts will be published in a volume of the
Springer LNAI series.

Submission format

Submissions may be either full papers of up to 14 pages (in Springer LNCS
format) or poster abstracts of 4–6 pages. Full papers may be accepted as such
with oral presentation, or their authors may be invited to prepare a poster
abstract. Detailed formatting and submissions instructions will be provided.

Conference events

CONTEXT 2015 will include paper presentation sessions, a poster and
demonstration session, two days of workshops, and a doctoral consortium as
well as keynote talks and a panel discussion. Workshops and the doctoral
consortium will circulate separate calls for papers and participation, which
will also be available at the conference web site. All accepted authors will have
the option of presenting a system demonstration at the poster session.

Keynote talks

• Emma Borg, University of Reading, UK
Linguistic Meaning, Context and Assertion
• Enrico Rukzio, Universität Ulm, Germany
Mobile Interaction with Pervasive User Interfaces


CONTEXT 2015 workshops will provide a platform for presenting novel and
emerging ideas in the use and the modelling of context in a less formal and possibly more focused way than the conference itself. Three workshops are
confirmed so far:

• Smart University 3.0
• CATI - Context Awareness & Tactile design for mobile Interaction

Important dates

Full papers and posters:
• Submission deadline: June 15, 2015 (extended) 
• Notification: July 13, 2015
• Final version: August 17, 2015

Workshops and Doctoral Symposium Papers:
• Submission deadline: August 1, 2015 
• Notification: September 1, 2015
• Final version: October 1, 2015

Doctoral Consortium

The Context 2015 Doctoral Symposium is an opportunity for doctoral researchers to showcase their work and discuss problems, challenges, and
ideas in an open and collegial environment with expert feedback. The
Doctoral Symposium is a workshop for doctoral researchers from all over
the world who are in the early and middle phases of their research work
(i.e., the Symposium is not intended for those who are finished or nearly finished their research).

Program Chairs

Henning Christiansen, Roskilde University, Denmark
Isidora Stojanovic, UPF, Spain & CNRS, France

Workshop Chair

Samia Oussena, University of West London, UK

Local Arrangements Chair

George Angelos Papadopoulos, University of Cyprus, Cyprus

General Chair

Henning Christiansen, Roskilde University, Denmark

Chairs of the Community of Context

Patrick Blackburn, Roskilde University, Denmark
Patrick Brezillon, Université Pierre et Marie Curie, France
Henning Christiansen, Roskilde University, Denmark
Richard Dapoigny, Université de Savoie, France
Thomas R. Roth-Berghofer, University of West London, UK
Hedda R. Schmidtke, Carnegie Mellon University, USA

Look for updates and more details at:

This is not SPAM. If you want to be removed from this list,
please send an email to [announce <at>] with the
single word 'remove' in the subject of the email.
Trevor Smith | 21 May 18:42 2015



Is it possible to encode a recursive, heterogenous map and list datastructure with GADTs?

I want to encode JSON (there are already a couple of great libraries out there so this is kind of an academic question). I would like to have functions that can only take a JSON map type, for example to take a json map and return a value. The key here is that the map can hold values of type int,string and also maps. Is this possible?

eg get : (map : map json) -> key:string -> 'a json

Thank you.

Announce Announcements | 20 May 17:12 2015

IEEE/ACM UCC 2015: Third Call for Papers and Tutorial Proposals

*** Third Call for Papers and Tutorial Proposals ***

8th IEEE/ACM International Conference on Utility and Cloud
Computing (UCC 2015)

December 07-10, 2015, St. Raphael Resort, Limassol, Cyprus


Cloud Computing delivers computational resources on-demand as services
that are commoditized and delivered analogous to traditional utilities such as
electricity, gas, water and telephony. Cloud service offerings for compute,
storage and communication resources as well as for hosted software and data
are growing at a tremendous rate, and it is essential to understand how to
effectively transform these services into Utilities that provide value to both
users and providers. There is also increasing interest from commercial
providers to offer business and revenue models around the services they
offer. Understanding how these models could be used to provide utility for
users, intermediary brokers (aggregators) and providers is also an area of
active research. UCC is the premier IEEE/ACM conference covering all areas
related to Cloud Computing as a Utility and provides an international forum
for leading researchers and practitioners in this important and growing field.
UCC 2015, to be held in Cyprus, will happen as Cloud providers worldwide
add new services and increase Cloud utility at an accelerated pace, and Cloud
service users explore new usage modes.

This will be the 8th UCC in a successful conference series. Previous events
were held in Shanghai, China (Cloud 2009), Melbourne, Australia (Cloud 2010
& UCC 2011), Chennai, India (UCC 2010), Chicago, USA (UCC 2012), Dresden,
Germany (UCC2013), and London, UK (UCC 2014).


Authors are invited to submit original unpublished research manuscripts that
demonstrate current research in all areas of Cloud and Utility computing
including design and analysis of distributed and centralized Cloud systems,
data centre design and engineering, economic and market models for cloud
systems, revenue and business models and their applications in scientific,
engineering, and commercial deployment.

Topics of interest include but are not limited to:

• Big Data and Analytics

• Principles and theoretical foundations of Utility Computing, including
pricing and service models

• Policy languages and Programming models

• Utility driven model and mechanisms for Cloud federations

• Autonomic techniques for Clouds and Cloud applications

• Utility-driven platforms for Clouds

• Architectural models to achieve Utility in Clouds

• Designs and deployment models for Clouds: private, public, hybrid,
federated, aggregated

• Cloud Computing middleware, stacks, tools, delivery networks and
services at all layers (XaaS)

• Virtualization technologies and other enablers

• Economic models and scenarios of use

• Scalability and resource management: brokering, scheduling, capacity
planning, parallelism and elasticity, as well as marketplaces

• Cloud management: autonomic, adaptive, self-*, SLAs, performance
models and monitoring

• Applications: games, social networks, scientific computing (e-science)
and business

• Mobile and energy-efficient use of Clouds

• Beyond technology: Cloud business and legal implications, such as
security, privacy, trust and jurisdiction, especially in Utility contexts

One or more best paper awards will be given for outstanding contributed
papers. Further details as well as submission guidelines are available at the
conference website and below.


Submitted manuscripts should be structured as technical papers and
may not exceed ten (10) single-spaced double-column pages using
10-point size font on 8.5x11 inch pages (IEEE conference style), including
figures, tables, and references.

Electronic submissions must be in the form of a readable PDF file.
Manuscripts must be received by July 03, 2015. All manuscripts will be
reviewed by the Program Committee and evaluated on originality, relevance
of the problem to the conference theme, technical strength, rigor in analysis,
quality of results, and organization and clarity of presentation of the paper.

Please use the following Easy Chair link to update your submission: .

Submitted papers must represent original unpublished research that is not
currently under review for any other conference or journal. Papers not
following these guidelines will be rejected without review and further action
may be taken, including (but not limited to) notifications sent to the heads of
the institutions of the authors and sponsors of the conference. Submissions
received after the due date, exceeding length limit, or not appropriately
structured may also not be considered. Authors may contact the Program
Chairs at the email addressed below for further information or clarification.
Notification of review decisions will be mailed by August 21, 2015. Camera
-ready papers are due by September 21, 2015. Published proceedings will
be available at the conference.

At least one author of each paper must be registered for the conference in
order for the paper to be published in the proceedings. There is NO student
rate for the author who is responsible for registration for his/her published
paper. If you have more than one accepted paper, you have to register for
each one individually. There is no discount if you have two or more papers
accepted. Presentation of an accepted paper at the conference is a
requirement of publication. Any paper that is not presented at the
conference will not be included in IEEE Xplore.


Selected papers from the conference will be invited to submit an extended
version to the IEEE Transactions on Cloud Computing. Papers will be selected
based on their reviewers' scores and appropriateness to the journal's theme.
All extended versions will undergo reviews and must represent original
unpublished research work. Further details will be made available at the
conference webpage.


Each tutorial proposal must contain the following:

• Title.

• Name and Affiliation of the Speaker(s).

• Abstract (one paragraph, 200 words max., including previous experience
with such tutorials).

• Intended Audience (one paragraph) and prerequisites: Describe the
background assumed of tutorial attendees (i.e. beginner, intermediate,
advanced), and any requirements needed (e.g. bring own laptop).

• Learning Outcome (one paragraph): Describe the benefit, knowledge or
skill that will be gained by attendees.

• Description (no more than 2 pages): A statement giving clear motivation
/justification for the topic to be presented at UCC 2015 and a
comprehensive outline of the proposed content.

• Statement on if this tutorial has been given before and if so how this
presentation will be different.

• Materials (one paragraph): A description of materials to be provided to
attendees on the conference website – course slides, annotated
bibliography, code snippets, etc. NOTE: the materials themselves do not
need to be provided in the proposal.

• Bio-sketch: A single paragraph bio-sketch per tutorial presenter.

• Requested tutorial length (preferably half-a-day).

• Tutorial proposals should be submitted in PDF format by email to the
tutorial chairs by the 3rd of July, 2015.


Materials for the tutorial must be emailed by the 13th of November 2015 at
the latest. The UCC 2015 Conference Organizing Committee will be
responsible for the following:

• Providing logistics support and a meeting place for the tutorial.

• In conjunction with the organizers, determining the tutorial date and time.

• Providing copies of the tutorial materials to attendees.


• Tutorial proposals due: 03 July, 2015
• Notification of tutorial proposals: 14 August, 2015
• Final description of accepted proposals: 14 September, 2015
• Tutorial slides due: 13 November, 2015

• Paper submissions due: 03 July, 2015
• Notification of acceptance: 21 August, 2015
• Camera ready papers due: 21 September, 2015

• Early and author registration deadline: 21 September, 2015


General Chairs

• Ashiq Anjum, University of Derby, UK
• George Papadopoulos, University of Cyprus

Program Committee Chairs

• Manish Parashar, Rutgers University, USA (parashar AT
• Omer Rana, Cardiff University, UK (ranaof AT

Standards/Plug-fest Chair

• Alan Sill, Texas Tech, USA & Open Grid Forum

Workshops Chairs

• Ilkay Altintas, SDSC, USA (altintas AT
• Josef Spillner, TU Dresden, Germany (josef.spillner AT

Tutorials Chairs

• Ewa Deelman, USC, USA (deelman AT
• Rafael Tolosana, Univ. of Zaragoza, Spain (rafaelt AT

Posters Chair

• Khalid Elgazzar, Queen's University, Kingston, Canada

PhD Symposium Chair

• Kenneth Johnson, Auckland University of Technology, New Zealand

Cloud Challenge 2015 Chair

• Ian Taylor, Cardiff University, UK

Industry Chair

• Achilleas Achilleos, University of Cyprus, Cyprus

Proceedings Chairs

• Nick Antonopoulos, University of Derby, UK
• George Palis, University of Cyprus, Cyprus

Publicity Chair

• Georgia Kapitsaki, University of Cyprus, Cyprus

Program Committee

This is not SPAM. If you want to be removed from this list,
please send an email to [announce <at>] with the
single word 'remove' in the subject of the email.
Krishna | 20 May 14:33 2015

Running OCaml binaries compiled in another computer


I am trying to run the OCaml compiler libraries, from a different path from which it is installed in (I copy the binaries from its installed location, to a different system with the same specs).

Someone else in my company, has done this for OCaml 3.10, by adding a shell script which exports OCAMLLIB to the current directory and calls ocamlrun. This shell script is called in the Makefile of stdlib, under camlheader camlheader_ur.

I have invested time to get this working for OCaml 4.02.1 and OCaml 4.01.0 to no avail. My question is, does anyone see more scope in this? That is, is it possible to get this done (with more effort), or is this a dead end?



Grace Allas | 19 May 16:28 2015

CFP for BigData2015: International Conference in Mauritius


The Second International Conference on Data Mining, Internet Computing, and Big Data (BigData2015)

University of Mauritius, Le Reduit, Moka, Mauritius 
June 29 – July 01, 2015

All registered papers will be included in SDIWC Digital Library.
The conference aims to enable researchers build connections between different digital applications. 
The event will be held over three days, with presentations delivered by researchers from the international 
community, including presentations from keynote speakers and state-of-the-art lectures.


* Data Mining Tasks & Algorithms
  Explorative and visual data mining
Mining text and semi-structured data
Multimedia mining (audio/video)
Web mining
Artificial neural networks
Link and sequence analysis
Evolutionary computation/meta heuristics
* Data Mining Integration & Process
Distributed and grid based data mining
Metadata and ontologies
Mining large scale data
Attribute discretization and encoding
Feature selection and transformation
Model interpretation
Data cleaning and preparation
* Data Mining Applications
Business/Corporate/Industrial Data Mining
Credit Scoring
Data Mining in Logistics
Database Marketing
Direct Marketing
Engineering Mining
Medicine Data Mining
Military Data Mining
Security Data Mining
Social Science Mining
Time series analysis and visualization
Anomaly detection
Association rule learning
Cloud based infrastructure (applications, storage and resources)
Cluster analysis
Data fusion and integration
Data-mining grids
Distributed databases
Distributed file systems
Ensemble learning
Genetic algorithms
Machine learning
Massively parallel-processing (MPP) databases
Natural language processing
Neural networks
Pattern recognition
Predictive modelling
* Internet Computing
Design and analysis of internet protocols and engineering
Digital libraries/digital image collections
Electronic commerce and internet
Grid based computing and internet tools
Internet and emerging technologies
Internet and video technologies
  Internet applications and appliances
Internet banking systems
Internet based decision support systems
Internet law and compliance
Internet security and trust
Markup Languages
Mobile computing and the internet
Network architectures and network computing
Novel Java applications on internet
Quality of service
Search engines
Social networks
The WWW and intranets
The internet and Cloud computing
Web based computing
Web interfaces to databases
Web site design and coordination
Search-based applications
Sentiment analysis
Signal processing
Supervised and unsupervised learning

Submission Deadline         : May 29, 2015
Notification of Acceptance  : 2 - 4 weeks from the submission date
Camera Ready Submission     : Open from now until June 09, 2015
Registration Date           : Open from now until June 09, 2015
Conference Dates            : June 29 - July 01, 2015

Researchers are encouraged to submit their work electronically. 
All papers will be fully refereed by a minimum of two specialized referees. 
Before final acceptance, all referees comments must be considered. 

Write us for more details: bigdata15 <at>


Geoff Sutcliffe | 19 May 15:56 2015

LPAR-20 in Fiji - Call for Papers and Workshops

                The 20th International Conference on
    Logic for Programming, Artificial Intelligence and Reasoning

               University of the Pacific, Suva, Fiji


The series of International Conferences on Logic for Programming, Artificial
Intelligence and Reasoning (LPAR) is a forum where, year after year, some of
the most renowned researchers in the areas of logic, automated reasoning,
computational logic, programming languages and their applications come to
present cutting-edge results, to discuss advances in these fields, and to
exchange ideas in a scientifically emerging part of the world. The 20th LPAR
will be held at the University of the South Pacific, Suva, Fiji in 2015
(see dates below).

== Topics

New results in the fields of computational logic and applications are welcome.
Also welcome are more exploratory presentations, which may examine open
questions and raise fundamental concerns about existing theories and practices.

Topics of interest include, but are not limited to:
+ Abduction and interpolation methods
+ Automated reasoning
+ Constraint programming
+ Decision procedures
+ Description logics
+ Foundations of security
+ Hardware verification
+ Implementations of logic
+ Interactive theorem proving
+ Knowledge representation and reasoning
+ Logic and computational complexity
+ Logic and databases
+ Logic and games
+ Logic and machine learning
+ Logic and the web
+ Logic and types
+ Logic in artificial intelligence
+ Logic of distributed systems
+ Logic programming
+ Logical aspects of concurrency
+ Logical foundations of programming
+ Modal and temporal logics
+ Model checking
+ Non-monotonic reasoning
+ Ontologies and large knowledge bases
+ Probabilistic and fuzzy reasoning
+ Program analysis
+ Rewriting
+ Satisfiability checking
+ Satisfiability modulo theories
+ Software verification
+ Specification using logic
+ Unification theory

== Submission Details

Submissions of two kinds are welcome:

- Regular papers  that describe solid new research results. They can be up to
  15 pages long in LNCS style, including figures and references, but excluding
  appendices (that reviewers are not required to read).

- Experimental and tool papers that describe implementations of systems, report
  experiments with implemented systems, or compare implemented systems. They
  can be up to 8 pages long in the LNCS style.

Both types of papers must be electronically submitted in PDF via EasyChair:

== Participation

Prospective authors are required to register a title and an abstract a week
before the paper submission deadline (see below). Authors of accepted papers 
are required to ensure that at least one of them will be present at the 
conference. More details about the venue and organisation can be found on the
conference website.

== Important Dates

Abstract Submission: 30 June
Paper Submission: 7 July
Notification: 23 August
Workshops: 23 November
Conference: 24-28 November

== Programme Committee

Cyrille Valentin 	Artho 	AIST, Japan
Franz Baader 		TU Dresden, Germany
Christel Baier 		TU Dresden, Germany
Peter Baumgartner 	NICTA, Australia
Armin Biere 		Johannes Kepler University, Austria
Nikolaj Bjorner 	Microsoft Research, USA
Lei Bu 	Nanjing 	University, China
Franck Cassez 		Macquarie University, Australia
Ansgar Fehnker 		University of the South Pacific
Rajeev Gore 		Australian National University, Australia
Tim Griffin 	 	University of Cambridge, UK
Ralf Huuck 			NICTA and UNSW, Australia
Kim Guldstrand Larsen 	Aalborg University, Denmark
Dejan Jovanovic 	SRI International, USA
Gerwin Klein 		NICTA and UNSW, Australia
Dexter Kozen 		Cornell University, USA
Rustan Leino 		Microsoft Research, USA
Joe Leslie-Hurd 	Intel Corporation, USA
Annabelle McIver 	Macquarie University, USA
Kenneth McMillan 	Microsoft Research, USA
Marius Minea 		Politehnica University of Timisoara, Romania
Matteo Mio 			CNRS, ENS Lyon, France
Prakash Panangaden 	McGill University, Canada
Christine Paulin-Mohring 	Universit=C3=A9 Paris-Sud, France
Andreas Podelski 	University of Freiburg, Germany
Geoff Sutcliffe 	University of Miami, USA
Gancho Vachkov 		The University of the south Pacific (USP), Fiji
Ron Van Der Meyden 	UNSW, Australia
Tomas Vojnar 		Brno University of Technology, Czech Republic
Andrei Voronkov 	University of Manchester, UK
Toby Walsh 			NICTA and UNSW, Australia
More to be announced ...

                          CALL FOR WORKSHOPS

LPAR-20 workshops will be held either as one-day or half-day events. If you
would like to propose a workshop for LPAR-20, please contact the workshop
chair via email (Peter.Baumgartner <at>, by the proposal deadline.

== Proposals

To help planning, workshop proposals should contain the following data:

- Name of the workshop.
- Brief description of the workshop, including workshop topics.
- Valid web address of the workshop.
- Contact information of the workshop organizers.
- An estimate of the audience size.
- Proposed format of the workshop (for example, regular talks, tool demos,
  poster presentations, etc.).
- Duration of the workshop (one-day or half-day).
- Potential invited speakers (if any).
- Procedures for selecting papers and participants.
- Special technical or AV needs.

== Important dates

Workshop proposals submission deadline:     May 15, 2015
Notification of acceptance:                June  1, 2015
Workshops:                             November 23, 2015


Caml-list mailing list.  Subscription management and archives:
Beginner's list:
Bug reports:

Ulrich Schöpp | 18 May 07:58 2015

CFP: Information and Computation special issue on Implicit Computational Complexity


Call for Papers

Special Issue on Implicit Computational Complexity
(open post-conference publication of the
workshops DICE 2014 and DICE 2015)

Deadline: July 1st 2015
Guest Editors:
Marco Gaboardi <m.gaboardi <at>>
Ulrich Schöpp <schoepp <at>>


The area of Implicit Computational Complexity has grown from several
proposals for using logic and formal methods to provide languages for
complexity-bounded computation (such as polynomial time, polynomial
space or logarithmic space computation). Its aim is to study
computational complexity without reference to external measuring
conditions or particular machine models, but only in terms of language
restrictions or logical/computational principles implying complexity

We welcome contributions on various aspects of Implicit Computational
Complexity, including (but not exclusively) the following topics:
- types for controlling complexity
- logical systems for implicit computational complexity
- linear logic
- semantics of complexity-bounded computation
- complexity analysis
- rewriting and termination orderings
- interpretation-based methods for implicit complexity
- programming languages for complexity bounded computation
- application of implicit complexity to other programming paradigms
(e.g. imperative or object-oriented languages)
- application of implicit complexity to security

This special issue of Information & Computation follows the informal
workshops on Developments in Implicit Computational Complexity (DICE),
DICE 2014 in Grenoble ( and DICE 2015 in
London (

Submission to this special issue is open to everyone, including those
who did not participate in DICE 2014 or DICE 2015.

DICE workshops have been held annually as satellite events of ETAPS:
DICE 2010 in Paphos, DICE 2011 in Saarbrücken, DICE 2012 in Tallinn,
DICE 2013 in Rome, DICE 2014 in Grenoble and DICE 2015 in London.
Previous post-conference publications have appeared in
- Information & Computation for DICE 2011,
- Theoretical Computer Science for DICE 2012 (in press), and
- Information & Computation for DICE 2013 (to appear).
More information on the DICE workshop series is available at:

Information & Computation solicits high quality papers reporting
research results related to the topics mentioned above. All papers must
be original, unpublished, and not submitted for publication elsewhere.
- Contributions should be submitted electronically to both addresses
<m.gaboardi <at>> and <schoepp <at>>.
- Papers must be in PDF format and be formatted using Elsevier's
elsarticle.cls LaTeX macro package. Formatting instructions
can be found at
- Submissions must be sent to us no later than JULY 1st 2015.
Papers will be processed as soon as they are submitted.
We are aiming for a turnaround of no more than six months.

We encourage authors to look at the author guide at