Fulvio Frati | 29 Sep 15:25 2014
Picon

[IWSAC 2014] Deadline Approaching: September 30, 2014

***Deadline Approaching: September 30, 2014***

 

[Apologies if you receive multiple copies of this message]

***************

CALL FOR PAPERS

***************

 

SECOND INTERNATIONAL WORKSHOP ON SECURITY ASSURANCE IN THE CLOUD (IWSAC 2014)

Held in conjunction with the 10th International Conference on Signal Image Technology & Internet Based Systems (SITIS 2014)

One day between November 23-27, 2014, Marrakech, Morocco

Web site: http://sesar.di.unimi.it/IWSAC2014

 

IWSAC 2014 BACKGROUND AND GOALS

The ongoing merge between Service-Oriented Architectures (SOAs) and the Cloud computing paradigm provides a new environment fostering the integration of services located within company boundaries with those in the Cloud. An increasing number of organizations implement their business processes and applications via runtime composition of services made available in the Cloud by external suppliers. This scenario is changing the traditional view of security introducing new service security risks and threats, and requires re-thinking of current assurance, development, testing, and verification methodologies. In particular, security assurance in the cloud is becoming a pressing need to increase the confidence of the cloud actors that the cloud and its services are behaving as expected, and requires novel approaches addressing SOA and cloud peculiarities. IWSAC 2014 is the continuation of the International Workshop on Securing Services on the Cloud, held in September 2011, Milan, Italy. It aims to address the security assurance issues related to the deployment of services in the Cloud, along with evaluating their impact on traditional security solutions for software and network systems.

 

The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and assurance of services implemented in the Cloud, as well as experimental studies in Cloud infrastructures, the implementation of services, and lessons learned. Topics of interest include, but are not limited to: 

 

* Authentication and access control in the cloud

* Challenges in moving critical systems to the cloud

* Cloud accountability

* Cloud audit

* Cloud compliance

* Cloud certification

* Cloud transparency, introspection, and outrospection

* Cybersecurity in the cloud

* Data security and privacy in the Cloud

* Information assurance and trust management

* Intrusion detection in the Cloud

* Security assurance in the cloud

* Security and assurance protocols in the Cloud

* Service level agreements

* Service procurement in the cloud

* Service verification in critical cloud services

* Test-based and monitoring-based verification of cloud services

 

IMPORTANT DATES

EXTENDED Paper submission due: September 30, 2014 (11:59 PM American Samoa time) *FIRM*

Notification to authors: October 9, 2014

Camera-ready due: October 15, 2014

Registration due: October 19, 2014

 

SUBMISSION INSTRUCTIONS

Submissions must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or conference/workshop with proceedings. Each submission should be at most 8 pages in total including bibliography and well-marked appendices, and must follow the IEEE double columns publication format available at

- [Microsoft Word DOC] ftp://pubftp.computer.org/Press/Outgoing/proceedings/instructA4x2.doc

- [LaTex Formatting Macros] ftp://pubftp.computer.org/Press/Outgoing/proceedings/IEEE_CS_LatexA4x2.zip

 

A maximum of 2 extra pages can be purchased for the final version of the accepted papers.

 

Submissions are to be made to the submission web site https://www.easychair.org/conferences/?conf=sitis2014 by selecting track "Workshop on Security Assurance in the Cloud". Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits.

 

Authors of accepted papers must guarantee that their papers will be presented at the workshop. At least one author of each accepted paper is required to register with the main conference and present the paper. Accepted papers at the workshop will be published in the conference proceedings and in the IEEE digital library.

Extended version of selected accepted papers will be considered for publication in a journal special issue (TBC).

 

IWSAC 2014 COMMITTEES AND CHAIRS

 

General Chair (SITIS General Chair)

* Ernesto Damiani, Universita' degli Studi di Milano, Italy

Program Chairs

* Marco Anisetti, Universita' degli Studi di Milano, Italy

* Claudio A. Ardagna, Universita' degli Studi di Milano, Italy

* Rasool Asal, British Telecommunications, UK/UAE

 

Publicity Chair

* Valerio Bellandi, Universita' degli Studi di Milano, Italy

* Fulvio Frati, Universita' degli Studi di Milano, Italy

 

Web Chair

* Fulvio Frati, Universita' degli Studi di Milano, Italy

 

Program Committee

* Rafael Accorsi, University of Freiburg, Germany

* Valerio Bellandi, Universita' degli Studi di Milano, Italy

* Michele Bezzi, SAP, France

* Mauro Conti, University of Padua, Italy

* Nora Cuppens-Boulahia, Telecom Bretagne, France

* Ernesto Damiani, Universita' degli Studi di Milano, Italy

* Eduardo Fernandez, Florida Atlantic University, USA

* William M. Fitzgerald, EMC Information Systems International, Ireland

* Atsuhiro Goto, Institute of Information Security, Japan

* Nils Gruschka, NEC Laboratories Europe, Germany

* Patrick Hung, University of Ontario Institute of Technology, Canada

* Meiko Jensen, Southern Denmark University, Denmark

* Florian Kerschbaum, SAP, Germany

* Nicolas Larrieu, ENAC, France

* Antonio Mana, Universidad de Malaga, Spain

* Siani Pearson, HP Labs, UK

* George Spanoudakis, City University of London, UK

 

This call for papers and additional information about the conference can be found at http://sesar.di.unimi.it/IWSAC2014

 

 

 

 

_______________________________________________
Om-announce mailing list
Om-announce@...
http://openmath.org/mailman/listinfo/om-announce
Geoff Sutcliffe | 29 Sep 16:47 2014
Picon

CAV Call for Papers

Call for Papers
27th International Conference on
Computer Aided Verification (CAV 2015)
July 18-24 2015, San Francisco, California
http://i-cav.org/2015/

Aims and Scope

CAV 2015 is the 27th in a series dedicated to the advancement of the 
theory and practice of computer-aided formal analysis methods for 
hardware and software systems.  CAV considers it vital to continue 
spurring advances in hardware and software verification while expanding 
to new domains such as biological systems and computer security. The 
conference covers the spectrum from theoretical results to concrete 
applications, with an emphasis on practical verification tools and the 
algorithms and techniques that are needed for their implementation. The 
proceedings of the conference will be published in the Springer LNCS 
series. A selection of papers will be invited to a special issue of 
Formal Methods in System Design and the Journal of the ACM.

Topics of interest include but are not limited to:

*    Algorithms and tools for verifying models and implementations
*    Hardware verification techniques
*    Deductive, compositional, and abstraction techniques for verification
*    Program analysis and software verification
*    Verification methods for parallel and concurrent hardware/software systems
*    Testing and run-time analysis based on verification technology
*    Applications and case studies in verification
*    Decision procedures and solvers for verification
*    Mathematical and logical foundations of practical verification tools
*    Verification in industrial practice
*    Algorithms and tools for system synthesis
*    Hybrid systems and embedded systems verification
*    Verification techniques for security
*    Formal models and methods for biological systems

Paper Submission

Submissions should contain original research and sufficient detail to 
assess the merits and relevance of the contribution. We welcome papers 
on theory, case studies and comparisons with existing experimental 
research, tool papers, as well as combinations of new theory with 
experimental evaluation. Similar to last year, we welcome both long tool 
papers and short papers of any kind.

Tool papers should describe system and implementation aspects of a tool 
with a large (potential) user base (experiments not required, rehash of 
theory strongly discouraged). Papers describing tools that have already 
been presented (in any conference) will be accepted only if significant 
and clear enhancements to the tool are reported and implemented.

Submissions reporting on case studies in an industrial context are 
strongly invited, and should describe details, weaknesses, and strengths 
in sufficient depth. Papers reproducing and comparing existing results 
experimentally do not require new theoretical insights. Examples of 
contributions of such papers are evaluations of existing results in a 
superior experimental setting and comparisons of methods that have not 
previously been thoroughly experimentally compared.

Papers can be submitted in either a regular or a short format.

*    Regular Papers should not exceed 15 pages in LNCS format, not 
counting references.

*    Short Papers should not exceed 6 pages, not counting references. 
Short papers are encouraged for any subject that can be described within 
the page limit, and in particular for novel ideas without an extensive 
experimental evaluation. Accepted short papers will be accompanied by 
short presentations.

An appendix can provide additional material such as details on proofs or 
experiments. The appendix is not guaranteed to be read or taken into 
account by the reviewers and it should not contain information necessary 
for the understanding and the evaluation of the presented work. Papers 
will be accepted or rejected in the category in which they were 
submitted, there will be no demotions from a regular to a short paper.

Simultaneous submission to other conferences with proceedings or 
submission of material that has already been published elsewhere is not 
allowed.

The review process will include a feedback/rebuttal period where authors 
will have the option to respond to reviewer comments. The PC chairs may 
solicit further reviews after the rebuttal period.

Papers must be submitted in PDF format. Submission is done via EasyChair.

Deadlines

Deadlines are anywhere on earth

*    Abstract submission: January 30 2015
*    Paper submission (firm): February 6 2015
*    Author feedback/rebuttal period: March 23-26 2015
*    Notification of acceptance/rejection: April 17 2015
*    Final version due: May 1 2015

Chairs

Daniel Kroening, University of Oxford, UK.
Corina Pasareanu, Carnegie Mellon Silicon Valley/NASA Ames, USA.

Program Committee

Aws Albarghouthi, University of Wisconsin-Madison, USA
Jade Alglave, University College London, UK
Domagoj Babic, Google, USA
Clark Barrett, New York University, USA
Armin Biere, Johannes Kepler University, Austria
Roderick Bloem, Graz University of Technology, Austria
Ahmed Bouajjani, LIAFA, University Paris Diderot, France
Marius Bozga, Verimag/CNRS, France
Aaron Bradley, Mentor Graphics, USA
David Brumley, Carnegie Mellon University, USA
Tevfik Bultan, University of California, Santa Barbara, USA
Krishnendu Chatterjee, Institute of Science and Technology (IST), Austria
Swarat Chaudhuri, Rice University, USA
Marsha Chechik, University of Toronto, Canada
Hana Chockler, King's College London
Byron Cook, Microsoft Research, USA
Isil Dillig, University of Texas at Austin, USA
Dino Distefano, Facebook, UK
Alastair Donaldson, Imperial College London, UK
Azadeh Farzan, University of Toronto, Canada
Antonio Filieri, University of Stuttgart, Germany
Jasmin Fisher, Microsoft Research, UK
Indradeep Ghosh, Fujitsu Labs of America, USA
Patrice Godefroid, Microsoft Research, USA
Aarti Gupta, USA
Arie Gurfinkel, Software Engineering Institute, Carnegie Mellon 
University, USA
Gerard Holzmann, NASA/JPL, USA
Warren Hunt, University of Texas at Austin, USA
Ranjit Jhala, University of California, San Diego, USA
Barbara Jobstmann, EPFL and Cadence Design Systems, Switzerland
Joost-Pieter Katoen, RWTH Aachen University, Germany/University of 
Twente, the Netherlands
Daniel Kroening, University of Oxford, UK (chair)
Marta Kwiatkowska, University of Oxford, UK
Akash Lal, Microsoft Research, India
Darko Marinov, University of Illinois at Urbana-Champaign, USA
Ken McMillan, Microsoft Research, USA
Kedar Namjoshi, Bell Labs, USA
David Parker, University of Birmingham, UK
Corina Pasareanu, CMU/NASA Ames Research Center, USA (chair)
Andre Platzer, Carnegie Mellon University, USA
Zvonimir Rakamaric, University of Utah, USA
Grigore Rosu, University of Illinois at Urbana-Champaign, USA
Philipp Ruemmer, Uppsala University, Sweden
Mooly Sagiv, Tel Aviv University, Israel
Sriram Sankaranarayanan, University of Colorado at Boulder, USA
Koushik Sen, University of California, Berkeley, USA
Natarajan Shankar, SRI International, USA
Natasha Sharygina, Universitat della Svizzera Italiana, Switzerland
Sharon Shoham, Academic College of Tel-Aviv Yaffo, Israel
Nishant Sinha, IBM Research Labs, India
Fabio Somenzi, University of Colorado at Boulder, USA
Manu Sridharan, Samsung Research America, USA
Ofer Strichman, Technion, Israel
Zhendong Su, University of California, Davis, USA
Cesare Tinelli, The University of Iowa, USA
Emina Torlak, University of Washington, USA
Tayssir Touili, CNRS, LIPN, France
Thomas Wahl, Northeastern University, USA
Georg Weissenbacher, Vienna University of Technology, Austria
Eran Yahav, Technion, Israel

Steering Committee

Michael Gordon, University of Cambridge, UK
Orna Grumberg, Technion, Israel
Aarti Gupta, USA
Kenneth McMillan, Microsoft, USA
diaylosteiman | 28 Sep 12:45 2014
Picon

Announcing the Encyclopedia of Social Network Analysis and Mining by Springer

Encyclopedia of Social Network Analysis and Mining

Alhajj, Reda, Rokne, Jon (Eds.)

2014, XLII, 2437 p. 611 illus., 425 illus. in color. In 3 volumes, not available separately.

http://www.springer.com/computer/communication+networks/book/978-1-4614-6169-2

 

About this encyclopedia

  • Explains fundamental concepts of social networks and data mining across the disciplines in readable, authoritative entries
  • Addresses privacy, security, ethical, and civil liberty issues for social networks, and the application of social network methodologies to other domains
  • Includes methodologies for analysis of constructed networks, data mining techniques and research directions

 

The Encyclopedia of Social Network Analysis and Mining (ESNAM) is the first major reference work to integrate fundamental concepts and research directions in the areas of social networks and applications to data mining. While ESNAM reflects the state-of-the-art in social network research, the field had its start in the 1930s when fundamental issues in social network research were broadly defined. These communities were limited to relatively small numbers of nodes (actors) and links. More recently the advent of electronic communication, and in particular on-line communities, have created social networks of hitherto unimaginable sizes. People around the world are directly or indirectly connected by popular social networks established using web-based platforms rather than by physical proximity.

Reflecting the interdisciplinary nature of this unique field, the essential contributions of diverse disciplines, from computer science, mathematics, and statistics to sociology and behavioral science, are described among the 300 authoritative yet highly readable entries. Students will find a world of information and insight behind the familiar façade of the social networks in which they participate. Researchers and practitioners will benefit from a comprehensive perspective on the methodologies for analysis of constructed networks, and the data mining and machine learning techniques that have proved attractive for sophisticated knowledge discovery in complex applications. Also addressed is the application of social network methodologies to other domains, such as web networks and biological networks.

_______________________________________________
Om-announce mailing list
Om-announce@...
http://openmath.org/mailman/listinfo/om-announce
Mingzhong Wang | 25 Sep 17:37 2014
Picon

CFP: 6th International conference on Trustworthy Computing (InTrust 2014), 16-17 December 2014, Beijing, China

************************************************************************
The 6th International conference on Trustworthy Computing (InTrust 2014)

16th-17th December 2014, Beijing, P. R. China 

Website: http://crypto.fudan.edu.cn/intrust2014/
************************************************************************

------------------
Important Dates
------------------

Extended Submissions Deadline: 20 October 2014
Extended Notification: 10 November 2014
Camera ready for pre-proceedings due: 20 December 2014 
Conference: 16-17 December 2014
Camera ready for proceedings due: 20 January 2015

------------------
Overview
------------------

The InTrust conference focuses on the theory, technologies and applications of trustworthy systems. It
is devoted to all aspects of trustworthy computing systems, including trusted modules, platforms,
networks, services and applications, as well as security concerns and privacy issues of systems, from
their fundamental features and functionalities to design principles, architecture and
implementation technologies. The goal of the conference is to bring academic and industrial
researchers, designers, and implementers together with end-users of trusted systems, in order to
foster the exchange of ideas in this challenging and fruitful area. 

INTRUST 2014 is the next event in a series of highly successful International Conferences, previously
held as INTRUST (International conference on Trusted Systems) 2013 (Graz, Austria), INTRUST 2012
(London, UK), INTRUST 2011 (Beijing, China), INTRUST 2010 (Beijing, China), and INTRUST 2009 (Beijing,
China). The conference will be hosted by Beijing Institute of Technology. INTRUST 2014 solicits
original papers on any aspect of the theory, advanced development and applications of trusted
computing, trustworthy systems and general trust issues in modern computing systems.

------------------
Topics of Interest
------------------

Topics of relevance include but are not limited to: 
* Fundamental features and functionalities of trusted systems 
* Primitives and mechanisms for building a chain of trust 
* Design principles and architectures for trusted modules and platforms 
* Trustworthy infrastructures and cloud computing services 
* Implementation technologies for trusted modules and platforms 
* Cryptographic aspects of trusted systems, including cryptographic algorithms and protocols, and
their implementation and application in trusted systems 
* Secure network operation 
* Mobile trusted systems 
* Applications of trusted systems 
* Trusted intellectual property protection: metering, watermarking, digital rights management and
enterprise rights management 
* Software & hardware protection for trusted systems 
* Authentication and access control for trusted systems 
* Identity & privacy aspects of trusted systems 
* Attestation for trusted systems, including measurement and verification of the behavior of trusted
systems 
* Emerging technologies and standards for trusted systems 
* Trust metrics and robust trust inference in distributed systems 
* Usability and reliability aspects of trusted systems 
* Trust modeling, economic analysis and protocol design for rational and malicious adversaries 
* Virtualization for trusted systems 
* Limitations of trusted systems 
* Security analysis of trusted systems, including formal methods proofs, provable security and
automated analysis 
* Security policies for, and management of, trusted systems 
* Intrusion resilience and revocation aspects of trusted systems 
* Scalability aspects of trusted systems 
* Compatibility aspects of trusted systems 
* Experiences in building real-world trusted systems 
* Socio-economic aspects of trusted systems 

------------------
Submission Guidelines and Publication
------------------

Submissions must not substantially duplicate work that any of the authors have published elsewhere or
have submitted in parallel to any journal or other conference or workshop that has proceedings. 

All submissions will be blind-reviewed. Papers must be anonymous, with no author names, affiliations,
acknowledgements, or obvious references. A submitted paper should begin with a title, a short abstract,
and a list of keywords. 

The proceedings of InTrust 2014 will be published in the Springer-Verlag Lecture Notes in Computer
Science series. Papers published in the LNCS series are indexed by both EI and ISTP. Clear instructions
for the preparation of a final proceedings version will be sent to the authors of accepted papers. 

Selected papers will be invited to be published (in approval) in 
* International Journal of Information Security
* Frontiers of Computer Science

Papers should be submitted in standard LNCS format, with length at most 15 pages (excluding bibliography
and appendices). Committee members are not required to review more pages than this, so papers should be
intelligible within this length. Submissions not meeting these guidelines risk rejection without
consideration of their merits. Authors of accepted papers must guarantee that their paper will be
presented at the conference. 

Papers must be submitted in PDF format using the EasyChair conference management system at
https://www.easychair.org/conferences/?conf=intrust2014 

Please send any enquiries to: wangmz@...

---------------------
Best Paper Award
---------------------

The conference has a best paper award to the value of US$1,000; all papers are eligible for this award. 

---------------------
Conference Organization
---------------------

Honorary Chairs
* Liqun Chen, HP Laboratories, UK
* Yongfei Han, BJUT & ONETS, China

General Chairs
* Heyan Huang, Beijing Institute of Technology, China

Program Committee Chairs 
* Yanjiang Yang, Institute for Infocomm Research, Singapore
* Moti Yung, Google & Columbia University, USA
* Liehuang Zhu, Beijing Institute of Technology, China

Publicity Chairs
* Xinyi Huang, Fujian Normal University, China
* Mingzhong Wang, Beijing Institute of Technology, China

Program Committee
* Endre Bangerter, Bern University of Applied Sciences, Switzerland
* Zhen Chen, Tsinghua University, China
* Zhong Chen, Peking University, China
* Dieter Gollmann, Hamburg University of Technology, Germany
* Sigrid Guergens, Fraunhofer Institute for Secure Information Technology, Germany
* Weili Han, Fudan University, China
* Xuejia Lai, Shanghai Jiaotong University, China
* Shujun Li, University of Konstanz, UK
* Jianxin Li, Beihang University, China
* Peter Lipp, Graz University of Technology, Austria
* Javier Lopez, University of Malaga, Spain
* Andrew Martin, University of Oxford, UK
* Shin'Ichiro Matsuo, NICT, Japan
* Yi Mu, University of Wollongong, Australia
* David Naccache, Ecole normale suprieure, France
* Raphael Phan, Loughborough University, UK
* Bart Preneel, Katholieke Universiteit Leuven, Belgium
* Scott Rotondo, Oracle, USA
* Kouichi Sakurai, Kyushu University, Japan
* Willy Susilo, University of Wollongong, Australia
* Qiang Tang, University of Twente, Netherlands
* Claire Vishik, Intel Corporation, UK
* Qian Wang, Wuhang University, China
* Jian Weng, Jinan University, China
* Fan Wu, Shanghai Jiaotong University, China
* Yi Xie, Sun Yat-Sen University, China
* Shouhuai Xu, University of Texas at San Antonio, USA
* Rui Xue, Chinese Academy of Sciences, China
* Huanguo Zhang, Wuhan University, China
* Xing Zhang, Beijing University of Technology, China
* Xinwen Zhang, Huawei Research Center, China
* Sheng Zhong, Nanjing University, China
* Yongbin Zhou, Chinese Academy of Sciences, China
* Yan Zhou, Beijing University, China

Steering Committee 
* Yongfei Han, BJUT & ONETS, China 
* Moti Yung, Google & Columbia University, USA 
* Liqun Chen, HP Laboratories, UK 
* Robert Deng, SMU, Singapore 
* Chris Mitchell, RHUL, UK 
sara.foresti | 29 Sep 08:59 2014
Picon

Call for Participation: CNS'2014--IEEE Conference on Communications and Network Security

Dear Colleagues,

IEEE CNS'2014-IEEE Conference on Communications and Network Security, 
will be held October 29-31, 2014 in San Francisco.

2014 CNS features a high-quality technical program, two exciting panels,
and four co-located workshops dedicated to emerging topics of cyber security.
This year, we are specially honored to have two world-renowned leaders in
communications and network security, Prof. Vincent Poor from Princeton 
University and Prof. Peng Ning of Samsung Corp (on leave from NC State 
University), to deliver two high impact keynote speeches.

Conference early registration deadline is September 30, 2014.
Hotel reservation cut-off date is October 8, 2014.

Please refer to http://ieee-cns.org for more details.

We look forward to seeing you at IEEE CNS'2014 in San Francisco.

IEEE CNS'2014 General Chairs
Cliff Wang, Army Research Office
Guoliang "Larry" Xue, Arizona State University
S B Cooper | 25 Sep 23:01 2014
Picon

COMPUTABILITY IN EUROPE 2015: Evolving Computability, Bucharest, Romania, June 29-July 3

----------------------------------------------------------------------------
       P R E L I M I N A R Y     A N N O U N C E M E N T
     COMPUTABILITY IN EUROPE 2015: Evolving Computability
                  Bucharest, Romania
                       June 29 - July 3
              http://fmi.unibuc.ro/CiE2015/
----------------------------------------------------------------------------

CiE 2015 is the 11-th conference organized by CiE (Computability
in Europe), a European association of mathematicians, logicians,
computer scientists, philosophers, physicists and others
interested in new developments in computability and their
underlying significance for the real world. Previous meetings
have taken place in Amsterdam (2005), Swansea (2006), Siena
(2007), Athens (2008), Heidelberg (2009), Ponta Delgada (2010),
Sofia (2011), Cambridge (2012), Milan (2013) and Budapest (2014)

CONFIRMED INVITED SPEAKERS

Ann Copestake (University of Cambridge)
Pawel Gawrychowski (Max-Planck-Institut fuer Informatik)
Julia Knight (University of Notre Dame)
Anca Muscholl (Universite Bordeaux)
Gheorghe Paun (Romanian Academy)
Alexander Razborov (University of Chicago and Steklov Mathematical Institute)
Vlatko Vedral (University of Oxford)

TUTORIAL SPEAKERS

John Reif (Duke Unversity)
Steve Simpson (Pennsylvania State University)

SPECIAL SESSIONS on

Representing streams (Organizers: Joerg Endrullis and Dimtri Hendriks)
Automata, logic and infinite games (Organizers: Dietmar Berwanger and
Ioana Leustean)
Reverse mathematics (Organizers: Damir Dzhafarov and Alberto Marcone)
Classical computability theory (Organizers: Marat Arslanov and Steffen Lempp)
Bio-inspired computation (Organizers: Andrei Paun and Petr Sosik)
History and philosophy of computing (Organizers: Christine Proust and
Marco Benini)

Evolution of the universe, and us within it, invite a parallel evolution
in understanding. The CiE agenda - fundamental and engaged - targets the
extracting and developing of computational models basic to current
challenges. From the origins of life, to the understanding of human
mentality, to the characterising of quantum randomness - computability
theoretic questions arise in many guises. The CiE community, this coming
year meeting for the first time in Bucharest, carries forward the search
for coherence, depth and new thinking across this rich and vital field of
research.

In all cases we are looking for fundamental and theoretical
submissions. In line with other conferences in this series, CiE
2015 has a broad scope and provides a forum for the discussion of
theoretical and practical issues in Computability with an
emphasis on new paradigms of computation and the development of
their mathematical theory.

We particularly invite papers that build bridges between
different parts of the research community.

The PROGRAMME COMMITTEE consists of:

Marat Arslanov (Kazan), Jeremy Avigad (Pittsburgh), Veronica Becher
(Buenos Aires), Arnold Beckmann (Swansea), Laurent Bienvenu (Paris),
Gabriel Ciobanu (Bucharest), S Barry Cooper (Leeds), Laura Crosilla
(Leeds), Liesbeth De Mol (Ghent), Walter Dean (Warwick), Volker
Diekert (Stuttgart), Damir Dzhafarov (Storrs, Connecticut), Peter van
Emde Boas (Amsterdam), Rachel Epstein (Harvard), Johanna Franklin
(Storrs, Connecticut), Neil Ghani (Glasgow), Joel David Hamkins (New
York), Rosalie Iemhoff (Utrecht), Emmanuel Jeandel (LORIA), Natasha
Jonoska (Tampa, FL), Antonina Kolokolova (St.John's, NL), Antonin
Kucera (Prague), Oliver Kutz (Bremen), Benedikt Loewe (Hamburg &
Amsterdam), Jack Lutz (Ames, IA), Florin Manea (Kiel), Alberto Marcone
(Udine), Radu Mardare (Aalborg), Joe Miller (Madison, WI), Russell
Miller (Flushing, NY), Mia Minnes (La Jolla, CA), Victor Mitrana
(Bucharest, co-chair), Dag Normann (Oslo), Ian Pratt-Hartmann
(Manchester), Mehrnoosh Sadrzadeh (London), Anne Smith (St Andrews),
Mariya Soskova (Sofia, co-chair), Paul Spirakis (Patras & Liverpool),
Susan Stepney (York), Jacobo Toran (Ulm), Marius Zimand (Towson, MD).

In a Call for Papers to be sent out in October 2014, the PC will
invite all researchers in the area of the conference to submit
their papers for presentation at CiE  2015.  The best of the
accepted papers will be published in the conference proceedings
within the Lecture Notes in Computer Science (LNCS) series of
Springer (tbc), which will be available at the conference.

____________________________________________________________________

CiE 2015 http://fmi.unibuc.ro/CiE2015/

ASSOCIATION COMPUTABILITY IN EUROPE http://www.computability.org.uk
CiE Conference Series http://www.illc.uva.nl/CiE
CiE Membership Application Form http://www.cs.swan.ac.uk/acie
Computability (Journal of CiE) http://www.computability.de/journal/
CiE on FaceBook https://www.facebook.com/AssnCiE
Association CiE on Twitter https://twitter.com/AssociationCiE
S B Cooper | 25 Sep 23:01 2014
Picon

COMPUTABILITY IN EUROPE 2015: Evolving Computability, Bucharest, Romania, June 29-July 3

----------------------------------------------------------------------------
       P R E L I M I N A R Y     A N N O U N C E M E N T
     COMPUTABILITY IN EUROPE 2015: Evolving Computability
                  Bucharest, Romania
                       June 29 - July 3
              http://fmi.unibuc.ro/CiE2015/
----------------------------------------------------------------------------

CiE 2015 is the 11-th conference organized by CiE (Computability
in Europe), a European association of mathematicians, logicians,
computer scientists, philosophers, physicists and others
interested in new developments in computability and their
underlying significance for the real world. Previous meetings
have taken place in Amsterdam (2005), Swansea (2006), Siena
(2007), Athens (2008), Heidelberg (2009), Ponta Delgada (2010),
Sofia (2011), Cambridge (2012), Milan (2013) and Budapest (2014)

CONFIRMED INVITED SPEAKERS

Ann Copestake (University of Cambridge)
Pawel Gawrychowski (Max-Planck-Institut fuer Informatik)
Julia Knight (University of Notre Dame)
Anca Muscholl (Universite Bordeaux)
Gheorghe Paun (Romanian Academy)
Alexander Razborov (University of Chicago and Steklov Mathematical Institute)
Vlatko Vedral (University of Oxford)

TUTORIAL SPEAKERS

John Reif (Duke Unversity)
Steve Simpson (Pennsylvania State University)

SPECIAL SESSIONS on

Representing streams (Organizers: Joerg Endrullis and Dimtri Hendriks)
Automata, logic and infinite games (Organizers: Dietmar Berwanger and
Ioana Leustean)
Reverse mathematics (Organizers: Damir Dzhafarov and Alberto Marcone)
Classical computability theory (Organizers: Marat Arslanov and Steffen Lempp)
Bio-inspired computation (Organizers: Andrei Paun and Petr Sosik)
History and philosophy of computing (Organizers: Christine Proust and
Marco Benini)

Evolution of the universe, and us within it, invite a parallel evolution
in understanding. The CiE agenda - fundamental and engaged - targets the
extracting and developing of computational models basic to current
challenges. From the origins of life, to the understanding of human
mentality, to the characterising of quantum randomness - computability
theoretic questions arise in many guises. The CiE community, this coming
year meeting for the first time in Bucharest, carries forward the search
for coherence, depth and new thinking across this rich and vital field of
research.

In all cases we are looking for fundamental and theoretical
submissions. In line with other conferences in this series, CiE
2015 has a broad scope and provides a forum for the discussion of
theoretical and practical issues in Computability with an
emphasis on new paradigms of computation and the development of
their mathematical theory.

We particularly invite papers that build bridges between
different parts of the research community.

The PROGRAMME COMMITTEE consists of:

Marat Arslanov (Kazan), Jeremy Avigad (Pittsburgh), Veronica Becher
(Buenos Aires), Arnold Beckmann (Swansea), Laurent Bienvenu (Paris),
Gabriel Ciobanu (Bucharest), S Barry Cooper (Leeds), Laura Crosilla
(Leeds), Liesbeth De Mol (Ghent), Walter Dean (Warwick), Volker
Diekert (Stuttgart), Damir Dzhafarov (Storrs, Connecticut), Peter van
Emde Boas (Amsterdam), Rachel Epstein (Harvard), Johanna Franklin
(Storrs, Connecticut), Neil Ghani (Glasgow), Joel David Hamkins (New
York), Rosalie Iemhoff (Utrecht), Emmanuel Jeandel (LORIA), Natasha
Jonoska (Tampa, FL), Antonina Kolokolova (St.John's, NL), Antonin
Kucera (Prague), Oliver Kutz (Bremen), Benedikt Loewe (Hamburg &
Amsterdam), Jack Lutz (Ames, IA), Florin Manea (Kiel), Alberto Marcone
(Udine), Radu Mardare (Aalborg), Joe Miller (Madison, WI), Russell
Miller (Flushing, NY), Mia Minnes (La Jolla, CA), Victor Mitrana
(Bucharest, co-chair), Dag Normann (Oslo), Ian Pratt-Hartmann
(Manchester), Mehrnoosh Sadrzadeh (London), Anne Smith (St Andrews),
Mariya Soskova (Sofia, co-chair), Paul Spirakis (Patras & Liverpool),
Susan Stepney (York), Jacobo Toran (Ulm), Marius Zimand (Towson, MD).

In a Call for Papers to be sent out in October 2014, the PC will
invite all researchers in the area of the conference to submit
their papers for presentation at CiE  2015.  The best of the
accepted papers will be published in the conference proceedings
within the Lecture Notes in Computer Science (LNCS) series of
Springer (tbc), which will be available at the conference.

____________________________________________________________________

CiE 2015 http://fmi.unibuc.ro/CiE2015/

ASSOCIATION COMPUTABILITY IN EUROPE http://www.computability.org.uk
CiE Conference Series http://www.illc.uva.nl/CiE
CiE Membership Application Form http://www.cs.swan.ac.uk/acie
Computability (Journal of CiE) http://www.computability.de/journal/
CiE on FaceBook https://www.facebook.com/AssnCiE
Association CiE on Twitter https://twitter.com/AssociationCiE
Fulvio Frati | 23 Sep 17:01 2014
Picon

[CITIMA2014] Submission deadline extended: September 30, 2014

[Apologies if you receives multiple copies of this cfp]

 

*************************************************************************************************************

CITIMA2014

First International Workshop on Computational Intelligence Techniques for Industrial and Medical Applications

Collocated with:

SITIS 2014 - The 10h International Conference on SIGNAL IMAGE TECHNOLOGY & INTERNET BASED SYSTEMS

November 23-27, 2014 - Marrakech, Morocco

http://www.sitis-conf.org

*************************************************************************************************************

 

** Scope of the Workshop

 

Computational Intelligence techniques are adopted in many industrial applications, like visual based quality control, image enhancement in consumer electronics, video based recognition of identity or behaviors, audio based speech recognition for enhanced human like interaction with machines etc. It also has a strong impact in medical applications, like medical image enhancement, semi-automatic detection of pathologies, pre-filtering and reconstruction of volumes from medical scans etc. Despite this growing diffusion, there are still many possible areas where computational intelligence application is partial or could be extended and improved, due to the actual limitations in terms of computational power or strict requirements in terms of assurance of the results.

This workshop aims to investigate the impact of the adoption of advanced and innovative Computational Intelligence techniques in industrial and medical applications. This edition of the workshop is focused primarily on Imaging and Multimedia based industrial and medical applications with special emphasis to real time systems

The workshop will bring together researchers on different disciplines from academia and industry with a common objective: go beyond the frontiers of today industrial applications of Computational Intelligence techniques.

 

Topics for the workshop include, but are not limited to:

- Imaging for Industrial applications

- Computational Intelligence approaches in Consumer Electronics

- Real-time Multimedia Signal Processing

- Intelligent User Interfaces

- Virtual-augmented reality for Healthcare

- Real-time digital images & watermarking

- Real-time signal compression and analysis

- Spatial and temporal estimation and protection of media streams

- Learning systems for signal and information processing and evidential reasoning for recognition

- Soft computing approaches for embedded multimedia systems

- Real time signal processing & vision

- Expert system for embedded system

- Color and illumination processing

 

** Important dates

Submission deadline: September 30, 2014 *FIRM*

Acceptance/Reject notification: October 6, 2014

Camera-ready: October 15, 2014

Author Registration: October 19, 2014

** Submission

Each submission should be at most 8 pages in total including bibliography and well-marked appendices, and must follow the IEEE double columns publication format.

All submitted papers will be carefully evaluated based on originality, significance, technical soundness, and clarity of expression by at least two reviewers. The organizers will examine the reviews and make final paper selections.

 

** Publication

All the papers accepted for the workshop will be included in the conference proceedings. The proceedings will be published by IEEE Computer Society and referenced in IEEE Xplore Digital Library and major indexes. They will be available at the conference.

** Registration

At least one author of each accepted paper must register for the workshop. A single registration for the workshop or the conference allows attending both events.

** Program Co-Chairs

M. Anisetti Università degli studi di Milano, Italy

R. Sassi Università degli studi di Milano, Italy

V. Bellandi, Università degli Studi di Milano, Italy

G. Jeon, Incheon National University, Korea

 

** Contacts

marco.anisetti-Jwo7OjyBeCI@public.gmane.org

roberto.sassi-Jwo7OjyBeCI@public.gmane.org

 

 

_______________________________________________
Om-announce mailing list
Om-announce@...
http://openmath.org/mailman/listinfo/om-announce
Kosaku Nagasaka | 22 Sep 02:36 2014
Picon

[ISSAC-ANNOUNCE] ISSAC’14: JSC Special Issue - Call for Papers

JOURNAL OF SYMBOLIC COMPUTATION

Call for Papers: Special Issue - ISSAC 2014

Following the 39th International Symposium on Symbolic and Algebraic
Computation (ISSAC’14) which was held at Kobe University, Japan,
between July 23-25, 2014, we invite submissions to a special issue
of the Journal of  Symbolic Computation
http://www.journals.elsevier.com/journal-of-symbolic-computation/.

We solicit high-quality original research papers with journal-style
extent of contribution. The main focus of this special issue will be
on work (papers, tutorials, plenary talks, posters and softwares)
presented at ISSAC’14, but this call is open to further submissions
close to presentations at ISSAC'14.

Potential contributors may contact the guest editors to discuss the
suitability of topics and papers, by sending an email to
issac14specialissue <at> gmail.com

*Guest Editors:*
------------------------------
- Kosaku Nagasaka (Kobe University, Japan)
- Agnes Szanto    (North Carolina State University, USA)
- Franz Winkler   (RISC, Linz, Austria)

*Important Dates:*
------------------------------
- Deadline for paper submission:         December 1st, 2014.
- Notification of acceptance/rejection:  April, 2015.
- Publication of special issue:          Fall 2015.

*Submission Guidelines:*
------------------------------
You are recommended to use the Elsevier article class *elsarticle.cls*
(http://www.ctan.org/tex-archive/macros/latex/contrib/elsarticle) to
prepare your manuscript and BibTeX (http://www.bibtex.org) to generate
your bibliography.

All submitted papers will be refereed according to the usual JSC
refereeing process. Submission is via EasyChair, at the website
  https://easychair.org/conferences/?conf=issac14specialissue

- The introduction of the paper must explicitly address the following
   questions in succinct and informal manner:

      - What is the problem?
      - Why is the problem important?
      - What has been done so far on the problem?
      - What is the main contribution of the paper on the problem?
      - Why is the contribution original? (see below for clarification)
      - Why is the contribution non-trivial?
      - How is the journal paper different from the conference paper.

- Make it complete (since there is no page limit).

      - All the related works and issues must be completely and
        carefully discussed.
      - All the previous relevant JSC papers must be properly cited
        and discussed.
      - All the theorem must be rigorously proved (no sketch allowed).
      - All the important definitions/theorems/algorithms must be
        illustrated by well chosen examples.

- Address all the feedback from the conference's referee process and Q/A.

*Clarification:*
------------------------------
The results, already published in the conference paper will be still
counted as an original result for JSC refereeing process.

*Contact:*
------------------------------
Inquiries should be sent to issac14specialissue <at> gmail.com

yours sincerely,
--
Kosaku Nagasaka (ISSAC 2014 general co-chair with Franz Winkler)

*****
You may leave the ISSAC-ANNOUNCE list at any time by sending a "SIGNOFF ISSAC-ANNOUNCE" command to
LISTSERV <at> LISTSERV.ACM.ORG or by visiting http://listserv.acm.org/archives/ISSAC-ANNOUNCE.html.
_______________________________________________
Om-announce mailing list
Om-announce <at> openmath.org
http://openmath.org/mailman/listinfo/om-announce
GRLMC | 21 Sep 10:14 2014

SLSP 2014: call for participation

*To be removed from our mailing list, please respond to this message with UNSUBSCRIBE in the subject line*

**********************************************************************************

2nd INTERNATIONAL CONFERENCE ON STATISTICAL LANGUAGE AND SPEECH PROCESSING

SLSP 2014

Grenoble, France

October 14-16, 2014

Organised by:

Équipe GETALP
Laboratoire d’Informatique de Grenoble

Research Group on Mathematical Linguistics (GRLMC)
Rovira i Virgili University

http://grammars.grlmc.com/slsp2014/

**********************************************************************************

PROGRAM

Tuesday, October 14

9:00 - 10:00	Registration

10:00 - 10:15	Opening

10:15 - 11:05	Roger K. Moore: Spoken Language Processing: Time to Look Outside? - Invited Lecture

11:05 - 11:35	Coffee Break

11:35 - 12:50

Georgios Kontonatsios, Claudiu Mihaila, Ioannis Korkontzelos, Paul Thompson, and Sophia Ananiadou: A
Hybrid Approach to Compiling Bilingual Dictionaries of Medical Terms from Parallel Corpora

Wei Liu, Zhipeng Chang, and William J. Teahan: Experiments with a PPM Compression-based Method for
English-Chinese Bilingual Sentence Alignment

Chi-kiu Lo and Dekai Wu: BiMEANT: Integrating Cross-lingual and Monolingual Semantic Frame
Similarities in the MEANT Semantic MT Evaluation Metric

12:50 - 14:20	Lunch

14:20 - 15:35

Mathias Verbeke, Vincent Van Asch, Walter Daelemans, and Luc De Raedt: Lazy and Eager Relational Learning
using Graph-Kernels

Mohamed Amine Boukhaled, and Jean-Gabriel Ganascia: Probabilistic Anomaly Detection Method for
Authorship Verification

Uli Fahrenberg, Fabrizio Biondi, Kevin Corre, Cyrille Jegourel, Simon Kongshj, and Axel Legay:
Measuring Global Similarity between Texts

16:00 - 18:00	Touristic visit

Wednesday, October 15

9:00 - 9:50 	Claire Gardent: Syntax and Data-to-Text Generation - Invited Lecture

9:50 - 10:05	Break

10:05 - 11:20

Borbála Siklósi and Attila Novák: Identifying and Clustering Relevant Terms in Clinical Records
Using Unsupervised Methods

Amine Abdaoui, Jérôme Azé, Sandra Bringay, Natalia Grabar, and Pascal Poncelet: Predicting Medical
Roles in Online Health Fora

Ekaterina Pronoza, Elena Yagunova, and Svetlana Volskaya: Corpus-based Information Extraction and
Opinion Mining for the Restaurant Recommendation System

11:20 - 11:50	Coffee Break and Group Photo

11:50 - 13:05

Raúl Ernesto Gutierrez de Piñerez Reyes and Juan Francisco Díaz-Frías: Informal Mathematical
Discourse Parsing with Conditional Random Fields

Waad Ben Kheder, Driss Matrouf, Pierre-Michel Bousquet, Jean-François Bonastre and Moez Ajili: Robust
Speaker Recognition Using MAP Estimation of Additive Noise in i-vectors Space

Arseniy Gorin and Denis Jouvet: Structured GMM Based on Unsupervised Clustering for Recognizing Adult
and Child Speech

13:05 - 14:35	Lunch

14:35 - 16:35	Visit to the Domus apartment

Thursday, October 16

9:00 - 9:50	Martti Vainio: Phonetics and Machine Learning: Hierarchical Modelling of Prosody in
Statistical Speech Synthesis - Invited Lecture

9:50 - 10:05	Break

10:05 - 11:20

Gábor Kiss and Klára Vicsi: Physiological and Cognitive Status Monitoring on the Base of
Acoustic-phonetic Speech Parameters

Barbara Schuppler, Sebastian Grill, André Menrath, and Juan A. Morales-Cordovilla: Automatic
Phonetic Transcription in Two Steps: Forced Alignment and Burst Detection

Mian Du, Matthew Pierce, Lidia Pivovarova, and Roman Yangarber: Supervised Classification using
Balanced Training

11:20 - 11:50	Coffee Break

11:50 - 13:05

Márius Šajgalík, Michal Barla, and Mária Bieliková: Exploring Multidimensional Continuous
Feature Space to Extract Relevant Words

Zhemin Zhu, Djoerd Hiemstra, and Peter Apers: Linear Co-occurrence Rate Networks (L-CRNs) for Sequence Labeling

Théodore Bluche, Hermann Ney, and Christopher Kermorvant: Handwriting Recognition with Deep and
Recurrent Neural Networks

13:05 - 13:15	Closing

---
Este mensaje no contiene virus ni malware porque la protección de avast! Antivirus está activa.
http://www.avast.com

_______________________________________________
Om-announce mailing list
Om-announce <at> openmath.org
http://openmath.org/mailman/listinfo/om-announce
Shui Yu | 19 Sep 06:12 2014
Picon

IEEE INFOCOM 15 Workshop of BigSecurity


We apology for possible cross posting

--

The Third International Workshop on Security and Privacy in Big Data  (in conjunction with IEEE INFOCOM 2015)  http://www.nsp.org.au/confs/bigsecurity2015/   

As we are deep into the Information Age, we also witness the explosive growth of data available on the Internet. Human beings have created quintillion bytes of data every day, which come from sensors, individual archives, social networks, Internet of Things, enterprise and Internet in all scales and formats. We face one of the most challenging issues, i.e., how to effectively manage such a large amount of data and identify new ways to analyze large amounts of data and unlock information. The issue is also known as Big Data, which has been emerging as a hot topic in Information and Communication Technologies (ICT) research.  Security and privacy issue is critical for Big Data. Many works have been carried out focusing on business, application and information processing level from big data, such as data mining and analysis.  However, security and privacy issues in Big Data are seldom mentioned to date. Due to its extraordinary scale, security and privacy in Big Data faces many challenges, such as efficient encryption and decryption algorithms, encrypted information retrieval, attribute based encryption, attacks on availability, reliability and integrity of Big Data.

 

The purpose of this workshop is to offer a timely venue for researchers and industry partners to present and discuss their latest results in security and privacy related work of Big Data. 

The topics of interest include, but are not limited to: 

·         Threat and Vulnerability Analysis in Big Data

·         Architecture for Security and Privacy in Big Data

·         Encrypted Information Retrieval in Big Data

·         Cryptanalysis and Applications in Big Data

·         Lightweight Cryptographic Algorithms in Big Data

·         Trust in Big Data

·         Network Security, Privacy in Big Data

·         Network Forensics in Big Data

·         Anonymous Communication in Big Data

·         Physical Layer Security in Big Data

·         Privacy and Security in Cloud Data

·         Privacy and Security in Data Center Networks

·         Application Level Security and Privacy in Big Data

·         Attacks and Counter Measures in Big Data

·         Information Forensics in Big Data

·         Secure Cross-layer Design in Big Data

·         Identity Management and Key Management in Big Data

·         Intrusion Detection and Response in Big Data

·         Security and Privacy in Complex Networks

·         Malware and Virus Detection in Big Data

·         Biometric Security and Forensics in Big Data

·         Reliability and Availability in Big Data

·         Network Security in Big Data

·         Network Privacy in Big Data

·         Security and Privacy Theories in Big Data

 

General Co-chairs

Professor Ivan Stojmenovic, University of Ottawa, Canada

Professor Jian Pei, Simon Fraser University, Canada

 

Technical Program Co-chairs

Dr Shui Yu, Deakin University, Australia

Professor Ke Liu, National Natural Science Foundation of China, China

 

Submission Instructions are available to the workshop website.

 

Important Dates

Submission Deadline: December 15, 2014

Authors Notification:  January 15, 2015

Final Manuscript Due: February 15, 2015

 

Enquiries should be submitted to Dr Shui Yu (syu <at> deakin.edu.au). 


--

-----------------------------

Shui YU, PhD, Senior Lecturer

School of Information Technology, Deakin University,

221 Burwood Highway, Burwood, VIC 3125,  Australia.

Telephone:0061 3 9251 7744

http://www.deakin.edu.au/~syu

_______________________________________________
Om-announce mailing list
Om-announce@...
http://openmath.org/mailman/listinfo/om-announce

Gmane