SYNASC 2014 | 29 Jul 08:30 2014

[2 days left for submission] CFP workshops in the framework of SYNASC 2014

Call for Papers for Workshops in the framework of

                       SYNASC 2014

              16th International Symposium on
   Symbolic and Numeric Algorithms for Scientific Computing
         September 22-25, 2014, Timisoara, Romania

Extended deadlines:
Submission of papers (FIRM extended deadline): 30 July 2014 
Notification of acceptance: 17 August 2014

 * Workshop on Agents for Complex Systems (ACSys)

 * Workshop on Computational Topology in Image Context (CTIC)

 * Workshop on GIC and Hydrologic Modeling (HydroGIS)    

 * Workshop on Iterative Approximation of Fixed Points (IAFP)

 * Workshop on Natural Computing and Applications (NCA)
(Continue reading)

Klaus Havelund | 29 Jul 06:15 2014

[fm-announcements] RV 2014: Call for Participation


RV 2014: 14th International Conference on Runtime Verification

September 22 - September 25, 2014, Toronto, Canada


Runtime verification is concerned with monitoring and analysis of software and hardware system executions. Runtime verification techniques are important for system correctness, reliability, and robustness; they are complementary to conventional testing, and more practical than exhaustive formal verification. Runtime verification can be used prior to deployment, for testing, verification, and debugging purposes, and after deployment for ensuring reliability, safety, and security and for providing fault containment and recovery as well as online system repair. Topics of interest to the conference include:

  • specification languages
  • specification mining
  • program instrumentation
  • monitor construction techniques
  • logging, recording, and replay
  • fault detection, localization, containment, recovery and repair
  • program steering and adaptation
  • metrics and statistical information gathering
  • combination of static and dynamic analyses
  • program execution visualization
  • monitoring techniques for safety/mission-critical systems
  • monitoring distributed systems, cloud services, and big data applications
  • monitoring security and privacy policies

Application areas of runtime verification include safety/mission-critical systems, enterprise and systems software, autonomous and reactive control systems, health management and diagnosis systems, and system security and privacy.


  • Kevin Driscoll
    Fellow at Honeywell Labs, USA
    Murphy Strikes Again
  • Assaf Schuster
    Professor of Computer Science, Computer Science Department, Technion, Israel
    Monitoring Big, Distributed, Streaming Data
  • Jeannette Wing
    President's Professor of Computer Science,
    Computer Science Department, Carnegie Mellon University, USA
    Formal Methods: An Industrial Perspective


  • Vijay K. Garg & Neeraj Mittal
    UT at Austin & UT at Dallas
    A Lattice-Theoretic Approach to Monitoring Distributed Computations
  • David Basin & Felix Klaedtke
    ETH-Zurich & NEC Labs, Europe
    Runtime Monitoring and Enforcement of Security Policies


The Fields Institute for Research in Mathematical Sciences

222 College Street, Toronto, Ontario, Canada


Registration on line to Aug. 21, on site Sept. 22

Registration fees $575, after Aug. 21 $675

Student $350, after Aug. 21, $450

Fees include proceedings and 1x Conference banquet

Additional banquet tickets $80

Registration link:


  • Pierre Fraigniaud, Sergio Rajsbaum and Corentin Travers. 
    On the Number of Opinions Needed for Fault-Tolerant Run-Time Monitoring in Distributed Systems
  • Simon Varvaressos, Kim Lavoie, Sebastien Gaboury and Sylvain Hallé.
    Multiple Ways to Fail: Generalizing a Monitor's Verdict for the Classification of Execution Traces
  • Clemens Ballarin.
    Two Generalisations of Roşu and Chen's Trace Slicing Algorithm A
  • Martin Hentschel, Richard Bubel and Reiner Hähnle.
    Symbolic Execution Debugger (SED) 
  • Jiannan Zhai, Nigamanth Sridhar and Jason Hallstrom.
    Supporting the Specification and Runtime Validation of Asynchronous Calling Patterns in Reactive Systems 
  • Emmanouil Koukoutos and Viktor Kuncak.
    Checking Data Structure Properties Orders of Magnitude Faster 
  • Maria Christakis, Patrick Emmisberger and Peter Müller.
    Dynamic Test Generation with Static Fields and Initializers 
  • Aravind Sukumaran-Rajam, Juan Manuel Martinez Caamano, Willy Wolff, Alexandra Jimborean and Philippe Clauss.
    Speculative Program Parallelization with Scalable and Decentralized Runtime Verification 
  • Christian Colombo and Yliès Falcone.
    Organising LTL Monitors over Distributed Systems with a Global Clock 
  • Erdal Mutlu, Vladimir Gajinov, Adrian Cristal, Serdar Tasiran and Osman Unsal.
    Dynamic Verification for Hybrid Concurrent Programming Models 
  • Hsi-Ming Ho, Joel Ouaknine and James Worrell.
    Online Monitoring of Metric Temporal Logic
  • David Basin, Germano Caronni, Sarah Ereth, Matúš Harvan, Felix Klaedtke and Heiko Mantel.
    Scalable Offline Monitoring 
  • David Basin, Felix Klaedtke, Srdjan Marinovic and Eugen Zalinescu.
    On Real-time Monitoring with Imprecise Timestamps 
  • Anand Yeolekar.
    Improving dynamic inference with variable dependence graph 
  • Ming Chai and Holger Schlingloff.
    Monitoring Systems with Extended Live Sequence Charts 
  • Laura Bozzelli and César Sánchez.
    Foundations of Boolean Stream Runtime Verification 
  • Mitra Tabaei Befrouei, Chao Wang and Georg Weissenbacher.
    Abstraction and Mining of Traces to Explain Concurrency-Bugs 
  • Stefan Mitsch and André Platzer.
    ModelPlex: Verified Runtime Validation of Verified Cyber-Physical System Models 
  • Johannes Geist, Kristin Y. Rozier and Johann Schumann.
    Runtime Observer Pairs and Bayesian Network Reasoners On-board FPGAs: Flight-Certifiable System Health Management for Embedded Systems 
  • Malte Isberner, Falk Howar and Bernhard Steffen
    The TTT Algorithm: A Redundancy-Free Approach to Active Automata Learning
  • Kim Lavoie, Corentin Leplongeon, Simon Varvaressos, Sebastien Gaboury and Sylvain Hallé.
    Portable Runtime Verification with Smartphones and Optical Codes 
  • Adel Dokhanchi, Bardh Hoxha and Georgios Fainekos
    On-Line Monitoring for Temporal Logic Robustness 
  • Jeff Huang, Cansu Erdogan, Yi Zhang, Brandon Moore, Qingzhou Luo, Aravind Sundaresan and Grigore Rosu.
    ROSRV: Runtime Verification for Robots 
  • Qingzhou Luo, Yi Zhang, Choonghwan Lee, Dongyun Jin, Patrick Meredith, Traian Serbanuta and Grigore Rosu.
    RV-Monitor: Efficient Parametric Runtime Verification with Simultaneous Properties 
  • Duc Hiep Chu, Joxan Jaffar and Vijayaraghavan Murali.
    Lazy Symbolic Execution for Enhanced Learning 
  • Kuei Sun, Daniel Fryer, Ashvin Goel, Dai Qin and Angela Demke Brown.
    Robust Consistency Checking for Modern Filesystems 
  • Ayoub Nouri, Balaji Raman, Marius Bozga, Axel Legay and Saddek Bensalem.
    Faster Statistical Model Checking by Means of Abstraction and Learning


  • General Chair: Sebastian Fischmeister (University of Waterloo, Canada).
  • PC co-Chairs: 
    • Borzoo Bonakdarpour (McMaster University, Canada)
    • Scott Smolka (Stony Brook Universtiy, USA)
  • Tools Track Chair: Ezio Bartocci (TU Vienna, Austria)
  • Runtime Monitoring Competition Co-Chairs:
    • Ezio Bartocci (TU Vienna, Austria)
    • Borzoo Bonakdarpour (McMaster University, Canada)
    • Ylies Falcone (Université Joseph Fourier, France)
  • Publicity Chair: Ylies Falcone (Université Joseph Fourier, France)
  • Local Arrangements Chair: Patrick Lam (University of Waterloo, Canada)


More information about RV2014 is available from the conference web site:

To opt-out from this mailing list, send an email to


with the word 'unsubscribe' as subject or in the body. You can also make the request by contacting

Om-announce mailing list
Giovanni Livraga | 28 Jul 18:57 2014

WPES 2014 - Deadline in a few days (July 30, 2014)

[Apologies if you receive multiple copies of this message]


*** Deadline in a few days (July 30, 2014 - 11:59PM American Samoa time) ***

Workshop on Privacy in the Electronic Society (WPES 2014)
Scottsdale, Arizona, USA - November 3, 2014

The increased power and interconnectivity of computer systems available
today create the ability to store and process large amounts of data,
resulting in networked information accessible from anywhere at any time.
It is becoming easier to collect, exchange, access, process, and link
information. This global scenario has inevitably resulted in an increasing
degree of awareness with respect to privacy. Privacy issues have been the
subject of public debates, and the need for privacy-aware policies,
regulations, and techniques has been widely recognized. The goal of this
workshop is to discuss the problems of privacy in the global interconnected
societies and possible solutions to them.

The workshop seeks submissions from academia and industry presenting novel
research on all theoretical and practical aspects of electronic privacy,
as well as experimental studies of fielded systems. We encourage submissions
from other communities such as law and business that present these
communities' perspectives on technological issues.
Topics of interest include, but are not limited to:

- anonymity, pseudonymity, and unlinkability
- crowdsourcing for privacy and security
- data correlation and leakage attacks
- data security and privacy
- electronic communication privacy
- economics of privacy
- information dissemination control
- models, languages, and techniques for big data protection
- personally identifiable information
- privacy-aware access control
- privacy and anonymity on the Web
- privacy in cloud and grid systems
- privacy and confidentiality management
- privacy and data mining
- privacy in digital business
- privacy in electronic records
- privacy enhancing technologies
- privacy in health care and public administration
- privacy and human rights
- privacy metrics
- privacy in mobile systems
- privacy in online education
- privacy in outsourced scenarios
- privacy policies
- privacy vs. security
- privacy in social networks
- privacy threats
- privacy and virtual identity
- privacy through accountability
- public records and personal privacy
- user profiling
- wireless privacy

Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal, conference, or
workshop with proceedings. Regular submissions should be at most 10 pages
in the ACM double-column format, excluding well-marked appendices, and at
most 12 pages total. Committee members are not required to read the appendices,
and so the paper should be intelligible without them. Submissions should not
be anonymized. The workshop will also consider short submissions of up to
4 pages for results that are preliminary or that simply require few
pages to describe. Authors of regular submitted papers will indicate at
the time of submission whether they would like their paper to also be
considered for publication as a short paper (4 proceedings pages).

Submissions are to be made to the submission web site at You will be requested
to upload the file of your paper (in PDF format only). Submissions not
meeting these guidelines risk rejection without consideration of their merits.
Papers must be received by the deadline of July 30, 2014, 11:59PM American 
Samoa time (extended deadline) to be considered.
Notification of acceptance or rejection will be sent to authors by
August 25, 2014. The camera ready must be prepared by September 7, 2014 (firm).
Proceedings of the workshop will be published by ACM on a CD, available to
the workshop attendees. Papers will be included in the ACM Digital Library,
with a specific ISBN. Each accepted paper must be presented by an author,
who will have to be registered by the early-bird registration deadline.

Paper submission due: July 30, 2014 (11:59PM American Samoa time) [extended]
Notification to authors: August 25, 2014
Camera ready due: September 7, 2014

GENERAL CHAIR (ACM CCS 2014 General Chair)
Gail-Joon Ahn
Arizona State University, USA

Anupam Datta
Carnegie Mellon University

Giovanni Livraga
Universita' degli Studi di Milano, Italy


Rafael Accorsi, University of Freiburg, Germany
Devdatta Akhawe, UC Berkeley, USA
Michael Backes, Saarland University, Germany
Jeremiah Blocki, Carnegie Mellon University, USA
Kelly Caine, Clemson University, USA
Emiliano De Cristofaro, University College London, UK
Anupam Datta, Carnegie Mellon University, USA
George Danezis, University College London, UK
Sabrina De Capitani di Vimercati, Universita' degli Studi di Milano, Italy
Nadia Fawaz, Technicolor, USA
Sara Foresti, Universita' degli Studi di Milano, Italy
Joaquin Garcia-Alfaro, Telecom SudParis, France
Vaibhav Garg, Drexel University, USA
Rachel Greenstadt, Drexel University, USA
Jens Grossklags, Pennsylvania State University, USA
Urs Hengartner, University of Waterloo, Canada
Nicholas Hopper, University of Minnesota, USA
Sushil Jajodia, George Mason University, USA
Suman Jana, University of Texas at Austin, USA
Limin Jia, Carnegie Mellon University, USA
Lalana Kagal, MIT, USA
Murat Kantarcioglu, University of Texas at Dallas, USA
Patrick Gage Kelley, University of New Mexico, USA
Florian Kerschbaum, SAP, Germany
Aleksandra Korolova, Google, USA
Adam J. Lee, University of Pittsburgh, USA
Javier Lopez, University of Malaga, Spain
Ashwin Machanavajjhala, Duke University, USA
Bradley Malin, Vanderbilt University, USA
Jonathan Mayer, Stanford University, USA
Prateek Mittal, Princeton University, USA
Olga Ohrimenko, Microsoft Research, UK
Charalampos Papamanthou, University of Maryland College Park, USA
Franziska Roesner, University of Washington, USA
Mark Ryan, University of Birmingham, UK
Pierangela Samarati, Universita' degli Studi di Milano, Italy
Paul Syverson, Naval Research Laboratory, USA
Michael Tschantz, UC Berkeley, USA

Sabrina De Capitani di Vimercati, Universita' degli Studi di Milano, Italy
Sushil Jajodia, George Mason University, USA
Pierangela Samarati, Universita' degli Studi di Milano, Italy
Paul Syverson, Naval Research Laboratory, USA

If you have any question, please contact the organizers at wpes2014 <at>
Il 5 x mille alla nostra Università è un investimento sui giovani,
sui loro migliori progetti.

Sostiene la libera ricerca.
Alimenta le loro speranze nel futuro.

Investi il tuo 5 x mille sui giovani.

Università degli Studi di Milano
codice fiscale 80012650158
SYNASC 2014 | 25 Jul 15:49 2014

[5 days left for submission] CFP workshops in the framework of SYNASC 2014

Call for Papers for Workshops in the framework of

                       SYNASC 2014

              16th International Symposium on
   Symbolic and Numeric Algorithms for Scientific Computing
         September 22-25, 2014, Timisoara, Romania

Extended deadlines:
Submission of papers (FIRM extended deadline): 30 July 2014 
Notification of acceptance: 17 August 2014

 * Workshop on Agents for Complex Systems (ACSys)

 * Workshop on Computational Topology in Image Context (CTIC)

 * Workshop on GIC and Hydrologic Modeling (HydroGIS)    

 * Workshop on Iterative Approximation of Fixed Points (IAFP)

 * Workshop on Natural Computing and Applications (NCA)

West University of Timisoara
Department of Computer Science
Bd. V. Parvan 4, 300223 Timisoara, Romania
tel: + (40) 256 592195, +(40) 256 592389
fax: + (40) 256 592316, +(40) 256 592380
e-mail: synasc14@...
GRLMC | 26 Jul 21:32 2014

LATA 2015: 1st call for papers

*To be removed from our mailing list, please respond to this message with UNSUBSCRIBE in the subject line*



LATA 2015

Nice, France

March 2-6, 2015

Organized by:
CNRS, I3S, UMR 7271
Nice Sophia Antipolis University

Research Group on Mathematical Linguistics (GRLMC)
Rovira i Virgili University



LATA is a conference series on theoretical computer science and its applications. Following the
tradition of the diverse PhD training events in the field developed at Rovira i Virgili University in
Tarragona since 2002, LATA 2015 will reserve significant room for young scholars at the beginning of
their career. It will aim at attracting contributions from classical theory fields as well as
application areas.


LATA 2015 will take place in Nice, the second largest French city on the Mediterranean coast. The venue will
be the University Castle at Parc Valrose.


Topics of either theoretical or applied interest include, but are not limited to:

algebraic language theory
algorithms for semi-structured data mining
algorithms on automata and words
automata and logic
automata for system analysis and programme verification
automata networks
automata, concurrency and Petri nets
automatic structures
cellular automata
combinatorics on words
computational complexity
data and image compression
descriptional complexity
digital libraries and document engineering
foundations of finite state technology
foundations of XML
fuzzy and rough languages
grammars (Chomsky hierarchy, contextual, unification, categorial, etc.)
grammatical inference and algorithmic learning
graphs and graph transformation
language varieties and semigroups
language-based cryptography
parallel and regulated rewriting
power series
string and combinatorial issues in bioinformatics
string processing algorithms
symbolic dynamics
term rewriting
trees, tree languages and tree automata
unconventional models of computation
weighted automata


LATA 2015 will consist of:

invited talks
invited tutorials
peer-reviewed contributions


to be announced


Andrew Adamatzky (West of England, Bristol, UK)
Andris Ambainis (Latvia, Riga, LV)
Franz Baader (Dresden Tech, DE)
Rajesh Bhatt (Massachusetts, Amherst, US)
José-Manuel Colom (Zaragoza, ES)
Bruno Courcelle (Bordeaux, FR)
Erzsébet Csuhaj-Varjú (Eötvös Loránd, Budapest, HU)
Aldo de Luca (Naples Federico II, IT)
Susanna Donatelli (Turin, IT)
Paola Flocchini (Ottawa, CA)
Enrico Formenti (Nice, FR)
Tero Harju (Turku, FI)
Monika Heiner (Brandenburg Tech, Cottbus, DE)
Yiguang Hong (Chinese Academy, Beijing, CN)
Kazuo Iwama (Kyoto, JP)
Sanjay Jain (National Singapore, SG)
Maciej Koutny (Newcastle, UK)
Antonín Kučera (Masaryk, Brno, CZ)
Thierry Lecroq (Rouen, FR)
Salvador Lucas (Valencia Tech, ES)
Veli Mäkinen (Helsinki, FI)
Carlos Martín-Vide (Rovira i Virgili, Tarragona, ES, chair)
Filippo Mignosi (L’Aquila, IT)
Victor Mitrana (Madrid Tech, ES)
Ilan Newman (Haifa, IL)
Joachim Niehren (INRIA, Lille, FR)
Enno Ohlebusch (Ulm, DE)
Arlindo Oliveira (Lisbon, PT)
Joël Ouaknine (Oxford, UK)
Wojciech Penczek (Polish Academy, Warsaw, PL)
Dominique Perrin (ESIEE, Paris, FR)
Alberto Policriti (Udine, IT)
Sanguthevar Rajasekaran (Connecticut, Storrs, US)
Jörg Rothe (Düsseldorf, DE)
Frank Ruskey (Victoria, CA)
Helmut Seidl (Munich Tech, DE)
Ayumi Shinohara (Tohoku, Sendai, JP)
Bernhard Steffen (Dortmund, DE)
Frank Stephan (National Singapore, SG)
Paul Tarau (North Texas, Denton, US)
Andrzej Tarlecki (Warsaw, PL)
Jacobo Torán (Ulm, DE)
Frits Vaandrager (Nijmegen, NL)
Jaco van de Pol (Twente, Enschede, NL)
Pierre Wolper (Liège, BE)
Zhilin Wu (Chinese Academy, Beijing, CN)
Slawomir Zadrozny (Polish Academy, Warsaw, PL)
Hans Zantema (Eindhoven Tech, NL)


Sébastien Autran (Nice)
Adrian Horia Dediu (Tarragona)
Enrico Formenti (Nice, co-chair)
Sandrine Julia (Nice)
Carlos Martín-Vide (Tarragona, co-chair)
Christophe Papazian (Nice)
Julien Provillard (Nice)
Pierre-Alain Scribot (Nice)
Bianca Truthe (Giessen)
Florentina Lilica Voicu (Tarragona)


Authors are invited to submit non-anonymized papers in English presenting original and unpublished
research. Papers should not exceed 12 single-spaced pages (including eventual appendices,
references, etc.) and should be prepared according to the standard format for Springer Verlag's LNCS
series (see

Submissions have to be uploaded to:


A volume of proceedings published by Springer in the LNCS series will be available by the time of the conference.

A special issue of a major journal will be later published containing peer-reviewed substantially
extended versions of some of the papers contributed to the conference. Submissions to it will be by invitation.


The period for registration is open from July 21, 2014 to March 2, 2015. The registration form can be found at:


Paper submission: October 10, 2014 (23:59 CET)
Notification of paper acceptance or rejection: November 18, 2014
Early registration: November 25, 2014
Final version of the paper for the LNCS proceedings: November 26, 2014
Late registration: February 16, 2015
Submission to the journal special issue: June 6, 2015


florentinalilica.voicu <at>


LATA 2015
Research Group on Mathematical Linguistics (GRLMC)
Rovira i Virgili University
Av. Catalunya, 35
43002 Tarragona, Spain

Phone: +34 977 559 543
Fax: +34 977 558 386


Nice Sophia Antipolis University
Rovira i Virgili University

Este mensaje no contiene virus ni malware porque la protección de avast! Antivirus está activa.

Om-announce mailing list
Om-announce <at>
Jacob Johannsen | 27 Jul 14:57 2014

PPDP 2014: Program and 2nd Call for Participation



			      PPDP 2014
		   16th International Symposium on
	  Principles and Practice of Declarative Programming
		Canterbury, Kent, September 8-10, 2014
                           co-located with

			     LOPSTR 2014
		   24th International Symposium on
	   Logic-Based Program Synthesis and Transformation
		Canterbury, Kent, September 9-11, 2014


Two weeks left for early registration (until August 8):

A significant discount is available when registering to both events,
especially as a student (until August 8).

PPDP 2014 features
* an invited talk by Roberto Giacobazzi, shared with LOPSTR:
   "Obscuring Code -- Unveiling and Veiling Information in Programs"
* no fewer than 4 distilled tutorials by
   - Henrik Nilsson and Ivan Perez:
     "Declarative Game Programming"
   - Danko Ilik:
     "Proofs in Continuation-Passing Style:
      normalization of Gödel's System T extended with sums and
      delimited control operators"
   - Jerzy Karczmarczuk:
     "On the Declarative Structure of Quantum Concepts:
      States and Observables"
   - Ralf Laemmel, Andrei Varanovich, and Martin Leinberger:
     "Declarative Software Development"
* the most influential paper 10-year award for PPDP 2004

Tentative program:


Monday 8 September

Welcome to PPDP 2014 - 08:45-09:00
   Olaf Chitil and Andy King

Distilled Tutorial - 9:00-10:00
   Ralf Laemmel
   "Declarative Software Development"

Break - 10:00-10:15

Session - 10:15-11:15

   Rémi Douence and Nicolas Tabareau
   "Lazier Imperative Programming"

   Stefan Mehner, Daniel Seidel, Lutz Straßburger and Janis Voigtländer
   "Parametricity and Proving Free Theorems for Functional-Logic Languages"

Break - 11:15-11:30

Session - 11:30-12:30

   Paul Tarau
   "Bijective Collection Encodings and Boolean Operations
    with Hereditarily Binary Natural Numbers"

   Flavio Cruz, Ricardo Rocha and Seth Goldstein
   "Design and implementation of a multithreaded virtual machine
    for executing linear logic programs"

Lunch break - 12:30-14:00

Distilled tutorial - 14:00-15:00
   Danko Ilik
   "Proofs in Continuation-Passing Style:
    normalization of Gödel's System T
    extended with sums and delimited control operators"

Break - 15:00-15:15

Session - 15:15-16:15

   Kenichi Asai, Luminous Fennell, Peter Thiemann and Yang Zhang
   "A Type Theoretic Specification for Partial Evaluation"

   Paul Downen, Luke Maurer, Zena Ariola and Daniele Varacca
   "Continuations, Processes, and Sharing"

Break - 16:15-16:30

Session - 16:30-17:30

   Pierre Neron
   "Partial Inlining for Program Transformation"

   Jean-Louis Giavitto and José Echeveste
   "Real-Time Matching of Antescofo Temporal Patterns"

Program-chair report - 17:30-17:45
   Olivier Danvy


Tuesday 9 September

Distilled tutorial - 9:00-10:00
   Jerzy Karczmarczuk
   "On the Declarative Structure of Quantum Concepts:
    States and Observables"

Break - 10:00-10:15

Session - 10:15-11:15

   José Meseguer and Salvador Lucas
   "Proving Operational Termination of Declarative Programs in General 

   Fan Yang, Santiago Escobar, Catherine Meadows, José Meseguer and 
Paliath Narendran
   "Theories of Homomorphic Encryption, Unification, and the Finite 
Variant Property"

Break - 11:15-11:30

Session - 11:30-12:30

   Tzu-Chun Chen, Mariangiola Dezani-Ciancaglini and Nobuko Yoshida
   "On the Preciseness of Subtyping in Session Types"

   Hugo Pacheco, Tao Zan and Zhenjiang Hu
   "BiFluX: A Bidirectional Functional Update Language for XML"

Lunch break - 12:30-14:00

Distilled tutorial - 14:00-15:00
   Henrik Nilsson
   "Declarative Game Programming"

Break - 15:00-15:15

Session - 15:15-16:15

   Francisco Ferreira and Brigitte Pientka
   "Bidirectional Elaboration of Dependently Typed Programs"

   Steven Ramsay
   "Exact Intersection Type Abstractions for Safety Checking of 
Recursion Schemes"

Break - 16:15-16:30

Session - 16:30-17:30

   Julian Kranz and Axel Simon
   "Structure-Preserving Compilation:
    Efficient Integration of Functional DSLs into Legacy Systems"

   Ulrich Schöpp
   "Organising Low-Level Programs using Higher Types"


Wednesday 10 September

Invited talk - 9:00-10:00
   Roberto Giacobazzi
   Obscuring Code -- Unveiling and Veiling Information in Programs

Break - 10:00-10:15

Session - 10:15-11:15

   Rémy Haemmerlé
   "On Combining Backward and Forward Chaining in Constraint Logic 

   Nataliia Stulova, Jose F. Morales and Manuel V. Hermenegildo
   "Assertion-based Debugging of Higher-Order (C)LP Programs"

Break - 11:15-11:30

Session - 11:30-12:30

   Takahito Aoto and Sorin Stratulat
   "Decision Procedures for Proving Inductive Theorems without Induction"

   Joachim Jansen, Ingmar Dasseville, Jo Devriendt and Gerda Janssens
   "Experimental Evaluation of a State-of-the-Art Grounder"

Lunch break - 12:30-13:30

Session - 13:30-14:30

   Tom Schrijvers, Nicolas Wu, Benoit Desouter and Bart Demoen
   "Heuristics entwined with handlers combined"

   James Cheney, Amal Ahmed and Umut Acar
   "Database queries that explain their work"


Also, please note a change of dates: LOPSTR will start on September 9,
rather than September 10 as previously announced.

See you in Canterbury!
Om-announce mailing list
Om-announce <at>
MICAI 2014 | 25 Jul 13:50 2014

CFP: MICAI 2014: keynotes Vapnik (SVM), Sowa (conceptual graphs), Liu (opinion mining), Castillo (fuzzy logic)

        MICAI-2014: 13th Mexican International Conference on 

        One-week draft abstracts deadline reminder

        EXCELLENT KEYNOTES: Vapnik, Sowa, Liu, Castillo

        Excellent touristic program

        - 7th Intelligent Learning Environments
        - 1st Recognizing Textual Entailment and Question Answering
        - 7th Hybrid Intelligent Systems

        - John Sowa: Conceptual graphs and knowledge representation
        - Bing Liu: Opinion mining and sentiment analysis
        - Oscar Castillo: Fuzzy logic
        and more

        November 16 to 22, 2014 - Tuxtla Gutierrez, Chiapas, Mexico
        Publication: Springer LNAI (EI, ISI), IEEE CPS, journals
        Submission: July 31 draft abstract / Aug 6 full text 
        (late submissions can be considered)

Topics: all areas of Artificial Intelligence, research or applications.
Workshops. Tutorials. Doctoral Consortium. Best papers awards.


- Vladimir Vapnik (NEC Lab): inventor of SVM
- John Sowa (VivoMind Research; IBM): inventor of conceptual graphs
- Bing Liu (U. of Illinois): opinion mining
- Oscar Castillo (Tijuana IT): fuzzy logic

Proceedings: Springer LNAI (IE, ISI); IEEE CPS,
special issues of journals (including ISI JCR).

Venue: Tuxtla Gutiérrez, Chiapas, Mexico. Cultural program and tours: 
Sumidero canyon; El Chiflón waterfalls; Tenam Puente ancient pyramids; 
San Cristobal de las Casas colonial city (anticipated).

Dates (late submissions are possible):
July 31: draft abstract -- just a general idea of what your paper 
         will be about (takes 1 minute; you can change the text later);
Aug 6:   full text for blind review.

See complete CFP at

PLEASE CIRCULATE this CFP among your colleagues and students.
We apologize if you receive multiple copies. Please reply to
this message if you were contacted by error.

Om-announce mailing list
Om-announce <at>
sara.foresti | 26 Jul 21:50 2014

Deadline extended - IEEE CNS 2014, Call for Posters

[Apologies if you receive multiple copies of this message]


** Due to many requests, the deadline for poster has been 
   extended of one week to 23:59pm, July 30, 2014. **

IEEE CNS 2014 - IEEE Conference on Communications and Network Security
San Francisco, USA -- October 29-31, 2014

2-page Abstract Due by: July 30, 2014 -- 11:59pm *extended*
Notification of Acceptance: August 7, 2014
Final Abstract Due: August 20, 2014

IEEE CNS is a new conference series in IEEE Communications Society (ComSoc)
core conference portfolio and the only ComSoc conference focusing solely on
cyber security. IEEE CNS is a spin-off of IEEE INFOCOM, the premier ComSoc
conference on networking. The goal of CNS is to provide an outstanding forum
for cyber security researchers, practitioners, policy makers, and users to
exchange ideas, techniques and tools, raise awareness, and share experience
related to all practical and theoretical aspects of communications and
network security. 

Building on the success of last year's inaugural conference, IEEE CNS 2014
welcomes Poster submissions to be presented during the conference. 
A Poster submission should be a 2-page abstract, which summarizes the key 
merits of proposed ideas, presents initial results, and identifies
challenges to develop a complete solution. Abstracts will be evaluated
by the Posters Session committee based on the novelty and the potential
to stimulate discussions and promote collaborations. Poster abstracts
should be submitted via EDAS at
Please follow the same template for regular conference papers available
Sample topics of interest include but are not limited to: 
- Security and privacy issues on wired networks, e.g., the Internet, 
  peer-to-peer networks, overlay networks
- Security and privacy issues on wireless networks, e.g., WiFi, WiMax,
  Ah Hoc, Mesh, Sensor, RFID networks
- Security and privacy in social networks and cloud computing
- Security and privacy in smart grid, cognitive radio networks, and 
  disruption/delay tolerant networks
- Information-theoretic security
- Anonymization and privacy in communication systems
- Traffic analysis, location privacy and obfuscation of mobile
  device information
- Physical layer security methods, e.g., confidentiality and authentication
- Secure routing, Secure network management
- Mobile security, Android security, and trusted computing on mobile devices
- Intrusion detection and prevention
- Computer and network forensics 
- Vulnerability, exploitation tools, Malware, Botnet, DDoS attacks 
- Key management and PKI in the context of secure communications
- Security metrics and performance evaluation, traffic analysis techniques 
- Web, e-commerce, m-commerce, and e-mail security
- Social, economic and policy issues of trust, security and privacy
- Ensuring the availability of communications, survivability of networks 

The conference will arrange the poster session in a room where the posters
can be displayed. An accepted poster must be presented by an author in the
poster session to interested attendees. The abstract of the accepted posters
will appear in the conference proceeding and be submitted to IEEE Xplore.
Each accepted poster requires an author to register for the conference
at the appropriate rate based on the membership level. Each author
registration can cover up to three posters or papers of the conference,
but each poster must have a dedicated presenter at the session.

A Best Poster Award will be given based on the poster's novelty and
potentials in research. The quality of presentation and the interaction
during the session will also be important criteria. The award will be
announced in a plenary session of the main conference.

Il 5 x mille alla nostra Università è un investimento sui giovani,
sui loro migliori progetti.

Sostiene la libera ricerca.
Alimenta le loro speranze nel futuro.

Investi il tuo 5 x mille sui giovani.

Università degli Studi di Milano
codice fiscale 80012650158
Pascal Hitzler | 25 Jul 20:10 2014

CfP:Linked Dataset descriptions. Special call of the Semantic Web journal

Special Call of the Semantic Web journal for


Linked Data is a key enabler for the Semantic Web vision and one of the 
steps towards a truly "Semantic Web".

The Semantic Web journal calls for brief papers (usually about 5-8 
pages) containing a concise description of a Linked Dataset. The paper 
shall describe in concise and clear terms key characteristics of the 
dataset as a guide to its usage for various (possibly unforeseen) 
purposes. In particular, such a paper shall typically give information, 
amongst others, on the following aspects of the dataset (if applicable).

     Name, URL, versioning, licensing, availability
     Topic coverage, source for the data
     Purpose of the Linked Dataset, e.g. demonstrated by relevant 
queries or inferences over it
     Applications using the dataset and other metrics of use
     Creation, maintenance and update mechanisms as well as policies to 
ensure sustainability and stability
     Quality, quantity and purpose of links to other datasets
     Domain modeling and use of established vocabularies
     Examples and critical discussion of typical knowledge modeling 
patterns used
     Known shortcomings of the dataset
     A discussion of the dataset in the context of the Five Stars of 
Linked Data Vocabulary Use, 

Papers will be evaluated along the following dimensions: quality of the 
dataset, usefulness (or potential usefulness) of the dataset, as well as 
clarity and completeness of the descriptions.

Papers should usually be written by people involved in the generation or 
maintenance of the dataset, or with the consent of these people.

Prospective authors must take notice of the submission guidelines posted 

Past dataset descriptions which were already accepted for publication 
are available for perusal at 
<>; see also the 
editorial of the first SWJ special issue with linked dataset 
descriptions, available at 
Authors should note, though, that requirements and expectations have 
somewhat evolved since previous calls.


Paper submission: September 30, 2014. Extensions can be granted upon 

Notification: usually within 8 weeks of submission

In case of questions, please contact the Editors-in-chief:

Pascal Hitzler
Krzysztof Janowicz


Prof. Dr. Pascal Hitzler
Dept. of Computer Science, Wright State University, Dayton, OH
Semantic Web Textbook:
Semantic Web Journal:
Maurizio Proietti | 24 Jul 22:44 2014

LOPSTR 2014: Call for Participation

===================== CALL FOR PARTICIPATION =============================

                                               24th International Symposium on
                               Logic-Based Program Synthesis and Transformation
                                                             LOPSTR 2014

                          University of Kent, Canterbury, UK, September 9-11, 2014

                  Co-located with the 16th International ACM SIGPLAN Symposium on 
                    Principles and Practice of Declarative Programming (PPDP 2014)

Early registration by August 8, 2014

Invited Speakers:
     Roberto Giacobazzi (University of Verona, Italy)
"Obscuring Code -- Unveiling and Veiling Information in Programs"
     Viktor Kuncak (EPFL, Switzerland)
Title to be announced

Accepted papers
- Nikita Danilenko
Functional Kleene Closures
- Amer Tahat and Ali Ebnenasir
A Hybrid Method for the Verification and Synthesis of Parameterized Self-Stabilizing Protocols
- German Vidal
Concolic Execution and Test-Case Generation in Prolog
- Henning Christiansen and Maja Kirkeby
Confluence Modulo Equivalence in Constraint Handling Rules
- Remis Balaniuk
Drill & Join: A method for inductive program synthesis
- Minoru Kinoshita, Kohei Suenaga and Atsushi Igarashi
Automatic Synthesis of Combiners in the MapReduce Framework - An Approach with Right Inverse
- Daniel De Schreye, Vincent Nys and Colin Nicholson
Analysing and Compiling Coroutines with Abstract Conjunctive Partial Deduction
- Daniel Gall and Thom Frühwirth
A Formal Semantics for the Cognitive Architecture ACT-R
- J. Robert M. Cornish, Graeme Gange, Jorge A. Navas, Peter Schachte, Harald Søndergaard and Peter J. Stuckey
Analyzing array manipulating programs by program transformation
- Nada Sharaf, Slim Abdennadher and Thom Frühwirth
A Visualization Tool for Constraint Handling Rules
- Salvador Lucas, Jose Meseguer and Raúl Gutiérrez
Extending the 2D DP Framework for CTRSs
- Ahmed Nagah, Amira Zaki and Slim Abdennadher
Exhaustive Execution of CHR through Source-to-Source Transformation
- Sandra Alves, Anatoli Degtyarev and Maribel Fernandez
Access control and obligations in the category-based metamodel: A rewrite-based semantics
- James Lipton, Emilio Jesús Gallego Arias and Julio Mariño
A Declarative Compilation of Constraint Logic Programming
- Jose F. Morales and Manuel V. Hermenegildo
Pre-indexed Terms for Prolog
- Norbert Preining, Kokichi Futatsugi and Kazuhiro Ogata
Liveness properties in CafeOBJ - a case study for meta-level specifications
- Wlodzimierz Drabent
On completeness of logic programs
- Ranjeet Singh and Andy King
Partial Evaluation for Java Malware Detection
- Raul Gutierrez and Salvador Lucas
Below Frozen Positions
- Md Solimul Chowdhury, Jia-Huai You, Wu Chen, Arash Karimi and Fangfang Liu
Polynomial Approximation to Well-Founded Semantics for Logic Programs with Generalized Atoms: Case Studies

Program Co-Chairs:
     Maurizio Proietti, IASI-CNR, Italy (
     Hirohisa Seki, Nagoya Institute of Technology, Japan (

Symposium Co-Chairs:
     Olaf Chitil and Andy King
     School of Computing, University of Kent, UK 

Organizing Committee:
     Emanuele De Angelis, University of Chieti-Pescara and IASI-CNR, Italy 
     Fabrizio Smith, IASI-CNR, Italy
Om-announce mailing list
Agi Kurucz | 25 Jul 10:24 2014

AiML 2014 conference starts on August 5

((Apologies for cross-postings))







     Franz Baader (TU Dresden, Germany)
     Stephane Demri (New York University, US & CNRS, France)
     Joseph Halpern (Cornell University, US)
     Sara Negri (University of Helsinki, Finland)
     Frank Wolter (University of Liverpool, UK)