Call for Book Chapters - Springer “Internet of Things (IoT) in 5G Mobile Technologies” [30th March 2015]

Please consider the following CFC for potential interest and contribution.

[This CFC can also be found in pdf format at:]

Call for Book Chapters for the Springer-Verlag Handbook:

“Internet of Things (IoT) in 5G Mobile Technologies”



Constandinos X. Mavromoustakis, University of Nicosia, Cyprus

George Mastorakis, Technological Educational Institute of Crete, Greece

Jordi Mongay Batalla, National Institute of Telecommunications, Poland


As an increasing number of people communicate and collaborate over the Internet, via different accessing systems and mobile devices, the need for new wireless networks infrastructures, facilitating ubiquitous availability and efficient access to large quantities of distributed resources, has become manifest. The integration of resources availability through the 3As (Anywhere, Anything, Anytime) will become a reality, through the 5G mobile technologies. Notwithstanding, there are a lot of challenges to meet, in order to have the 5G mobile technologies applicable in an efficiently utilized manner. The most complicated and at the same time challenging paradigm is the Internet of Things (IoT) that poses a fertile ground and a hot Research and Development (R&D) area for Pervasive and Ubiquitous computing, being projected as a future growth area in both academia and industry. In this context, this book aims at presenting the current state-of-the-art research and future trends on various aspects of IoT in 5G mobile technologies. It will combine the emerging mobile communications and IoT paradigms, in a common research ground, in order to present various research concepts. The major subjects of the book will cover methodologies, modeling, analysis and newly introduced mobile technologies.

Topics of interest include but are not limited to:

       Machine-to-Machine (M2M) Data Processing and Controlling Networking at the Edge (Sensing and sensor signal processing, sensor networking protocols, energy harvesting and energy management);

     Middleware (System and network architectures, middleware for heterogeneous sensors, devices & protocols, QoS provisioning, security issues [data confidentiality, integrity, network resilience, etc.]);

        Applications and case studies of M2M communications and IoT ecosystems;

    Analytics and management (Data management and analytics: data-stream, sharing, mining etc, business intelligence from sensor data, social network analysis in IoT)

        M2M Infrastructure (Big Data Storage and processing, management and analysis, back-end (cloud based) infrastructure, distributed processing);

     Related applications (Novel application developments and case studies in energy, healthcare, logistics and transportation, manufacturing etc., test-beds and field trials etc.);

     IoT/MP2M/M2M/D2D Management (Device management evolutions, self-coordinated and autonomous management, service harmonization etc.);

         Security in Smart Grids and Smart Spaces for smooth IoT deployment in 5G

         Advanced indexing, naming, and addressing of the IoT in 5G;

        Network-distributed signal processing for security solutions in 5G (joint security and privacy aware protocol design, Test-bed and performance metrics of security solutions in IoT, Deployment and performance evaluation of secure IoT in 5G, Architectures for secure hardware/software IoT systems etc.);

          Network control systems for IoT applications;

       Inter-networking with other technologies and systems (Network Functions Virtualization (NFV) and Cloud Computing as well Mobile Cloud Computing implementation/wearable devices in IoT using 5G etc.);

     Next generation of open platforms and novel hardware for the IoT in 5G access technology, Network middleware and protocols to facilitate Smart environments, Innovative sensing devices and innovative uses of existing sensors (e.g. RFID), use of mobile, wireless, visual, and multi-modal sensor networks in intelligent systems;

    Smart Devices and their inter-communication with other devices/spaces (ie. smart glasses’ communication with smart watch and/or smart wearable devices, Grid and Cloud-oriented devices etc.) including open interfaces and close environments;

         Management of smart services (discovery, publishing) in IoT ecosystems (smart shopping, house, factory, etc.);

         Interconnection of IoT with social network environments (Multimedia transmission, Big data transfer);

         Performance and scalability issues of IoT ecosystems.

We strongly welcome other topic suggestions, dealing with IoT in emerging mobile computing environments.

Sections of the above mentioned topics will be hosted under the following sections:

Section I — Introduction and Applications of IoT in 5G access technologies


Section II — Architecture of IoT in 5G access technologies


Section III— 5G and related technologies


Section IV— IoT in Smart Ambient Systems within 5G


Section V— IoT-Cloud oriented systems for 5G environments


Section VI— IoT smart resource management in 5G


Section VII— 5G and cognitive radio in Smart environments


Section VIII—Resource and Power management in 5G networks


Section IX— Performance Evaluation of IoT-related systems and applications using 5G technologies


Schedule & Deadlines

·         30th March 2015 
Chapter proposal (max. 2-pages)/Intention to submit a chapter

·         31st July. 2015 
Review comments

·         30th Sept. 2015 
Submission of the revised version 

·         30th Oct. 2015 
Final acceptance notification  Final manuscript

·         15th Nov. 2015 
Final manuscript

Manuscript Preparation

·         Each final manuscript should be 18-25 pages long (formatted). Depending on the number of submissions, longer manuscripts will also be accepted.

Om-announce mailing list
Fulvio Frati | 25 Feb 11:01 2015

CFP: 5th International Symposium on Cloud Computing, Trusted Computing and, Secure Virtual Infrastructures (C&TC 2015)

[Apologies if you receive multiple copies of this message]




5th International Symposium on Cloud Computing, Trusted Computing and Secure Virtual Infrastructures -- Cloud and Trusted Computing (C&TC 2015) October 26-28, 2015 -- Rhodes, Greece







Current and future software needs to remain focused towards the development and deployment of large and complex intelligent and networked information systems, required for internet-based and intranet-based systems in organizations. Today software covers a very wide range of application domains as well as technology and research issues. This has found realization through Cloud Computing. Vital element in such networked information systems are the notions of trust, security, privacy and risk management.


Cloud and Trusted Computing (C&TC 2015) is the 5th International Symposium on Cloud Computing, Trusted Computing and Secure Virtual Infrastructures, organized as a component conference of the OnTheMove Federated Conferences & Workshops. C&TC 2015 will be held in Rhodes, Greece.


The conference solicits submissions from both academia and industry presenting novel research in the context of Cloud Computing, presenting theoretical and practical approaches to cloud trust, security, privacy and risk management. The conference will provide a special focus on the intersection between cloud and trust bringing together experts from the two communities to discuss on the vital issues of trust, security, privacy and risk management in Cloud Computing. Potential contributions could cover new approaches, methodologies, protocols, tools, or verification and validation techniques. We also welcome review papers that analyze critically the current status of trust, security, privacy and risk management in the cloud. Papers from practitioners who encounter trust, security, privacy and risk management problems and seek understanding are also welcome.


Topics of interests of C&TC 2015 include, but are not limited to:



- Assurance Techniques

- Access Control, Authorization, and Authentication

- Cloud Computing with Autonomic and Trusted Environment

- Cryptographic Algorithms and Protocols

- Cyber Attack, Crime and Cyber War

- DRM, Watermarking Technology, IP Protection

- Emergency and Security Systems

- End-to-end security over complex cloud supply chain

- Forensics

- Human Interaction with Trusted and Autonomic Computing Systems

- Identity and Trust Management

- Multimedia Security Issues over Mobile and Wireless Clouds

- Network Security

- Networks of Trust, Clouds of Trust

- Privacy, Anonymity

- Privilege Management Infrastructure

- Reliable Computing and Trusted Computing

- Risk evaluation and Management

- Security, Dependability and Autonomic Issues in Ubiquitous Computing

- Security Models and Quantifications

- Self-protection and Intrusion-detection in Security

- Trust Evaluation and Prediction in Service-Oriented Environments

- Trust, Security, Privacy and Confidentiality

- Trusted Computing in virtualized environments

- Trusted P2P, Web Service, SoA, SaaS, EaaS, PaaS, XaaS

- Virus Detections and Anti-virus Techniques/Software



- Algorithms and Computations on Encrypted Data

- Big Data, Frameworks and Systems for Parallel and Distributed Computing

- Database as a Service, Multi-tenancy, Data management and analytics as a service

- Data Science and Scalable Machine Learning

- Elasticity and Scalability for Cloud Data Management Systems

- High Availability and Reliability

- Interoperability between Clouds

- New Protocols, Interfaces and Data Models for Cloud Databases

- Resource and Workload Management in Cloud Databases

- Service Level Agreements and Contracts

- Transactional Models for Cloud Databases, Consistency and Replication

- Virtualization and Cloud databases, Storage Structures and Indexing



- Autonomic Computing Theory, Models, Architectures and Communications

- Cloud Resource provisioning with QoS Guarantees

- Cloud Operation and Resource Management

- Cloud Performance Modeling and Benchmarks

- Datacenter Architecture and Management

- Formal methods and Tools for Cloud computing

- Infrastructures for Social Computing and Networking

- Software Architectures and Design for Trusted Emerging Systems

- Virtualized Computing Infrastructures



- Cloud Business Applications and Case Studies

- Clouds and Social Media, Network and Link Analysis

- Large Scale Cloud Applications, Reality Mining

- Mobile Cloud Services

- New Parallel / Concurrent Programming Models for Cloud Computing

- Pervasive / Ubiquitous Computing in the Cloud

- Reliability, Fault Tolerance, Quality-of-Service

- Service Level Agreements and Performance Measurement

- Service-Oriented Architectures, RESTful Services in Cloud Environments



Important Dates



- Abstract Submission Deadline: June 23, 2015

- Paper Submission Deadline: June 30, 2015

- Acceptance Notification: August 7, 2015

- Camera Ready Due: September 1, 2015

- Author Registration Due: September 1, 2015



Paper Submission




Full paper submissions to Cloud and Trusted Computing 2015 (C&TC 2015) must present original, highly innovative, prospective and forward-looking research in one or more of the themes given above. Full papers must break new ground, present new insight, deliver a significant research contribution and provide validated support for its results and conclusions. Successful submissions typically represent a major advance for the field of cloud computing, referencing and relating the contribution to existing research work, giving a comprehensive, detailed and understandable explanation of a system, study, theory or methodology, and support the findings with a compelling evaluation and/or validation. Each paper must be submitted as a single PDF file in Springer Lecture Notes in Computer Science format (not longer than 18 pages in length). Accepted regular papers will be included in the printed conference main proceedings and presented in the paper sessions.

Submissions to C&TC 2015 must not be under review by any other conference or publication at any time during the C&TC review cycle, and must not be previously published or accepted for publication elsewhere.



Notes (not longer than 6 pages in length) must report new results and provide support for the results, as a novel and valuable contribution to the field – just like full papers. Notes are intended for succinct work that is nonetheless in a mature state ready for inclusion in archival proceedings. Notes will be held to the same standard of scientific quality as full papers, albeit for a shorter presentation, and must still state how they fit with respect to related work, and provide a compelling explanation and validation. Notes must be submitted as single PDF file in Springer Lecture Notes in Computer Science format. Accepted notes will be published in the conference main proceedings and will be presented in the paper sessions of the conference.


A selection of the best papers from Cloud and Trusted Computing 2015 will be published in a special issue of The International Journal of Computer Systems Science and Engineering.


Submissions are to be made to the submission web site available at



The paper and notes submission site giving all the relevant submission details is located at: Failure to comply with the formatting instructions for submitted papers or notes will lead to the outright rejection of the paper without review. Failure to commit to presentation at the conference automatically excludes a paper from the proceedings.



Program Chairs



- Claudio Agostino Ardagna, Universita' degli studi di Milano, Italy

- Meiko Jensen, Independent Centre for Privacy Protection Schleswig-Holstein, Germany



Advisory Committee



- Ernesto Damiani, Universita' degli studi di Milano, Italy

- Salim Hariri, The University of Arizona, USA

- Robert Meersman, Vrije Universiteit Brussel, Belgium

- Siani Pearson, HP Labs, UK



Program Committee






Publicity Chair



- Fulvio Frati, Universita' degli Studi di Milano, Italy


More information available at




Om-announce mailing list
SoftCOM Secretary | 23 Feb 16:18 2015

SoftCOM 2015 - First Call for Papers

Split - Bol (Island od Brac), September 16-18, 2015

First Call for Papers

23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2015)

The 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2015) is co-organized by University of Split, FESB and Croatian Communications and Information Society (CCIS). Authors are invited to submit their high-quality papers representing original results in all areas of communications software, services and applications, telecommunications and computer networks. Accepted and presented papers will be published in the conference proceedings. Authors of the selected papers will be invited to submit a revised and extended version of their manuscripts for possible publication in the Journal of Communications Software and Systems (JCOMSS).

Important notice: SoftCOM 2014 papers are available through IEEE Xplore.

Complete manuscript due  June 1, 2015
Notification of acceptance  July 15, 2015
Camera-ready manuscript  Sept. 1, 2015


CfPs avaliable at:

International Steering Committee

General Chair: Sinisa Krajnovic, Ericsson AB, Sweden

Co-Chairs: Dinko Begusic, Nikola Rozic, University of Split, Croatia

Mario De Blasi, University of Lecce, Italy

Roberto Garello, Politecnico di Torino, Italy

Gorazd Kandus, Jozef Stefan Institute, Slovenia

Franco Chiaraluce, University of Ancona, Italy

Yumin Lee, National Taiwan University, Taiwan

Pascal Lorenz, Univ. de Haute Alsace, France

Ignac Lovrek, University of Zagreb, Croatia

Gottfried Luderer, Arizona State University, USA

Antun Caric, HAKOM, Croatia

Algirdas Pakstas, London Metropolitan Univ., UK

Luigi Patrono, University of Salento, Italy

Nikola Pavesic, University of Ljubljana, Slovenia

Dragan Poljak, University of Split, Croatia

Josko Radic, University of Split, Croatia

Vesna Roje, University of Split, Croatia

Joel Rodrigues, Univ. of Beira Interior, Portugal


More information about the Conference including details on the submission process and authors kit is available on the website:


Conference Secretary: Petar Solic, University of Split, Croatia (


JCOMSS is indexed in: Scopus, Inspec, EBSCO

If you would like to be removed from this email contact list, please
reply to this message, including the text of the entire message above
in the body of your email message, and the words 'REMOVE ME'
in the subject line. This email should be addressed to:

Om-announce mailing list
CSS 2015 | 24 Feb 02:48 2015


//** Our apologies if you receive multiple copies of this CFP **//

CSS 2015 Call For Papers


A large fraction of the population in the world now spends a great deal of time in cyberspace. Cyberspace has become a critical infrastructure that is embedded in almost all other critical infrastructures and enables every movement of human society. It is thus very much in the public interest to have a safe and secure cyberspace. In the past several years, there has been large number of attacks in cyberspace, such as attacks on the Internet, attacks on embedded/real-time computing and control systems, and attacks on dedicated computing facilities. Many research efforts have been made to achieve cyberspace safety and security, such as blocking and limiting the impact of compromise, enabling accountability, promoting deployment of defense systems, and deterring potential attackers and penalizing attackers.


The 7th International Symposium on Cyberspace Safety and Security provides a leading edge forum to foster interaction between researchers and developers with the cyberspace safety and security communities, and to give attendees an opportunity to network with experts in this area. It focusses on Cyberspace Safety and Security, such as uthentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.


Previously CSS has been held in Paris, France (2014), Zhangjiajie, China (2013), Melbourne, Australia (2012), Milan, Italy (2011), Chengdu, China (2009), and Sydney, Australia (2008).



Topics of interest include, but not limited to:


- Access Control and Trust Management

- Active Defense Techniques and Systems

- Attack Containment

- Attack Recovery

- Benchmark, Analysis and Evaluation of Cybersecurity

- Bitcoins Systems

- Digital Rights Management

- Distributed Intrusion Detection/Prevention Systems

- Denial-of-Service Attacks and Countermeasures

- Digital Identity Management and Authentication

- Implementation, Deployment and Management of Cybersecurity

- Intelligent Defense Systems

- Internet and Network Forensics

- Mobile Biometrics

- Risk Assessment in Cybersecurity

- Secure Network Architectures

- Security for Large-scale Systems and Critical Infrastructures

- Security for P2P systems and Grid Systems

- Security for Ad-Hoc and Sensor Networks

- Security in Web Services

- Security in Pervasive and Embedded Systems

- Security Theory and Tools

- Spam Detection and Prevention

- Social and Legal Issues in Cybersecurity

- Software and System Assurance

- Viruses, Worms, and Other Malicious Code



Submission Guidelines


Submitted papers must report novel results and have not been published or submitted to journals or conferences. Papers should be written in English conforming to the IEEE conference proceedings format (8.5" x 11", Two-Column). Papers should be submitted through the paper submission system at the conference website. Full Papers (up to 8 pages, or 12 pages including tables, figures, references and appendixes with the over length charge) and Short Papers (up to 4 pages) are solicited. See Instructions for authors.


Papers will be selected based on their originality, significance, relevance, and clarity of presentation. The accepted papers from this conference will be submitted for publication in IEEE Xplore as well as other Abstracting and Indexing (A&I) databases (EI Compendex). Distinguished papers, after further revisions, will be considered for possible publication in several SCI & EI indexed special issues of prestigious international journals. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper.



Conference Chairs


General Chair

Prof. Meikang Qiu, Pace University, USA


General Co-Chairs

Sun-Yuan Kung, Princeton University, USA

Jack Dongarra, University of Tennessee, Knoxville, USA


Program Chairs

Fengling Han, Royal Melbourne Institute of Technology University, Australia

Stefano Zanero, Politecnico di Milano University, Italy


Important Dates

Paper submission: 3 April 2015

Notification of acceptance: 15 June 2015

Camera ready due: 15 July 2015

Conference: 24-26 August 2015

Om-announce mailing list
Giovanni Livraga | 23 Feb 22:43 2015

Call for Papers - 3rd IEEE Conference on Communications and Network Security (CNS 2015)

3rd IEEE Conference on Communications and Network Security 
Florence, Italy -- September 28-30, 2015

IEEE Conference on Communications and Network Security (CNS) is a new conference series in
IEEE Communications Society (ComSoc) core conference portfolio and the only ComSoc
conference focusing solely on cyber security. IEEE CNS is also a spin-off of IEEE INFOCOM,
the premier ComSoc conference on networking. The goal of CNS is to provide an outstanding
forum for cyber security researchers, practitioners, policy makers, and users to exchange
ideas, techniques and tools, raise awareness, and share experience related to all
practical and theoretical aspects of communications and network security.

Building on the success of the past two years’ conferences, IEEE CNS 2015 seeks original
high-quality technical papers from academia, government, and industry. Topics of interest
encompass all practical and theoretical aspects of communications and network security,
all the way from the physical layer to the various network layers to the variety of
applications reliant on a secure communication substrate. Submissions with main
contribution in other areas, such as information security, software security, system
security, or applied cryptography, will also be considered if a clear connection to secure
communications/networking is demonstrated.

Particular topics of interest include, but are not limited to:

* Anonymization and privacy in communication systems
* Biometric authentication and identity management
* Computer and network forensics
* Data and application security
* Data protection and integrity
* Availability of communications, survivability of networks in the presence of attacks
* Key management and PKI for networks
* Information-theoretic security
* Intrusion detection and prevention
* Location privacy
* Mobile security
* Outsourcing of network and data communication services
* Physical layer security methods, cross-layer methods for enhancing security
* Secure routing, network management
* Security for critical infrastructures
* Security metrics and performance evaluation
* Security and privacy for big data
* Security and privacy in body area networks
* Security and privacy in content delivery network
* Security and privacy in cloud computing and federated cloud
* Security and privacy in crowdsourcing
* Security and privacy in the Internet of Things
* Security and privacy in multihop wireless networks: ad hoc, mesh, sensor, vehicular and RFID networks
* Security and privacy in peer-to-peer networks and overlay networks
* Security and privacy in single-hop wireless networks: Wi-Fi, Wi-Max
* Security and privacy in smart grid, cognitive radio networks, and disruption/delay tolerant networks
* Security and privacy in social networks
* Security and privacy in pervasive and ubiquitous computing
* Social, economic and policy issues of trust, security and privacy
* Traffic analysis
* Usable security for networked computer systems
* Vulnerability, exploitation tools, malware, botnet, DDoS attacks
* Web, e-commerce, m-commerce, and e-mail security

Please Note: To be published in the IEEE CNS 2015 Conference Proceedings and to be
eligible for publication in IEEE Xplore, an author of an accepted paper is required to
register for the conference at the full (member or non-member) rate and the paper must be
presented by an author of that paper at the conference unless the TPC Chair grants
permission for a substitute presenter arranged in advance of the event and who is
qualified both to present and answer questions.  Non-refundable registration fees must be
paid prior to uploading the final IEEE formatted, publication-ready version of the paper.
For authors with multiple accepted papers, one full registration is valid for up to 3
papers. Accepted and presented papers will be published in the IEEE CNS 2015 Conference
Proceedings and submitted to IEEE Xplore as well as other Abstracting and Indexing (A&I)

Paper submission: 24 April 2015
Notification date: 29 June 2015
Final paper: 17 July 2015

Sabrina De Capitani di Vimercati, Universita' degli Studi di Milano, Italy
David Du, University of Minnesota, USA

Guevara Noubir, Northeastern University, USA
Pierangela Samarati, Universita' degli Studi di Milano, Italy

Yan Chen, Northwestern University
Yingying Chen, Stevens Institute of Technology
Sara Foresti, Università degli Studi di Milano
Javier Lopez-Munoz, University of Malaga
Panagiotis Papadimitratos, KTH
Tilman Wolf, University of Massachusetts Amherst
Guoliang Xue, Arizona State University
Moti Yung, Google
Yanchao Zhang, Arizona State University
Sencun Zhu, The Pennsylvania State University

PROGRAM COMMITTEE (to be completed)
Gail-Joon Ahn, Arizona State University
Ehab Al-Shaer, University of North Carolina Charlotte
Basel Alomair, King Abdulaziz City for Science and Technology
Elli Androulaki, IBM
Giuseppe Ateniese, Sapienza-University of Rome
Raheem Beyah, Georgia Institute of Technology
Giuseppe Bianchi, University of Rome "Tor Vergata"
Erik-Oliver Blass, Northeastern University
Kai Bu, Zhejiang University
Guohong Cao, The Pennsylvania State University
Yinzhi Cao, Columbia University
Hao Chen, UC Davis
Songqing Chen, George Mason University
Xiaofeng Chen, Xidian University
Sherman S. M. Chow, Chinese University of Hong Kong
Mauro Conti, University of Padua
Sajal Das, Missouri University of Science and Technology
Sabrina De Capitani di Vimercati, Università di Milano
Roberto Di Pietro, Bell Labs
Yingfei Dong, University of Hawaii
Faramarz Fekri, Georgia Institute of Technology
Xinwen Fu, University of Massachusetts Lowell
Guang Gong, University of Waterloo
Guofei Gu, Texas A&M University
Thomas Halford, TrellisWare Technologies, Inc.
Nicholas Hopper, University of Minnesota
Marwan Krunz, University of Arizona
Albert Levi, Sabanci University
Ming Li, Utah State University
Qun Li, College of William and Mary
Zhichun Li, NEC Labs America
Peng Liu, Pennsylvania State University
Yunhao Liu,  Tsinghua University
Wenjing Lou, Virginia Tech
Ashraf Matrawy, Carleton University
Wojciech Mazurczyk, Warsaw University of Technology
Patrick McDaniel, Pennsylvania State University
Tommaso Melodia, Northeastern University
Aikaterini Mitrokotsa, Chalmers University of Technology
Aziz Mohaisen, Verisign Labs
Refik Molva, Eurecom
Amit Pande, University of California Davis
Jung-Min (Jerry) Park, Virginia Tech
Neal Patwari, University of Utah
Radia Perlman, EMC
Christina Poepper, Ruhr-University Bochum
Kui Ren, State University of New York at Buffalo
Walid Saad, Virginia Tech
Zhijie Shi, University of Connecticut
Dong-Hoon Shin, Arizona State University
Mukesh Singhal, University of California at Merced
Aaron Striegel, University of Notre Dame
Thorsten Strufe, TU Dresden
Neeraj Suri, Technische Universitaet Darmstadt
Patrick Tague, Carnegie Mellon University
Chiu Tan, Temple University
Bishal Thapa, Raytheon BBN Technology
Ari Trachtenberg, Boston University
Wade Trappe, WINLAB, Rutgers University
A. Selcuk Uluagac, FIU
Jaideep Vaidya, Rutgers, The State University of New Jersey
Cliff Wang, Army Research Office
Cong Wang, City University of Hong Kong
Tao Wei, FireEye Inc.
Wenyuan Xu, University of South Carolina
Dong Xuan, The Ohio State University
Shanchieh Yang, Rochester Institute of Technology
Danfeng Yao, Virginia Tech
Vinod Yegneswaran, SRI International
Adam Young, Cryptovirology Labs
Meng Yu, Virginia Commonwealth University
Kai Zeng, George Mason University
Rui Zhang, University of Hawaii
Jianying Zhou, Institute for Infocomm Research

This call for papers and additional information about the conference
can be found at
Ruggero Donida Labati | 23 Feb 15:28 2015

Deadline extended - International Conference on Mobile, Secure and Programmable Networking (MSPN'2015)


*** Deadline extended to March 20, 2015 ***

International Conference on Mobile, Secure and Programmable Networking (MSPN'2015)

Paris, France, June 15-17, 2015


The rapid deployment of new infrastructures based on network virtualization and Cloud computing triggers
new applications and services that in turn generate new constraints such as security and/or mobility. The
International Conference on Mobile, Secure and Programmable Networking aims at providing a top forum
for researchers and practitioners to present and discuss new trends in networking infrastructures, security,
services and applications while focusing on virtualization and Cloud computing for networks, network
programming, Software Defined Networks (SDN) and their security. Position papers are also welcome and
should be clearly marked as such.

Authors are invited to submit complete unpublished papers, which are not under review in any other
conference or journal, including, but not limited to, the following topic areas:

-    Software Defined Networks (tools, software, concepts)
-    Virtualization and Cloud computing
-    Networks and Cloud computing
-    Mobile computing and Mobile Cloud computing
-    Security, Privacy and Trust in Networks, Services and Applications
-    Green computing and networking
-    Ubiquitous Computing and Sensor Networks
-    System design and testbeds
-    Cross-Layer Design and Optimization
-    Quality of service
-    Modeling and performance evaluation
-    4G and 5G networks
-    Social networks
-    Cooperative networking and Self-Organizing networks
-    Distributed sensing, actuation, and control in cyber-physical systems
-    Internet of Things
-    Vehicular networks and Connected Car
-    Crowdsourcing
-    Datacenter networking
-    Location-based Services
-    Web-services and SOA


-    Paper submission: March 20, 2015 [extended]
-    Notification of acceptance: April 13, 2015
-    Final manuscripts due: April 27, 2015
-    Conference: June 15-17, 2015


Submissions must not be published or submitted to a journal and/or conference/workshop with
proceedings. Each submission should be at most 16 pages with the Springer is LNCS format. All submissions
should be anonymous (i.e., no author names/affiliations and obvious citations). Submissions are to be
made to the submission web site:

Only pdf files are accepted. Submissions not meeting the above guidelines will be rejected without other
consideration. The camera-ready version of accepted papers will have to follow the Springer guidelines for
publication in the Lecture Notes in Computer Science series. The proceedings will be available at the


Program Committee Chairs
Selma Boumerdassi, INRIA, France
Eric Renault, Institut Mines-Télécom -- Télécom SudParis, France
Samia Bouzefrane, CNAM, France

Steering Committee
Abdella Battou, NIST, USA
Pierre Paradinas, CNAM, France
Omar Charkaoui, UQAM, Canada
Damien Sauveron, University of Limoges, France

Publicity Chair
Ruggero Donida Labati, Universita' degli Studi di Milano, Italy

Technical Program Committee
Claudio A. Ardagna, Universita' degli Studi di Milano, Italy
Ioannis Askoxylakis, FORTH-ICS, Greece
Chakib BEKARA, University of Tlemcen, Algeria
André-Luc Beylot, ENSEEIHT, France
Weiwei Chen, Google Inc., USA
Mauro Conti, University of Padua, Italy
Mehammed Daoui, University Mouloud Mammeri of Tizi-Ouzou, Algeria
Yuhui Deng, Jinan University, China
Wassim Drira, Qatar Mobility Innovations Center, Qatar
José María de Fuentes, Carlos III University of Madrid, Spain
Viet Hai HA, Hue University, Vietnam
M-Tahar Kechadi, University College Dublin, Ireland
Karim Khireddine, Université de Béjaia, Algeria
Andrea Lanzi, University of Milan, Italy
Sjouke Mauw, University of Luxembourg, Luxembourg
Alessio Merlo, University of Genova, Italy
Ruben Milocco, Universidad Nacional del Comahue, Argentina
Pascale Minet, Inria, France
Paul Muhlethaler, Inria, France
Henrich C. Pöhls, Institute of IT Security and Security Law at the University of Passau, Germany
Christina Pöpper, Ruhr-University Bochum, Germany
Laurent Roullet, Alcatel Lucent Bell Labs Villarceaux
Shiju Sathyadevan, Amrita University, Kerala, India
Ahmed Soua, NIST, USA
Xuan-Tu Tran, Vietnam National University, Vietnam
Chao Wang, Arizona State University, USA
Qian Wang, Wuhan University, China
Muhammad Younas, Oxford Brookes University, UK
Stefano Zanero, Politecnico di Milano, Italy
Weishan Zhang, University of Petroleum, China
Rong Zheng, MacMaster University, Canada


Questa e-mail è stata controllata per individuare virus con Avast antivirus.
Geoff Sutcliffe | 23 Feb 14:08 2015

LPAR-20 Call for Workshops

                 The 20th International Conference on 
     Logic for Programming, Artificial Intelligence and Reasoning 

             University of the South Pacific, Suva, Fiji

                          CALL FOR WORKSHOPS

LPAR-20 workshops will be held either as one-day or half-day events. If you
would like to propose a workshop for LPAR-20, please contact the workshop
chair via email (Peter.Baumgartner@...), by the proposal deadline.

To help planning, workshop proposals should contain the following data:

- Name of the workshop.
- Brief description of the workshop, including workshop topics.
- Valid web address of the workshop.
- Contact information of the workshop organizers.
- An estimate of the audience size.
- Proposed format of the workshop (for example, regular talks, tool demos,
  poster presentations, etc.).
- Duration of the workshop (one-day or half-day).
- Potential invited speakers (if any).
- Procedures for selecting papers and participants.
- Special technical or AV needs.

Important dates
Workshop proposals submission deadline:     May 15, 2015
Notification of acceptance:                June  1, 2015
Workshops:                             November 23, 2015
AIM@EPIA-2015 | 19 Feb 10:15 2015

[EPIA-2015]: Artificial Intelligence in Medicine - 2nd Call For Papers (with updates) | Deadline for paper submission: March 9, 2015

** Apologies for cross-posting **


CFP: Artificial Intelligence in Medicine (AIM <at> EPIA-2015)
Thematic track of the 17th Portuguese Conference on Artificial Intelligence (EPIA 2015
Coimbra, Portugal, September 8-11, 2015.


Deadline for paper submission: March 9, 2015

Notification of paper acceptance: 27, April, 2015

Camera-ready papers due: 1, June, 2015

Conference dates: September 8-11, 2015


- LNAI Proceedings (springer)
- Special issue of the journal Artificial Intelligence and Medicine with selected papers*


Every day medicine is facing new challenges: new diseases, cost reductions, new therapeutics, quick decisions and make more with less. Artificial Intelligence (AI) can play an important role in the decision making process, most concretely in the way  the data of the patients are collected, treated, processed and presented as well to test and simulate new treatments, scenarios and devices. The big question to be answered is: How Artificial Intelligence can help to overcome these challenges and provide new and efficient solutions to medicine?

Business Intelligence, Data Mining, Sensing, Pervasiveness, Ubiquity and Intelligent Agents in Medicine, can contribute with new artifacts and new knowledge for health professionals. The development of AI systems has been one of the most ambitious and, not surprisingly, controversial themes in medicine. Often, healthcare professionals are septic regarding the use of these technologies, because they are afraid of losing their jobs. However, this concern is not justified. AI no longer aims the substitution of professionals by computer artefacts. AI aims to improve the usability of programs for assisting physicians in figuring out what is wrong with the patients and provide new solutions to help making better decisions. AI systems are intended to support healthcare practitioners in the normal course of their duties, assisting with tasks that rely on the manipulation of data and knowledge. In particular, these systems have for example the capacity to learn, leading to the discovery of new phenomena and the creation of medical knowledge.

This track promotes a forum to discuss and present emergent themes, new projects and ideas about how AI can contribute to the field of Medicine and, most concretely, improve patient conditions. By bringing together researchers from two distinct areas is expected to produce new scientific and technical knowledge in a particular area as is medicine.

Information technology, in general, can help improving human health and longevity. To achieve this goal innovative and intelligent software can be deployed in order to improve medical research, disease prevention, and healthcare service delivery.

The motto of this track is "artificial intelligence improves medicine" and we are inviting the community to share this vision.


Innovative and exciting works are welcome in areas including but not limited to:


Medical methodologies, architectures, environments and systems.

                     Agents for information retrieval;

                     AI in Medical Education and Clinical Management;

                     Wellbeing and lifestyle support;

                     Interoperability, Security, Pervasiveness, Ubiquity and Cloud Computing in Medicine;

                     Methodological, philosophical, ethical, and social issues of AI in Medicine;

                     Pervasive Healthcare Environments;

                     Software architectures.

Knowledge engineering and Decision Support Systems:

                     AI-based clinical decision making and Clinical Decision Support Systems;

                     Automated reasoning, Case-Based Reasoning or Reasoning with medical knowledge;

                     Business Intelligence in Health Care;

                     Clinical Data Mining;

                     Data Streaming;

                     Diagnostic assistance;

                     Expert, agent-based or knowledge-based systems;

                     Medical knowledge engineering;

                     Pervasive or Real-Time Intelligent Decision Support Systems in Critical Health Care.

Medical Applications and Devices

                     Computational intelligence in bio- and clinical medicine;

                     Electronic Health Records (eHealth);

                     Image recognition and interpretation;

                     Intelligent devices and instruments;

                     Sensor-based applications;

                     Telemedicine and mHealth solutions;

                     Ubiquitous devices in the storage, update, and transmission of patient data;

                     Usability and acceptability.

AI in Healthcare Information Systems

                     Autonomous systems to support independent living;

                     Healthcare System Based on Cloud Computing;

                     Intelligent Healthcare information systems;

                     Pervasive Information Systems;

                     Pervasiveness and Security in Clinical Systems;

                     Smart homes, hospitals and Intelligent Systems;

                     Simulation Computer systems.


All papers should be submitted in PDF format through EPIA’2015 submission Website. Submissions must be original and can be of two types: regular (full-length) papers should not exceed twelve (12) pages in length, whereas short papers should not exceed six (6) pages. Each submission will be peer reviewed by at least three members of the Program Committee. The reviewing process is double blind. All the accepted papers will appear in the proceedings published by Springer in the LNAI series (previous EPIA proceedings were indexed by the Thomson ISI Web of Knowledge, Scopus, DBLP and ACM digital library).

*Authors of the best papers presented at the AIM track of EPIA will be invited to submit extended versions of their manuscripts for a special issue of the “Artificial Intelligence in Medicine”, indexed at ISI Web of Knowledge (ISI impact factor JCR2013 of 1.356): Artificial Intelligence and Medicine publishes original articles from a wide variety of interdisciplinary perspectives concerning the theory and practice of artificial intelligence (AI) in medicine and health care.


* Manuel Filipe Santos, University of Minho, Portugal (contact person)
* Carlos Filipe Portela, University of Minho, Portugal

Om-announce mailing list
Md Zakirul Alam Bhuiyan | 20 Feb 03:42 2015

CFPs for 21st IEEE PRDC 2015 at Zhangjiajie, China

Call for Papers for the 21st IEEE Pacific Rim International Symposium on 
Dependable Computing (PRDC 2015)

Hosted by:
Trusted Computing Institute, Central South University, China

Sponsored by:
IEEE Computer Society, TC on Dependable Computing and Fault Tolerance (TCFT)

In Cooperation with:
IFIP WG 10.4 on Dependable Computing and Fault Tolerance
National Natural Science Foundation of China (NSFC)

Venue & Dates:
Zhangjiajie, China, November 18-20, 2015

Conference Website:

Co-Located Conference:
The 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015)


IEEE PRDC 2015 is the twenty-first event in the series of symposia started in 1989 that are devoted to dependable and fault-tolerant computing. PRDC is recognized as the main event in the Pacific area that covers many dimensions of dependability and fault tolerance, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems. As applications of computing systems have permeated into all aspects of daily life, the dependability of computing systems has become increasingly critical. This symposium provides a forum for countries around the Pacific Rim and other areas of the world to exchange ideas for improving the dependability of computing systems. 

Topics of interest include (but not limited to):

(1) Software and hardware reliability, testing, verification, and validation
(2) Dependability measurement, modeling, evaluation, and tools
(3) Self-healing, self-protecting, and fault-tolerant systems
(4) Software aging and rejuvenation
(5) Safety-critical systems and software
(6) Architecture and system design for dependability
(7) Fault-tolerant algorithms and protocols
(8) Reliability in cloud computing, Internet, and web systems and applications
(9) Cloud and Internet Information security
(10) Dependability issues in computer networks and communications
(11) Dependability issues in distributed and parallel systems
(12) Dependability issues in real-time systems, database, and transaction processing systems
(13) Dependability issues in autonomic computing
(14) Dependability issues in aerospace and embedded systems
(15) Dependability issues in cyber-physical systems
(16) Dependability issues in socio-technical systems 

Submission and Publication Information

Manuscripts should be submitted in the following categories: Regular Papers and Practical Experience Reports. Regular Papers should describe original research (not submitted or published elsewhere) and be not more than 10 pages using IEEE format guidelines or 20 pages double-spaced ( Practical Experience Reports (max 6 pages using IEEE format guidelines or 12 pages double-spaced) should describe an experience or a case study, such as the design and deployment of a system or actual failure and recovery field data. The title page should include a 150-word abstract, five keywords, authors' names and affiliations, and a line specifying whether the submission is a Regular Paper or a Practical Experience Report. The full mailing address, phone, fax, and email address of the corresponding author should be specified.

All submissions must be made electronically (in PDF format) on the submission web site ( Papers will be reviewed internationally and selected based on their originality, significance, relevance, and clarity of presentation. All accepted papers will be published by IEEE Computer Society Press. One outstanding paper will be selected to receive the Best Paper Award. Distinguished papers, after further revisions, will be published in several SCI & EI indexed special issues (Pending).

Important Dates
(1)  Paper Submission Deadline:  May 15, 2015
(2)  Author Notification:        July 15, 2015
(3)  Camera-ready Papers Due:    September 15, 2015
(4)  Conference Dates:           November 18-20, 2015

General Co-Chairs
Guojun Wang, Central South University, China
Sy-Yen Kuo, National Taiwan University, Taiwan

Program Co-Chairs
Dong Xiang, Tsinghua University, China
Tatsuhiro Tsuchiya, Osaka University, Japan 

Fast Abstract Chair
Masayuki Arai, Nihon University, Japan

Industrial Track Chair
Peter Mueller, IBM Zurich Research, Switzerland

Poster Chair
Xiangjian (Sean) He, University of Technology, Sydney, Australia 

Program Committee
Please check the conference website for detail.

Steering Committee
Takashi Nanya, Canon, Japan (Chair)
Bella Bose, Oregon State University, USA
Gernot Heiser, University of New South Wales, Australia
Kazuhiko Iwasaki, Tokyo Metropolitan University, Japan
Sy-Yen Kuo, National Taiwan Univ., Taiwan
Michael R. Lyu, Chinese University of Hong Kong, Hong Kong
Subhasish Mitra, Stanford University, USA
Alex Orailoglu, UCSD, USA
Min Xie, National University of Singapore, Singapore
Shiyi Xu, Shanghai University, China
Hee-Yong Youn, Sungkyunkwan University, Korea

Publicity Co-Chairs
Scott Fowler, Linkoping University, Sweden
Md. Zakirul Alam Bhuiyan, Central South University, China
Hiroshi Yamada, Tokyo University of Agriculture and Technology, Japan
Kuan-Ching Li, Providence University, Taiwan

Publication Co-Chairs:
Jin Zheng, Central South University, China
Wenjun Jiang, Hunan University, China

Finance Co-Chairs:
Pin Liu, Central South University, China
Wang Yang, Central South University, China

Local Arrangement Co-Chairs:
Fang Qi, Central South University, China
Qin Liu, Hunan University, China

Zhe Tang, Central South University, China
Yinglong Dai, Central South University, China

Yuxin Ye, Central South University, China

Please email inquiries concerning IEEE PRDC 2015 to:
Prof. Guojun Wang (csgjwang AT gmail DOT com) and the conference organizers (PRDC2015 AT gmail DOT com).

Copyright <at> Trusted Computing Institute, CSU

At the rear of this Call for Papers, we are also soliciting Call for Fast Abstracts,
Call for Industry Track Submissions, and Call for Posters for PRDC 2015:
Call for Fast Abstracts
Fast Abstracts are lightly-reviewed 2-page manuscripts in IEEE format describing unpublished, 
in-progress, novel work, opinions or ideas. 
Fast Abstract Deadline: July 22, 2015
Notification of Acceptance for Fast Abstracts: August 15, 2015
Call for Industry Track Submissions
The Industry Track provides a forum for researchers and practitioners to present and debate 
R&D challenges, practical solutions, case studies, and share field reliability data. Industry 
Track submissions should be a maximum of 6 pages using IEEE format guidelines.
Submission Deadline: July 22, 2015
Notification of Acceptance for Industry Track: August 15, 2015
Call for Posters
The Poster Session provides a forum to present and discuss works-in-progress with topics 
related to dependable systems. A poster paper should use the same format as a regular paper 
but with a maximum of 2 pages. 
Submission Deadline: August 20, 2015
Notification of Acceptance for Posters: September 7, 2015
Call for Workshop Papers in conjunction with ICA3PP 2015 (Co-Located with PRDC 2015)
(1) The Sixth International Workshop on Trust, Security and Privacy for Big Data (TrustData 2015)

(2) The Fifth International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2015)

(3) The Third International Workshop on Network Optimization and Performance Evaluation - (NOPE 2015)

(4) The Second International Symposium on Sensor-Cloud Systems (SCS 2015)

(5) The First International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2015)

(6) The 2015 International Workshop on Security and Privacy Protection in Computer and Network Systems (SPPCN 2015)

Om-announce mailing list
Marco Maratea | 20 Feb 16:00 2015

ASPCOMP 2015: First Call for Participation.

[apologies for any cross-posting]


               6th Answer Set Programming Competition 2015
                            (ASPCOMP 2015)

		      Call for Participant Systems

  Aalto University and University of Calabria and University of Genoa

 == Important Dates ==

  * May 1st, 2015: Participant registration opens

  * June 1st, 2015: Systems submission 

  * June 7th, 2015: The competition starts

  * September 27-30th, 2015: Awards are presented at LPNMR 2015


Answer Set Programming is a well-established paradigm of declarative
programming with close relationship to other declarative modelling
paradigms and languages, such as SAT Modulo Theories, Constraint
Handling Rules, FO(.), PDDL, CASC, and many others.

The ASP Competition is a biannual event (other than for the 5th event
held by invitation in 2014 at the Vienna Summer of Logic) for
evaluating declarative knowledge representation systems on hard and
demanding AI problems. The 6th ASP Competition will be run in 2015,
jointly at Aalto University (Finland), University of Calabria (Italy),
and University of Genoa (Italy). The event is affiliated with the
13th International Conference on Logic Programming and Non-Monotonic
Reasoning (LPNMR 2015), where the results will be announced. The event
is the sequel to the ASP Competition series, held at the University of
Potsdam (Germany) in 2007, the University of Leuven (Belgium) in 2009,
the University of Calabria (Italy) in 2011 and the Vienna University
of Technology (Austria) in 2013.

The 6th ASP Competition is now in the Call for Participant Systems

== Call for Participant Systems ==

Participants of the Answer Set Programming Competition will compete on
a selected collection of benchmark problems, taken from a variety of
benchmark problem domains as well as real-world applications. These
include, but are not limited to:

 * Classic and application-oriented graph problems
 * Scheduling, Timetabling, and other resource allocation problems
 * Sequential and Temporal Planning
 * Combinatorial Optimization problems
 * Deductive Database tasks on large data-sets
 * Puzzles and Combinatorics
 * Ontology reasoning
 * Automated Theorem Proving and Model Checking
 * Constraint Programming problems
 * Other AI problems

The competition consists of a System Track (as called in past
competitions), which compares dedicated solvers on ASP benchmarks.
Participants compete with solving systems for the ASP-Core-2 language.

The competition will include sub-tracks not only based on "complexity"
of problems (as in past events), but also considering language
features.  Our aim is to clearly indicate what (combinations of)
techniques work for particular problem features, and also widening the
participation to systems that may not (yet) support the full standard.

We welcome the submission of parallel and portfolio systems exploiting
multiple cores or multiple algorithms for solving the given instances.
These solvers will have dedicated tracks, assuming a sufficient number
of submissions in each track.

== Important Dates ==

  * May 1st, 2015: Participant registration opens

  * June 1st, 2015: System submission deadline

  * June 7th, 2015: The competition starts

  * September 27-30th, 2015: Awards are presented at LPNMR 2015

For further information and submission instructions please contact
us (Martin Gebser, Marco Maratea, and Francesco Ricca) by email:

Luca Pulina | 19 Feb 09:40 2015

RR 2015 -- 2nd CALL FOR PAPERS

[apologies for any cross-posting] ****************************************************************** 2nd CALL FOR PAPERS The 9th International Conference on Web Reasoning and Rule Systems (RR 2015) Berlin, Germany, August 4-6, 2015 ****************************************************************** The International Conference on Web Reasoning and Rule Systems (RR) is a major forum for discussion and dissemination of new results concerning Web Reasoning and Rule Systems. RR 2015 is colocated with the following events: - 11th Reasoning Web Summer School (RW 2015) Berlin, Germany, July 31 - August 4, 2015. - The 25th International Conference on Automated Deduction (CADE 2015). Berlin, Germany, August 1 - August 7, 2015. - The 9th International Web Rule Symposium (RuleML 2015). Berlin, Germany, August 3-5, 2015 RR 2015 also hosts a doctoral consortium, which will provide PhD students with an opportunity to present and discuss their research directions, to be involved in discussions on the state-of-the-art research, and to establish fruitful collaborations. In particular, the doctoral consortium will include a mentoring lunch and a poster session, organized jointly with the 9th International Web Rule Symposium (RuleML 2015). Further details on the RR doctoral consortium will be communicated by means of a separate Call for Papers, as well as on the RR 2015 website. == TOPICS AND SUBMISSION INSTRUCTIONS == The scale and the heterogenous nature of web data poses many challenges, and turns basic tasks such as query answering and data transformations into complex reasoning problems. Rule-based systems have found many applications in this area. The RR conference welcomes original research from all areas of Web Reasoning and Rule Systems. Topics of particular interest are: - Rule-based languages for intelligent information access and for the semantic web - Ontology-based data access - Data management, and data interoperability for web data - Distributed agent-based systems for the web - Scalability and expressive power of logics for the semantic web - Reasoning with incomplete, inconsistenct and uncertain data - Non-monotonic, commonsense, and closed-world reasoning for web data - Constraint programming, inductive logic programming for web data - Streaming data and complex event processing - Rule-based approaches to machine learning, knowledge extraction and information retrieval - Rule-based approaches to natural language processing - System descriptions, applications and experiences There are two submission formats: - Full papers (up to 15 pages in LNCS style) - Technical Communications (up to 6 pages in LNCS style) Submitted full papers should present original and significant research results. They must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with formal proceedings. Double submission to a workshop with informal proceedings is allowed, like for instance the DL 2014 workshop. Technical communications are intended for promising but possibly preliminary work, position papers, system descriptions, and applications descriptions (which may be accompanied by a demo). The conference proceedings will be published by Springer in the Lecture Notes in Computer Science series (LNCS), and all submissions must be prepared in Springer's LaTeX style llncs ( Submissions are now open via EasyChair: == IMPORTANT DATES == - Title and Abstract submission: March 3, 2015 - Full papers submission: March 10, 2015 - Notification of acceptance: April 15, 2015 - Camera-ready submission: May 15, 2015 For each of these deadlines, a cut-off point of 23:59 AOE (anywhere on earth) applies. == BEST PAPER AND BEST STUDENT PAPER AWARDS == Awards for Best Paper and Best Student Paper will be presented to the corresponding author(s) at the conference. The best student paper will be selected among the ones mainly only by students (i.e., authors a PhD as of the paper submission deadline). To qualify for the Best Student Paper award, the authors must indicate their eligibility upon submission at easychair. The program committee reserves the right to not give out a Best Student Paper award, or to split the award among multiple submissions. == INVITED SPEAKERS == - Michael Genesereth (Stanford University) - Benny Kimelfeld (Technion & LogicBlox) - Lora Aroyo (Free University of Amsterdam) == ORGANIZATION == General Chair: - Wolfgang Faber (University of Huddersfield) Doctoral Consortium Chair: - Marco Montali (Free Universiy of Bozen-Bolzano) Local Organization Chair: - Adrian Paschke (Free University of Berlin) Sponsorship Chair: - Marco Maratea (University of Genova) Publicity Chair: - Luca Pulina (University of Sassari) Web Chair: - Ralph Schaefermeier (Free University of Berlin) Program Committee: - Balder ten Cate (LogicBlox, USA) - co-chair - Alessandra Mileo (DERI, Ireland) - co-chair - Darko Anicic (Siemens AG, Germany) - Marcelo Arenas (Pontificia Universidad Catolica de Chile, Chile) - Marcello Balduccini (Drexel University, USA) - Leopoldo Bertossi (Carleton University, Canada) - Meghyn Bienvenu (Universite Paris Sud, France) - Fernando Bobillo (University of Zaragoza, Spain) - Daniel Deutsch (Tel Aviv, Israel) - Agostino Dovier (Università degli Studi di Udine, Italy) - Thomas Eiter (TU Vienna, Austria) - Sergio Flesca (University of Calabria, Italy) - Paul Fodor (Stony Brook University, USA) - Andres Freitas (INSIGHT NUI Galway, Ireland) - Andre Hernich (Liverpool, UK) - Stijn Heymans (SRI, USA) - Aidan Hogan (National University of Ireland, Galway, Ireland) - Benny Kimelfeld (Technion, Israel & LogicBlox, Inc) - Roman Kontchakov (Birkbeck College, UK) - Markus Krötzsch (University of Oxford, UK) - Georg Lausen (Universitaet Freiburg, Germany) - Joohyung Lee (Arizona State University, USA) - Domenico Lembo (Sapienza Universita di Roma, Italy) - Carsten Lutz (Universität Bremen, Germany) - Thomas Meyer (CSIR Meraka Institute, South Africa) - Boris Motik (Oxford University, UK) - Marco Montali (Free University of Bozen-Bolzano, Italy) - Marie-Laure Mugnier (LIRMM/INRIA, Montpellier, France) - Matthias Nickels (NUI Galway, Ireland) - Magdalena Ortiz (TU Vienna, Austria) - Giorgio Orsi (University of Oxford, UK) - Jeff Z. Pan (University of Aberdeen) - Adrian Paschke (Freie Universität Berlin, Germany) - Axel Polleres (WU-Vienna, Austria) - Lucian Popa (IBM Almaden, USA) - Francesco Ricca (University of Calabria, Italy) - Riccardo Rosati (Sapienza Universita di Roma, Italy) - Sebastian Rudolph (TU Dresden, Germany) - Luciano Serafini (FBK Trento, Italy) - Evgeny Sherkhonov (University of Amsterdam, Netherlands) - Steffen Staab (University of Koblenz-Landau, Germany) - Umberto Straccia (ISTI-CNR, Pisa, Italy)
-- Luca Pulina, Ph.D. Assistant Professor of Computer Science POLCOMING - Department of Political Science, Communication, Engineering and Information Technologies University of Sassari e-mail
Om-announce mailing list