rim.abid | 30 Jul 17:50 2015
Picon
Picon

Software Verification and Testing Track, ACM SAC 2016 (Pisa, Italy) - Second CFP

==================================================
31st Annual ACM Symposium on Applied Computing
Software Verification and Testing Track
April 3 - 8, 2016, Pisa, Italy

More information:
http://antares.sip.ucm.es/svt16/ and
http://www.acm.org/conferences/sac/sac2016/
===================================================

Important dates
---------------

* September 11, 2015: Paper submission
* November 13, 2015: Paper notification
* December 11, 2015: Camera-Ready Copies

ACM Symposium on Applied Computing
----------------------------------

The ACM Symposium on Applied Computing (SAC) has gathered scientists
from different areas of computing over the thirty years. The forum
represents an opportunity to interact with different communities
sharing an interest in applied computing.

SAC 2016 is sponsored by the ACM Special Interest Group on Applied
Computing (SIGAPP), and will be hosted by the University of Pisa and
Scuola Superiore Sant'Anna University, Italy

Software Verification and Testing Track
(Continue reading)

Marcel Kyas | 24 Jul 17:10 2015
Picon

Integrated Formal Methods iFM 2016, Reykjavik, Iceland: 3rd Call for Workshops

******************************************************************************

12th International Conference on integrated Formal Methods, iFM 2016
http://ifm2016.ru.is

June 1-5, 2016 - Reykjavik, Iceland

******************************************************************************

*** Extended deadline ***

CALL FOR AFFILIATED WORKSHOPS
=============================

Prospective workshop organizers are invited to submit proposals for
workshops to be affiliated to iFM 2016, on topics related to the
conferences main subjects.

Important Dates
---------------
Submission of workshop proposals: by September 21, 2015 (extended)
Notification: by Oktober 5, 2015 (extended)
Workshops: June 4-5, 2016

Submission via e-mail
---------------------
Marcel Kyas <marcel <at> ru.is> - Workshop chair

About iFM
---------
(Continue reading)

sara.foresti | 27 Jul 09:47 2015
Picon

ICISS 2015 - Deadline extended (August 10, 2015)

** Deadline extended: 10 August 2015!! **

=========================================================================
11th International Conference on Information Systems Security (ICISS 2015)
16 - 20 December, 2015 
Kolkata, India
URL: http://www.iciss.org.in
=========================================================================

CALL FOR PAPERS

The conference series ICISS (International Conference on Information
Systems Security), held annually, provides a forum for disseminating
latest research results in information and systems security.
ICISS 2015, the eleventh conference in this series, will be held
under the aegis of the Society for Research in Information
Security and Privacy (SRISP). The acceptance ratio of the first
ten conferences has averaged less than 30%. Like previous years,
proceedings of the conference will be published as part of the
Springer Verlag series of Lecture Notes in Computer Science.
Submissions are encouraged from academia, industry and government,
addressing theoretical and practical problems in information
and systems security and related areas.

Topics of interest include but are not limited to:

Access and Usage Control
Application Security
Authentication and Audit
Biometric Security
(Continue reading)

Michael Winter | 23 Jul 16:04 2015
Picon

CALL FOR PARTICIPATION (RAMiCS 2015)

                 
                      CALL FOR PARTICIPATION

                 15th International Conference on
   Relational and Algebraic Methods in Computer Science (RAMiCS 2015)

           28 September to 1 October 2015, Braga, Portugal
                 URL:  http://ramics2015.di.uminho.pt

The RAMiCS Conference is the main forum for Relational and Algebraic Methods
in Computer Science. Special focus lies on formal methods for software
engineering, logics of programs and links with neighbouring disciplines.

============================================================

Registration, venue, travel information and accommodation
---------------------------------------------------------
    Please visit http://ramics2015.di.uminho.pt

Registration deadline
---------------------
    4 September 2015

============================================================

Invited Talks
-------------

Towards a Probabilistic Interpretation of Game Logic
    Ernst-Erich Doberkat
(Continue reading)

Yiyu Shi | 23 Jul 14:50 2015
Picon

Call for Participat​ion - ACM Student Research Competition​ at ICCAD 2015

[Apologies if you receive multiple copies of this email]

 

ACM Student Research Competition at ICCAD 2015 (SRC <at> ICCAD'15)


DEADLINE: August 21, 2015 


Online Submission: https://www.easychair.org/conferences/?conf=srciccad15

 


Sponsored by Microsoft Research, the ACM Student Research Competition is an internationally recognized venue enabling undergraduate and graduate students who are ACM members to:

       Experience the research world -- for many undergraduates this is a first!

       Share research results and exchange ideas with other students, judges, and conference attendees

       Rub shoulders with academic and industry luminaries

       Understand the practical applications of their research

       Perfect their communication skills

       Receive prizes and gain recognition from ACM and the greater computing community.


The ACM Special Interest Group on Design Automation (ACM SIGDA) is organizing such an event in conjunction with the International Conference on Computer Aided Design (ICCAD). Authors of accepted submissions will get travel grants from ACM/Microsoft to attend the event at ICCAD. The event consists of several rounds, as described at http://www.acm.org/src/participate.html and http://www.acm.org/src/about.html , where you can also find more details on student eligibility and timeline.
 
The first-place winner in the graduate category at SRC <at> ICCAD'14, Shupeng Sun(Carnegie Mellon University), also won second place in the 2015 ACM SRC Grand Finals: http://src.acm.org.
 



Details on abstract submission:
Research projects from all areas of design automation are encouraged. The author submitting the abstract must still be a student at the time the abstract is due. Each submission should be made on the EasyChair submission site. Please include the author's name, affiliation, postal address, and email address; research advisor's name; ACM student member number; category (undergraduate or graduate); research title; and an extended abstract (maximum 2 pages or 800 words) containing the following sections:

       Problem and Motivation: This section should clearly state the problem being addressed and explain the reasons for seeking a solution to this problem.

       Background and Related Work: This section should describe the specialized (but pertinent) background necessary to appreciate the work. Include references to the literature where appropriate, and briefly explain where your work departs from that done by others. Reference lists do not count towards the limit on the length of the abstract.

       Approach and Uniqueness: This section should describe your approach in attacking the problem and should clearly state how your approach is novel.

       Results and Contributions: This section should clearly show how the results of your work contribute to computer science and should explain the significance of those results. Include a separate paragraph (maximum of 100 words) for possible publication in the conference proceedings that serves as a succinct description of the project.

       Single paper summaries (or just cut & paste versions of published papers) are inappropriate for the ACM SRC. Submissions should include at least one year worth of research contributions, but not subsuming an entire doctoral thesis load.


Note that this event is different than other ACM/SIGDA sponsored or supported events at DAC or ICCAD: YSSP brings together seniors and 1st year graduate students at DAC, UBooth features demos from research groups, DASS allows graduate students to get up to speed on lectures on design automation, while the PhD Forum showcases post-proposal PhD research at DAC and the CADathlon allows graduate students to compete in a programming contest at ICCAD. The ACM Student Research Competition allows both graduate and undergraduate students to discuss their research with student peers, as well as academic and industry researchers, in an informal setting, while enabling them to attend DAC and compete with other ACM SRC winners from other computing areas in the ACM Grand Finals. Travel grant recipients cannot receive travel support from any other ICCAD or ACM/SIGDA sponsored program.
 



Online Submission - EasyChair:
https://www.easychair.org/conferences/?conf=srciccad15
 



Important dates:


Abstract submission deadline:  August 21, 2015


Acceptance notification: September 25, 2015


Poster session at ICCAD: Monday, November 2, 2015


Presentation session at ICCAD: Tuesday, November 3, 2015


Award winners announced at ACM SIGDA Dinner: Tuesday, November 3, 2015


Grand Finals winners honored at ACM Awards Banquet: June 2016
 



Requirement:
Students submitting and presenting their work at SRC <at> ICCAD'15 are required to be members of both ACM and ACM SIGDA.
 



Organizers:


Tsung-Yi Ho (National Tsing Hua University, Taiwan)

Yiyu Shi (University of Notre Dame, United States)


-- 
Yiyu Shi, Ph.D.,
Associate Professor,
Department of Computer Science and Engineering & Department of Electrical Engineering, 

University of Notre Dame, 
384 Fitzpatrick Hall,  
Notre Dame, IN, 46556, 
Phone: 001-574-631-8321   Fax: 001-574-631-9260
Email: yshi4-b3SXGvC/Fnw@public.gmane.org
Website: http://ece.mst.edu/~yshi

_______________________________________________
Om-announce mailing list
Om-announce@...
http://openmath.org/mailman/listinfo/om-announce
jun sun | 23 Jul 09:38 2015
Picon

Call for Participation: ATVA 2015

Call for participation 

13th International Symposium on Automated Technology for Verification and Analysis, ATVA 2015 

October 12-15, 2015, Shanghai, China 

http://atva2015.ios.ac.cn/ 

*** Early registration deadline: August 15, 2015 *** 

ATVA promotes research on theoretical and practical aspects of automated analysis, verification and synthesis by providing a forum for interaction between the regional and the international research communities and industry in the field. The conference will be held at East China Normal University (old campus) in Shanghai. Shanghai is China’s largest economic comprehensive industrial base, and a famous historical and cultural city. 

KEYNOTES and TUTORIALS 
Dino Distefano (Facebook and Queen Mary University of London, UK) 
Martin Fränzle (Carl von Ossietzky Universität, Oldenburg, Germany) 
Joost-Pieter Katoen (RWTH Aachen University, Germany) 
J Strother Moore (University of Texas-Austin, USA) 

ACCOMODATION 
ATVA has arranged special rates at nearby hotels for conference 
participants. If you book early, you may also be able to take 
advantage of special offers available at many other nearby 
hotels in the range of 230-700 CNY per night. 

REGISTRATION 
Registration is open now. The early registration fee is 2500CNY, late is 3000CNY, 
and 3500CNY for author registration. The fee includes registration, 
lunches and coffee breaks on all conference days, the conference 
dinner and the welcome reception (including food). 

Early registration deadline: August 15, 2015 
For details see http://atva2015.ios.ac.cn/participation.html#registration 

ACCEPTED PAPERS 
Steen Vester. On the Complexity of Model-checking Branching and Alternating-time Temporal Logics in One-counter systems 
Noe Hernandez, Kerstin Eder, Evgeni Magid, Jesus Savage and David Rosenblueth. Marimba: A Tool for Verifying Properties of Hidden Markov Models 
Arnd Hartmanns and Holger Hermanns. Explicit Model Checking of Very Large MDP using Partitioning and Secondary Storage 
Chuchu Fan and Sayan Mitra. Bounded Verification with On-the-Fly Discrepancy Computation 
Thomas Ferrere, Oded Maler and Dejan Nickovic. Trace Diagnostics using Temporal Implicants 
Puri Arenas, Elvira Albert and Miguel Gomez-Zamalloa. Test Case Generation of Actor Systems 
Yongjian Li, Jun Pang, Yi Lv, Dongrui Fan, Shen Cao and Kaiqiang Duan. paraVerifier: An Automatic Framework for Proving Parameterized Cache Coherence Protocols 
Chao Wang, Yi Lv and Peng Wu. TSO-to-TSO Linearizability is Undecidable 
Yue Ben and A. Prasad Sistla. Model Checking Failure Prone Open Systems Using Probabilistic Automata 
Ruud Koolen, Tim Willemse and Hans Zantema. Using SMT for Solving Fragments of Parameterised Boolean Equation Systems 
Andrzej Mizera, Jun Pang and Qixia Yuan. ASSA-PBN: An Approximate Steady-state Analyser of Probabilistic Boolean Networks 
Rachel Tzoref-Brill and Shahar Maoz. Lattice-Based Semantics for Combinatorial Model Evolution 
Paul Hunter, Guillermo Perez and Jean-Francois Raskin. Looking at Mean-Payoff through Foggy Windows 
Martin Chapman, Hana Chockler, Pascal Kesseli, Daniel Kroening, Ofer Strichman and Michael Tautschnig. Learning the Language of Error 
Rachel Faran and Orna Kupferman. Spanning the Spectrum from Safety to Liveness 
Liang Zou, Naijun Zhan, Shuling Wang and Martin Fränzle. Formal Verification of Simulink/Stateflow Diagrams 
Ting Gan, Mingshuai Chen, Liyun Dai, Bican Xia and Naijun Zhan. Decidability of the Reachability for a Family of Linear Vector Fields 
Thibaut Girka, David Mentré and Yann Régis-Gianas. A Mechanically Checked Generation of Correlating Programs Directed by Structured Syntactic Differences 
Hernan Ponce-De-Leon, César Rodríguez, Josep Carmona, Keijo Heljanko and Stefan Haar. Unfolding-Based Process Discovery 
Constantin Enea, Mihaela Sighireanu and Zhilin Wu. On Automated Lemma Generation for Separation Logic with Inductive Definitions 
Mohamed Nassim Seghir and David Aspinall. EviCheck: Digital Evidence for Android 
Simon Bliudze, Alessandro Cimatti, Mohamad Jaber, Sergio Mover, Marco Roveri, Wajeb Saab and Wang Qiang. Formal Verification of Infinite-sate BIP models 
Andrzej Murawski, Steven Ramsay and Nikos Tzevelekos. Game Semantic Analysis of Equivalence in IMJ 
Roderick Bloem, Rüdiger Ehlers and Robert Koenighofer. Cooperative Reactive Synthesis 
Habib Saissi, Peter Bokor and Neeraj Suri. PBMC: Symbolic Slicing for the Verification of Concurrent Programs 
Jyotirmoy Deshmukh, Xiaoqing Jin, James Kapinski and Oded Maler. Stochastic Local Search for Falsification of Hybrid Systems 
Martin Schaef and Ashish Tiwari. Severity Levels of Inconsistent Code 
Madhavan Mukund, Gautham Shenoy R and S P Suresh. Effective verification of Replicated Data Types using Later Appearance Records (LAR) 
Vladimir Herdt, Hoang M. Le, Daniel Grosse and Rolf Drechsler. Lazy-CSeq-SP: Boosting Sequentialization-based Verification of Multi-Threaded C Programs via Symbolic Pruning of Redundant Schedules 
Dietmar Berwanger, Anup Basil Mathew and Marie Van Den Bogaard. Hierarchical Information Patterns and Distributed Strategy Synthesis 
Andrzej Murawski, Steven Ramsay and Nikos Tzevelekos. A Contextual Equivalence Checker for IMJ* 
Yuliya Butkova, Hassan Hatefi, Holger Hermanns and Jan Krcal. Optimal Continuous Time Markov Decisions 
Ernst Althaus, Björn Beber, Joschka Kupilas and Christoph Scholl. Improving Interpolants for Linear Arithmetic 



GENERAL CHAIR 
Jifeng He (East China Normal University, China) 

PROGRAMME CHAIRS 
Bernd Finkbeiner (Saarland University, Germany) 
Geguang Pu (East China Normal University, China) 
Lijun Zhang (Institute of Software, Chinese Academy of Sciences) 

WORKSHOP CHAIR 
Jun Sun (Singapore University of Technology and Design, SG) 

PUBLICITY CHAIRS 
David N. Jansen (Radboud Universiteit, Netherlands) 
Huibiao Zhu (East China Normal University, China) 

PROGRAM COMMITTEE 
Alessandro Abate (University of Oxford, UK) 
Erika Ábrahám (RWTH Aachen University, Germany) 
Michael Backes (Saarland University, Germany) 
Christel Baier (Technical University of Dresden, Germany) 
Ahmed Bouajjani (University Paris Diderot, FR) 
Tevfik Bultan (University of California at Santa Barbara, USA) 
Franck Cassez (NICTA, Australia) 
Rance Cleaveland (University of Maryland, USA) 
Hung Dang-Van (UET, Vietnam National University, Vietnam) 
Bernd Finkbeiner (Saarland University, Germany) 
Mark Greenstreet (University of British Columbia, Canada) 
Holger Hermanns (Saarland University, Germany) 
Pao-Ann Hsiung (National Chung Cheng University, Taiwan) 
Alan Hu (University of British Columbia, Canada) 
Michael Huth (Imperial College London, UK) 
Jie-Hong Roland Jiang (National Taiwan University, Taiwan) 
Orna Kupferman (Hebrew University, Israel) 
Kim Guldstrand Larsen (Aalborg University, Denmark) 
Xuandong Li (Nanjing University, China) 
Annabelle McIver (Macquarie University, AU) 
Ken McMillan (Microsoft, USA) 
Madhavan Mukund (Chennai Mathematical Institute, India) 
Flemming Nielson (Technical University of Denmark, Denmark) 
Mizuhito Ogawa (Japan Advanced Institute of Science and Technology) 
Catuscia Palamidessi (INRIA Saclay and LIX, FR) 
Doron Peled (Bar Ilan University, Israel) 
Geguang Pu (East China Normal University, China) 
Jean-François Raskin (Université Libre de Bruxelles, Belgium) 
Kristin Y. Rozier (NASA's Ames Research Center, USA) 
Sven Schewe (Liverpool University, UK) 
Scott Smolka (Stony Brook University, USA) 
Farn Wang (National Taiwan University, Taiwan) 
Bow-Yaw Wang (Academia Sinica, Taiwan) 
Wang Yi (Uppsala University, Sweden) 
Naijun Zhan (Institute of Software, Chinese Academy of Sciences) 
Lijun Zhang (Institute of Software, Chinese Academy of Sciences) 

STEERING COMMITTEE 
E. Allen Emerson (University of Texas-Austin, USA) 
Teruo Higashino (Osaka University, Japan) 
Insup Lee (University of Pennsylvania, USA) 
Doron Peled (Bar Ilan University, Israel) 
Farn Wang (National Taiwan University, Taiwan) 
Hsu-Chun Yen (National Taiwan University, Taiwan)
_______________________________________________
Om-announce mailing list
Om-announce@...
http://openmath.org/mailman/listinfo/om-announce
Shan Lin | 23 Jul 03:34 2015

[Concurrency] Postdoctoral Position

Postdoctoral position in Cyber Physical Systems

Seeking a Postdoc on newly funded NSF CPS grant on Closed-Loop Verification of Medical Devices.  The postdoc will perform research on computational modeling and formal verification of 2-d and 3-d cardiac tissue along with cardiac medical devices, especially for newly developed therapy Low-Energy Anti-fibrillation Protocol (LEAP).  The postdoc should have programming experience with Matlab, Java and C, and be able to write papers, develop models of complex dynamical systems, and apply formal verification techniques to the same.  Finally, the postdoc will be involved in co-advising graduate students woking on the project.  The project is a collaborative effort involving multiple PIs across several universities.  The postdoc will be supervised by Scott Smolka, Professor of Computer Science, and Shan Lin, Assistant Professor of Electrical and Computer Engineering, at Stony Brook University.  

Contact: 

 
Interested candidates should send their CV and a description of their research interests

The positions are open immediately and the initial appointment will be for two years, with a possible extension beyond that. Applications will be accepted until this position is filled. The anticipated/preferred start date for the postdoc position is approximately mid September 2015, so we urge candidates to apply in a timely manner.  
_______________________________________________
Om-announce mailing list
Om-announce@...
http://openmath.org/mailman/listinfo/om-announce
Fulvio Frati | 21 Jul 18:59 2015
Picon

[CFP] 2015 Workshop on Computational Intelligence Techniques for Industrial and Medical Applications (CITIMA2015)

*** CITIMA 2015 ***

[Apologies if you receive multiple copies of this CFP]
****************************************************************************
**********************
2015 Workshop on Computational Intelligence Techniques for Industrial and
Medical Applications

Collocated with: 
SITIS 2015 - The 11th International Conference on SIGNAL IMAGE TECHNOLOGY &
INTERNET BASED SYSTEMS
November 23-27, 2015 - Bangkok, Thailand
http://sitis-conf.org/en/citima-2015.php
****************************************************************************
**********************

Scope of the Workshop
Computational Intelligence techniques are adopted in many industrial
applications, like visual based quality control, image enhancement in
consumer electronics, video based recognition of identity or behaviors,
audio based speech recognition for enhanced human like interaction with
machines etc. It also has a strong impact in medical applications, like
medical image enhancement, semi-automatic detection of pathologies,
pre-filtering and reconstruction of volumes from medical scans etc. Despite
this growing diffusion, there are still many possible areas where
computational intelligence application is partial or could be extended and
improved, due to the actual limitations in terms of computational power or
strict requirements in terms of assurance of the results.
This workshop aims to investigate the impact of the adoption of advanced and
innovative Computational Intelligence techniques in industrial and medical
applications. This edition of the workshop is focused primarily on Imaging
and Multimedia based industrial and medical applications with special
emphasis to real time systems.
The workshop will bring together researchers on different disciplines from
academia and industry with a common objective: go beyond the frontiers of
today industrial applications of Computational Intelligence techniques.

Topics for the workshop include, but are not limited to:
- Imaging for Industrial applications
- Computational Intelligence approaches in Consumer Electronics
- Real-time Multimedia Signal Processing
- Intelligent User Interfaces
- Virtual-augmented reality for Healthcare
- Real-time digital images & watermarking
- Real-time signal compression and analysis
- Spatial and temporal estimation and protection of media streams
- Learning systems for signal and information processing and evidential
reasoning for recognition
- Soft computing approaches for embedded multimedia systems
- Real time signal processing & vision
- Expert system for embedded system
- Color and illumination

Important dates
Submission deadline: September 6, 2015
Acceptance/Reject notification: October 10, 2014
Camera-ready: October 15, 2014
Author Registration: October 19, 2014 

Submission
Each submission should be at most 8 pages in total including bibliography
and well-marked appendices, and must follow the IEEE double columns
publication format available at:
- Microsoft Word DOC
- LaTex Formatting Macros

Paper submission will only be online via Easy Chair.
Only pdf files will be accepted. Submissions not meeting these guidelines
risk rejection without consideration of their merits.
All submitted papers will be carefully evaluated based on originality,
significance, technical soundness, and clarity of expression by at least two
reviewers. The organizers will examine the reviews and make final paper
selections.

Publication
All the papers accepted for the workshop will be included in the conference
proceedings. The proceedings will be published by IEEE Computer Society.
Content will be submitted to the indexing companies for possible indexing.
They will be available at the conference.

Registration
At least one author of each accepted paper must register for the workshop.
Workshop registration fee is determined by SITIS. A single registration for
the workshop or the conference allows attending both events.

Program Co-Chairs
- M. Anisetti, Università degli studi di Milano, Italy
- R. Sassi, Università degli studi di Milano, Italy
- V. Bellandi, Università degli Studi di Milano, Italy
- G. Jeon, Incheon National University, Korea

Program Committee
- Borko Furht, Florida Atlantic University, USA
- Alessandro De Mauro, VicomTech, Spain
- Michele Geronazzo, University of Padova, Italy
- Marco Sacco, National Research Council, Italy
- Fulvio Frati, Università degli Studi di Milano, Italy
- Luigi Arnone, ST-Ericsson, Switzerland
- Chehri Abdellah , of Ottawa, Canada
- Yong Fang, Northwest A&F University, China
- Jiaji Wu, Xidian University, China
- Xiangdong Chen, Nanjing University of Posts and Telecommunications, P.R.
China 
- Wei Wu, Sichuan University, China
- Wang Lei, University of Jinan, China
- Anand Paul, Kyungpook National University, South Korea
- Kitsuchart Pasupa, King Mongkut's Institute of Technology, Thailand

Contact
marco.anisetti@...
roberto.sassi@...

****************
Per destinare il 5x1000 all'Universita' degli Studi di Milano: indicare nella dichiarazione dei redditi
il codice fiscale 80012650158.

http://www.unimi.it/13084.htm?utm_source=firmaMail&utm_medium=email&utm_content=linkFirmaEmail&utm_campaign=5xmille
Fulvio Frati | 21 Jul 18:48 2015
Picon

[CFP] 5th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA2015)

***SIMPDA 2015***

[Apologies if you receive multiple copies of this CFP]
****************************************************************************
**
FIFTH INTERNATIONAL SYMPOSIUM ON DATA-DRIVEN PROCESS DISCOVERY AND ANALYSIS
9-11 DECEMBER, 2015 - VIENNA, AUSTRIA
simpda2015.di.unimi.it
****************************************************************************
**

About SIMPDA
With the increasing automation of business processes, growing amounts of
process data become available. This opens new research opportunities for
business process data analysis, mining and modeling. The aim of the IFIP 2.6
International Symposium on Data-Driven Process Discovery and Analysis is to
offer a forum where researchers from different communities and the industry
can share their insight in this hot new field.
The Symposium will feature a number of keynotes illustrating advanced
approaches, shorter presentations on recent research, a competitive PhD
seminar and selected research and industrial demonstrations. This year the
symposium will be held in Vienna, a city in the UNESCO World Heritage List.

Call for Papers
The IFIP International Symposium on Data-Driven Process Discovery and
Analysis (SIMPDA 2014) offers a unique opportunity to present new approaches
and research results to researchers and practitioners working in business
process data modeling, representation and privacy-aware analysis.
The symposium will bring together leading researchers, engineers and
scientists from around the world. Full papers must not exceed 15 pages.
Short papers are limited to at most 4 pages. All papers must be original
contributions, not previously published or under review for publication
elsewhere. All contributions must be written in English and must follow the
LNCS Springer Verlag format. Templates can be downloaded from:
http://www.springer.de/comp/lncs/authors.html
Accepted papers will be published in a pre-proceeding volume of CEUR
workshop series. The authors of the accepted papers will be invited to
submit extended articles to a post-symposium proceedings volume which will
be published in the LNBIP series (Lecture Notes in Business Information
Processing, http://www.springer.com/series/7911), scheduled for early 2015
(extended papers length will be between 7000 and 9000 words). Around 10-15
papers will be selected for publication after a second round of review.

Topics of interest for submission include, but are not limited to:
- Business Process modeling languages, notations and methods
- Lightweight Process Model
- Data-aware and data-centric approaches
- Process Mining with Big Data
- Variability and configuration of process models
- Process simulation and static analyses
- Process data query languages
- Process data mining
- Privacy-aware process data mining
- Process metadata and semantic reasoning
- Process patterns and standards
- Foundations of business process models
- Resource management in business process execution
- Process tracing and monitoring
- Process change management and evolution
- Business process lifecycle
- Case studies and experience reports
- Social process discovery
- Crowdsourced process definition and discovery

IMPORTANT DATES

Paper Submission: 25 September 2015

Submission of PhD Presentations: 25 September 2015

Notification of Acceptance: 07 November 2015

Submission of Camera Ready Papers:	21 November 2015

Second International Symposium on Process Data: 9-11 December 2015

Post-proceeding submissions:	30 March 2016

Workshop Format:
In accordance to our historical tradition of proposing SIMPDA as a
symposium, we propose an innovative format for this workshop:
The number of sessions depend on the number of submissions but, considering
the previous editions, we envisage to have four sessions, with 4-5 related
papers assigned to each session. A special session (with a specific review
process) will be dedicated to discuss research plan from PhD students.
Papers are pre-circulated to the authors that will be expected to read all
papers in advance but to avoid exceptional overhead, two are assigned to be
prepared with particular care,  making ready comments and suggestions. 
The bulk of the time during each session will be dedicated to open
conversations about all of the papers in a given session, along with any
linkages to the papers and discussions within an earlier session. 
The closing session (30 minutes), will include a panel about open challenges
during which every participant will be asked to assemble their
thoughts/project ideas/goals/etc… that they got out of the workshop.

Call for PhD Research Plans
The SIMPDA PhD Seminar is a workshop for Ph.D. students from all over the
world. The goal of the Seminar is to help students with their thesis and
research plans by providing feedback and general advice on how to use their
research results.
Students interested in participating in the Seminar should submit an
extended abstract describing their research. Submissions can relate to any
aspect of Process Data: technical advances, usage and impact studies, policy
analyses, social and institutional implications, theoretical contributions,
interaction and design advances, innovative applications, and social
implications.
Research plans should be at most of 5 page long and should be organized
following the following structure: 
Abstract: summarizes, in 5 line, the research aims and significance.
Research Question: defines what will be accomplished by eliciting the
relevant the research questions.
Background: defines the background knowledge providing the 5 most relevant
references (papers or books).
Significance: explains the relevance of the general topic and of the
specific contribution.
Research design and methods: describes and motivates the method adopted
focusing on: assumptions, solutions, data sources, validation of results,
limitations of the approach.
Research stage: describes what the student has done so far.

SIMPDA PhD award
A doctoral award will be given by the SIMPDA PhD Jury to the best research
plan submitted.
Student Scholarships
An application for a limited number of scholarships aimed at students coming
from emerging countries has been submitted to IFIP.
In order to apply, please contact paolo.ceravolo@...

Keynote Speakers

Visual Analytics meets Process Mining: Challenges and Opportunities
Theresia Gschwandtner and Silvia Miksch
Vienna University of Technology

	Event data or traces of activities often exhibit unexpected behavior
and complex relations. Thus, before and during the application of automated
analysis methods, such as process mining algorithms, the analyst needs to
investigate and understand the data at hand in order to decide which
analysis methods might be appropriate. Visual Analytics integrates the
outstanding capabilities of humans in terms of visual information
exploration with the enormous processing power of computers to form a
powerful knowledge discovery environment. The combination of visual data
exploration with process mining algorithms makes complex information
structures more comprehensible and facilitates new insights.
      In this talk, we will illustrate the various concepts of visual
process mining, focusing on the challenges, but also the great opportunities
for analyzing process data with Visual Analytics methods.

Contextualisation Techniques in Process Mining
Schahram Dustdar
Vienna University of Technology, Austria

Organizers

CHAIRS 
Stefanie Rinderle-Ma, Universität Wien, Austria
Paolo Ceravolo, Università degli Studi di Milano, Italy

ADVISORY BOARD 
Ernesto Damiani, Università degli Studi di Milano, Italy
Erich Neuhold, University of Vienna, Austria
Maurice van Keulen, University of Twente, The Netherlands
Philippe Cudré-Mauroux , University of Fribourg, Switzerland

Program Committee
MOHAMED ACHEMLAL, UNIVERSITY OF BORDEAUX, FRANCE
MARCO ANISETTI, UNIVERSITÀ DEGLI STUDI DI MILANO, ITALY
IRENE VANDERFEESTEN, EINDHOVEN UNIVERSITY OF TECHNOLOGY, THE NETHERLANDS
CLAUDIO ARDAGNA, UNIVERSITÀ DEGLI STUDI DI MILANO, ITALY
HELEN BALINSKY, HEWLETT-PACKARD LABORATORIES, UK
MIRCO BIANCO, METROCONSULT ROBERTO DINI AND PARTNERS, ITALY
JOOS BUIJS, EINDHOVEN UNIVERSITY OF TECHNOLOGY, THE NETHERLANDS
ANTONIO CAFORIO, UNIVERSITÀ DEL SALENTO, ITALY
CAROLINA CHIAO, UNIVERSITY OF ULM, GERMANY
TONY CLARK, MIDDLESEX UNIVERSITY, UK
BARABARA WEBER, UNIVERSITY OF INNSBRUCK, AUSTRIA
PAUL COTOFREI, UNIVERSITY OF NEUCHÂTEL, SWITZERLAND
PHILIPPE CUDRE-MAUROUX, UNIVERSITY OF FRIBOURG, SWITZERLAND
NORA CUPPENS, ÉCOLE NATIONALE SUPÉRIEURE DES TELECOMMUNICATIONS DE BRETAGNE,
FRANCE
GIANLUCA DEMARTINI, UNIVERSITY OF SHEFFIELD, UK.
CLAUDIO DI CICCIO, WU VIENNA, AUSTRIA
SCHAHRAM DUSTDAR, VIENNA UNIVERSITY OF TECHNOLOGY, AUSTRIA
GREGOR GRAMBOW, UNIVERSITY OF ULM, GERMANY
CHRISTIAN GUETL, UNIVERSITY OF GRAZ, AUSTRIA
MOHAND-SAID HACID, UNIVERSITY OF LYON, FRANCE
VINCENT HILAIRE, UNIVERSITÉ DE TECHNOLOGIE DE BELFORT MONTBÉLIARD, FRANCE
WEI-CHIANG HONG, ORIENTAL INSTITUTE OF TECHNOLOGY, CHINA
MUSTAFA JARRAR, BIRZEIT UNIVERSITY, PALESTINE
MEIKO JENSEN, RUHR-UNI­VER­SI­TY BO­CHUM, GERMANY
MASSIMO MECELLA, SAPIENZA UNIVERSITÀ DI ROMA, ITALY
JAN MENDLING, WU VIENNA, AUSTRIA
KWANGHOON PIO KIM, KYONGGI UNIVERSITY, SOUTH KOREA.
BARBARA RUSSO, FREE UNIVERSITY OF BOZEN - BOLZANO, ITALY
GIOVANNA SISSA, UNIVERSITÀ DEGLI STUDI DI GENOVA, ITALY
MAURICE VAN KEULEN, UNIVERSITY OF TWENTE, THE NETHERLANDS
MATTHIAS WEIDLICH, IMPERIAL COLLEGE, UK
ISABELLA SEEBER, UNIVERSITY OF INNSBRUCK, AUSTRIA
ZEESHAN PERVEZ, UNIVERSITY OF THE WEST OF SCOTLAND, UK
MARCIN WYLOT, UNIVERSITY OF FRIBOURG, SWITZERLAND
JOSE JACOBO ZUBCOFF, UNIVERSIDAD DE ALICANTE, SPAIN
WILFRIED GROSSMANN, UNIVERSITY OF VIENNA, AUSTRIA
KARIMA BOUDAOUD, ECOLE POLYTECHNIQUE DE NICE SOPHIA ANTIPOLIS, FRANCE

Historical Information on Previous Editions
SIMPDA was proposed in 2011 and 2012 by IFIP WG 2.6 and 2.12/12.4 as the
International Symposium on Data-Driven Process Discovery and Analysis. 
The symposium had around 30 attendees in 2011 and 20 in 2012. It featured a
number of keynotes illustrating new approaches, shorter presentations on
recent research, and a competitive PhD seminar, together with selected
research and industrial demonstrations. The authors of the accepted papers
have been invited to submit extended articles to a post-symposium
proceedings volume published in the Springer LNBIP series.
Several events and activities arose off these symposia, among the most
notables we have two Dagstuhl seminars: 
Dagstuhl Seminar on Semantic Challenges in Sensor Networks, January 24-29,
2010.
Dagstuhl Seminar on Unleashing Operational Process Mining, November 24-29,
2010. 

****************
Per destinare il 5x1000 all'Universita' degli Studi di Milano: indicare nella dichiarazione dei redditi
il codice fiscale 80012650158.

http://www.unimi.it/13084.htm?utm_source=firmaMail&utm_medium=email&utm_content=linkFirmaEmail&utm_campaign=5xmille
Giovanni Livraga | 21 Jul 13:28 2015
Picon

IEEE CNS 2015 Call for Posters - Deadline extended (July 24, 2015 11:59:pm American Samoa time)

*** To respond to several requests, deadline has been extended ***
*** (2-page abstract due July 24, 2015 - 11:59:pm American Samoa time) ***

CALL FOR POSTERS

==========================================================
3rd IEEE Conference on Communications and Network Security
Florence, Italy -- September 28-30, 2015
http://cns2015.ieee-cns.org/
==========================================================

IMPORTANT DATES
2-page Abstract Due by: July 24, 2015 11:59:pm American Samoa time [extended]
Notification of Acceptance: July 30, 2015
Final Abstract Due: August 10, 2015

*********
A BEST POSTER AWARD Award will be given based on the poster's novelty and potentials in
research. The quality of presentation and the interaction during the session will also
be important criteria. The award will be announced in a plenary session of the main
conference.
*********

SCOPE
IEEE CNS is a new conference series in IEEE Communications Society (ComSoc) core
conference portfolio and the only ComSoc conference focusing solely on cyber security.
IEEE CNS is a spin-off of IEEE INFOCOM, the premier ComSoc conference on networking.
The goal of CNS is to provide an outstanding forum for cyber security researchers,
practitioners, policy makers, and users to exchange ideas, techniques and tools,
raise awareness, and share experience related to all practical and theoretical
aspects of communications and network security.

Building on the success of the past two years' conferences, IEEE CNS 2015 welcomes
poster submissions to be presented during the conference. A poster submission should
be a 2-page abstract, which summarizes the key merits of proposed ideas, presents
initial results, and identifies challenges to develop a complete solution. Abstracts
will be evaluated by the Posters Session committee based on the novelty and the
potential to stimulate discussions and promote collaborations. Poster abstracts
should be submitted via EDAS at http://edas.info/N20343. Please follow the same
template for regular conference papers available on http://www.ieee-cns.org. Sample
topics of interest include but are not limited to:

- Anonymization and privacy in communication systems
- Biometric authentication and identity management
- Computer and network forensics
- Data and application security
- Data protection and integrity
- Availability of communications, survivability of networks in the presence of
 attacks
- Key management and PKI for networks
- Information-theoretic security
- Intrusion detection and prevention
- Location privacy
- Mobile security
- Outsourcing of network and data communication services
- Physical layer security methods, cross-layer methods for enhancing security
- Secure routing, network management
- Security for critical infrastructures
- Security metrics and performance evaluation
- Security and privacy for big data
- Security and privacy in body area networks
- Security and privacy in content delivery network
- Security and privacy in cloud computing and federated cloud
- Security and privacy in crowdsourcing
- Security and privacy in the Internet of Things
- Security and privacy in multihop wireless networks: ad hoc, mesh, sensor,
 vehicular and RFID networks
- Security and privacy in peer-to-peer networks and overlay networks
- Security and privacy in single-hop wireless networks: Wi-Fi, Wi-Max
- Security and privacy in smart grid, cognitive radio networks, and
 disruption/delay tolerant networks
- Security and privacy in social networks
- Security and privacy in pervasive and ubiquitous computing
- Social, economic and policy issues of trust, security and privacy
- Traffic analysis
- Usable security for networked computer systems
- Vulnerability, exploitation tools, malware, botnet, DDoS attacks
- Web, e-commerce, m-commerce, and e-mail security

The conference will arrange the poster session in a room where the posters can be
displayed. An accepted poster must be presented by an author in the poster session
to interested attendees. The abstract of the accepted posters will appear in the
conference proceeding and be submitted to IEEE Xplore. Each accepted poster requires
an author to register for the conference at the appropriate rate based on the membership
level. Each author registration can cover up to three posters or papers of the conference,
but each poster must have a dedicated presenter at the session.

A Best Poster Award will be given based on the poster's novelty and potentials in
research. The quality of presentation and the interaction during the session will also
be important criteria. The award will be announced in a plenary session of the main
conference.

CONTACTS
Prof. Peng Liu (pliu@...), Poster Chair

****************
Per destinare il 5x1000 all'Universita' degli Studi di Milano: indicare nella dichiarazione dei redditi
il codice fiscale 80012650158.

http://www.unimi.it/13084.htm?utm_source=firmaMail&utm_medium=email&utm_content=linkFirmaEmail&utm_campaign=5xmille
Achim D. Brucker | 17 Jul 19:23 2015
Picon

OCL 2015: ** Deadline Extension ** Submit Your Paper Until July 26, 2015

(Apologies for duplicates)

 If you are working on the foundations, methods, or tools for OCL or 
textual modelling, you should now finalise your submission for the
 OCL workshop!

       *** The submission deadline has been extended to July 26th, 2015! ***

                    CALL FOR PAPERS
    15th International Workshop on OCL and Textual Modeling
          Tools and Textual Model Transformations

   Co-located with ACM/IEEE 18th International Conference on
 Model Driven Engineering Languages and Systems (MODELS 2015)
       September 28th, 2015, Ottawa, Canada
                   http://ocl2015.lri.fr

Modeling started out with UML and its precursors as a graphical
notation. Such visual representations enable direct intuitive
capturing of reality, but some of their features are difficult to
formalize and lack the level of precision required to create complete
and unambiguous specifications. Limitations of the graphical notations
encouraged the development of text-based modeling languages that
either integrate with or replace graphical notations for
modeling. Typical examples of such languages are OCL, textual MOF,
Epsilon, and Alloy. Textual modeling languages have their roots in
formal language paradigms like logic, programming and databases.

The goal of this workshop is to create a forum where researchers and
practitioners interested in building models using OCL or other kinds
of textual languages can directly interact, report advances, share
results, identify tools for language development, and discuss
appropriate standards. In particular, the workshop will encourage
discussions for achieving synergy from different modeling language
concepts and modeling language use. The close interaction will enable
researchers and practitioners to identify common interests and options
for potential cooperation.

Topics of interest include (but are not limited to)
===================================================
- Mappings between textual modeling languages and other languages/formalisms
- Algorithms, evaluation strategies and optimizations in the context
  of textual modeling languages for
  -- validation, verification, and testing,
  -- model transformation and code generation,
  -- meta-modeling and DSLs, and
  -- query and constraint specifications
- Alternative graphical/textual notations for textual modeling languages
- Evolution, transformation and simplification of textual modeling
  expressions
- Libraries, templates and patterns for textual modeling languages
- Tools that support textual modeling languages (e.g., verification of
  OCL formulae, runtime monitoring of invariants)
- Complexity results for textual modeling languages
- Quality models and benchmarks for comparing and evaluating
  textual modeling tools and algorithms
- Successful applications of textual modeling languages
- Case studies on industrial applications of textual modeling languages
- Experience reports
  -- usage of textual modeling languages and tools in complex domains,
  -- usability of textual modeling languages and tools for end-users
- Empirical studies about the benefits and drawbacks of textual modeling
  languages
- Innovative textual modeling tools
- Comparison, evaluation and integration of modeling languages
- Correlation between modeling languages and modeling tasks

This year, we particularly encourage submissions describing tools that
support - in a very broad sense - textual modeling languages (if you
have implemented OCL.js to run OCL in a web browser, this is the right
workshop to present your work) as well as textual model
transformations.

Venue
=====
The workshop will be organized as a part of MODELS 2015 Conference in
Ottawa, Canada. It continues the series of OCL workshops held at
UML/MODELS conferences: York (2000), Toronto (2001), San Francisco
(2003), Lisbon (2004), Montego Bay (2005), Genova (2006), Nashville
(2007), Toulouse (2008), Denver (2009), Oslo (2010), Zurich (2011, at
the TOOLs conference), 2012 in Innsbruck, 2013 in Miami, and 2014 in
Valencia, Spain. Similar to its predecessors, the workshop addresses
both people from academia and industry. The aim is to provide a forum
for addressing integration of OCL and other textual modeling
languages, as well as tools for textual modeling, and for
disseminating good practice and discussing the new requirements for
textual modeling.

Workshop Format
===============
The workshop will include short (about 15 min) presentations, parallel
sessions of working groups, and sum-up discussions.

Submissions
===========
Three types of papers will be considered:
* short papers (between 6 and 8 pages) describing ideas,
* tool papers (between 6 and 8 pages), and
* full papers (between 12 and 16 pages)
in LNCS format. Submissions should be uploaded to EasyChair
(https://easychair.org/conferences/?conf=ocl20150).  The
program committee will review the submissions (minimum 2 reviews per
paper, usually 3 reviews) and select papers according to their
relevance and interest for discussions that will take place at the
workshop. Accepted papers will be published online in a
pre-conference edition of CEUR (http://www.ceur-ws.org).

Important Dates
===============
Submission of papers:      July 26, 2015 (extended)
Notification:            August 21, 2015
Workshop date:        September 28, 2015

Organizers
==========
Achim D. Brucker, SAP SE, Germany
Marina Egea, Indra Sistemas S.A., Spain
Martin Gogolla, University of Bremen, Germany
Frederic Tuong, Univ. Paris-Sud - IRT SystemX - LRI, France

Programme Committee
===================
Mira Balaban, Ben-Gurion University of the Negev, Israel
Tricia Balfe, Nomos Software, Ireland
Achim D. Brucker, SAP SE, Germany
Fabian Buettner, Inria - Ecole des Mines de Nantes, France
Jordi Cabot, Inria - Ecole des Mines de Nantes, France
Dan Chiorean, Babes-Bolyai University, Romania
Robert Clariso, Universitat Oberta de Catalunya, Spain
Tony Clark, Middlesex University, UK
Manuel Clavel, IMDEA Software Institute, Spain
Carolina Dania, IMDEA Software Institute, Spain
Birgit Demuth, Technische Universitat Dresden, Germany
Marina Egea, Indra Sistemas S.A., Spain
Geri Georg, Colorado State University, USA
Martin Gogolla, University of Bremen, Germany
Shahar Maoz, Tel Aviv University, Israel
Istvan Rath, Budapest University of Technology and Economics, Hungary
Bernhard Rumpe, RWTH Aachen, Germany
Frederic Tuong, Univ. Paris-Sud - IRT SystemX - LRI, France
Claas Wilke, Technische Universitat Dresden, Germany
Edward Willink, Willink Transformations Ltd., UK
Burkhart Wolff, Univ. Paris-Sud - LRI, France
Steffen Zschaler, King's College, UK

--

-- 
Dr. Achim D. Brucker, SAP SE, Vincenz-Priessnitz-Str. 1, D-76131 Karlsruhe
           Phone: +49 6227 7-52595, http://www.brucker.ch/

Gmane