fabio.zanasi | 22 Jan 18:04 2015
Picon
Picon

CALCO 2015 : Second Call for Papers


=========================================================

              CALL FOR PAPERS:  CALCO 2015

6th International Conference on Algebra and Coalgebra in Computer Science

                 June 24 - 26, 2015

                Nijmegen, Netherlands

               http://coalg.org/calco15/

==========================================================

       Abstract submission:    March 22, 2015
       Paper submission:       April 2, 2015
       Author notification:    May 6, 2015
       Final version due:      June 3, 2015

==========================================================

-- SCOPE --

CALCO aims to bring together researchers and practitioners with
interests in foundational aspects, and both traditional and emerging
uses of algebra and coalgebra in computer science.

It is a high-level, bi-annual conference formed by joining the forces 
and reputations of CMCS (the International Workshop on Coalgebraic 
(Continue reading)

Fulvio Frati | 22 Jan 14:46 2015
Picon

[CFP]: OSS2015 Ph.D. Contest

[Apologies if you receive multiple copies of this CFP]

*****************************************************************************

11th Intl. Conf. on Open Source Systems (OSS2015)

Software Ecosystems Mining and Modelling PH.D. Contest

*****************************************************************************

As an addition to the OSS conference in 2015, we invite talented graduate students (Msc, PhD, and beyond) to submit their data sets, models, and papers to the Software Ecosystems Mining and Modelling contest. We are looking for innovations in the fields of open source ecosystem mining and modelling and aim to showcase groundbreaking results in the domain.

 

We invite submissions related to, but not limited to, the following topics of interest:

- Software ecosystems data

- Software ecosystems models

- Relationship and structure mining techniques

- Relationship analysis

- Software modeling

- App store and plug-in directory analysis

- OSS ecosystem strategy analysis

- OSS governance

- OSS quality control

- Multi-homing

Please note that we are explicitly looking for software ecosystem themed submissions. Submissions that concern single OSS projects are definitely interesting, but if they do not have some direct consequence for multiple (related) projects, the submissions will automatically be appreciated lower.

** Submission Dates

Contest Deadline: 28 February 2015

Winner Announcement: 7 March 2015

** Submission Format

The format for your submission is not restricted. Please make sure it is accompanied by an LNCS formatted submission document of up to 10 pages, although in some cases one page might suffice. The submissions must be submitted to EcosystemMiningContest <at> oss.org.  

 

** Prize

The best proposals will be published in the OSS2015 Conference Proceedings, in the Ph.D. Contest section.

The winner will be invited to present his/her paper during the conference, and will have travel expenses (flight, max 500€) and registration granted by the conference organization.

The winner will also be awarded with a certificate of winning the Graduate Student Software Ecosystems Mining and Modelling Contest.

** Committee

The jury for the contest consists of:

Slinger Jansen, Utrecht University, The Netherlands

Ernesto Damiani, Milan University, Italy

Fulvio Frati, Milan University, Italy

 

 

_______________________________________________
Om-announce mailing list
Om-announce@...
http://openmath.org/mailman/listinfo/om-announce
Giovanni Livraga | 22 Jan 18:47 2015
Picon

Call for Papers - 20th European Symposium on Research in Computer Security (ESORICS 2015)

CALL FOR PAPERS

******************************************************************************
20th European Symposium on Research in Computer Security (ESORICS 2015)
Vienna, Austria -- September 23-25, 2015
http://www.esorics2015.sba-research.org
******************************************************************************

ESORICS is the annual European research event in Computer Security. 
The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the academic
and industrial communities.  Papers offering novel research contributions
in computer security are solicited for submission to the Symposium. 
The primary focus is on original, high quality, unpublished research
and implementation experiences. We encourage submissions of 
papers discussing industrial research and development.
Topics of interest include, but are not limited to:

- access control
- accountability
- ad hoc networks
- anonymity
- applied cryptography
- authentication
- biometrics
- database security
- data protection
- digital content protection
- digital forensic
- distributed systems security
- electronic payments
- embedded systems security
- inference control
- information hiding
- identity management
- information flow control
- integrity
- intrusion detection
- formal security methods
- language-based security
- network security
- phishing and spam prevention
- privacy
- risk analysis and management
- secure electronic voting
- security architectures
- security economics
- security metrics
- security models
- security and privacy in cloud scenarios
- security and privacy in complex systems
- security and privacy in location services
- security and privacy for mobile code
- security and privacy in pervasive/ubiquitous computing
- security and privacy policies
- security and privacy in social networks
- security and privacy in web services
- security verification
- software security
- steganography
- systems security
- trust models and management
- trustworthy user devices
- web security
- wireless security

PAPER SUBMISSIONS
--------------------------
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. The proceedings will be published by
Springer in the the Lecture Notes in Computer Science series. 

All submissions should follow the LNCS template
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0)
from the time they are submitted. Submitted papers should be 
at most 16 pages (using 10-point font), excluding the bibliography and
well-marked appendices, and at most 20 pages total. Committee members
are not required to read the appendices, so the paper should be
intelligible without them. All submissions must be written in English.

Purely theoretical papers, e.g. in cryptography, must be explicit about 
the relevance of the theory to the security of IT systems.

Submissions are to be made to the submission web site at
http://www.easychair.org/conferences/?conf=esorics2015. 
Only pdf files will be accepted. Submissions not meeting these guidelines
risk rejection without consideration of their merits. 
Papers must be received by the deadline of April 4, 2015. 
Authors of accepted papers must guarantee that their papers will be 
presented at the conference.

IMPORTANT DATES
--------------------------
Paper submission due: April 4, 2015
Notification to authors: June 15, 2015
Camera ready due: June 29, 2015

OFFICERS
--------------------------
GENERAL CHAIR
Guenther Pernul 
University of Regensburg, Germany

PROGRAM CHAIRS
Peter Y A Ryan
University of Luxembourg, Luxembourg

Edgar Weippl
SBA Research & Vienna University of Technology, Austria

WORKSHOP CHAIR
Javier Lopez
University of Malaga, Spain

PROGRAM COMMITTTE
--------------------------
David A. Basin, ETH Zurich, Switzerland
Alessandro Armando, Universita` di Genova, Italy
Vijay Atluri, Rutgers University, USA
Michael Backes, Saarland University, Germany
Feng Bao, Security and Privacy Lab, Huawei, China
Giampaolo Bella, Universit‡ di Catania, Italy
Carlo Blundo, Universita` degli Studi di Salerno, Italy
John C. Mitchell, Stanford University, USA
Ran Canetti, Tel Aviv University, Israel
Liqun Chen, HP Labs, UK
Michael Clarkson, Cornell University, USA
Jason Crampton, University of London, UK
Cas Cremers, University of Oxford, UK
Frederic Cuppens, Telecom Bretagne, France
Nora Cuppens-Boulahia, Telecom Bretagne, France
Sabrina De Capitani di Vimercati, Universita` degli Studi di Milano, Italy
Wenliang Du, Syracuse University, USA
Dimitris E. Simos, SBA Research, Austria
Hannes Federrath, University of Hamburg, Germany
Simon Foley, University College Cork, Ireland
Sara Foresti, Universita` degli Studi di Milano, Italy
Michael Goldsmith, University of Oxford, UK
Dieter Gollmann, TU Hamburg-Harburg, Germany
Dimitris Gritzalis, AUEB, Greece
Joshua Guttman, MTIRE Corp and Worcester Polytechnic, USA
Feng Hao, Newcastle University, UK
Amir Herzberg, Bar-Ilan University, Israel
Xinyi Huang, Fujian Normal University, China
Michael Huth, Imperial College, UK
Sotiris Ioannidis, FORTH, Crete
Adam J. Lee, University of Pittsburgh, USA
Sushil Jajodia, George Mason University, USA
Markus Jakobsson, Qualcomm, USA
Sokratis K. Katsikas, University of Piraeus, Greece
Stefan Katzenbeisser, TU Darmstadt, Germany
Florian Kerschbaum, SAP, Germany
Steve Kremer, INRIA Nancy and LORIA, France
Wenke Lee, Georgia Institute of Technology, USA
Yingjiu Li, Singapore Management University, Singapore
Peng Liu, Pennsylvania State University, USA
Javier Lopez, University of Malaga, Spain
Wenjing Lou, Virginia Polytechnic Institute and State University, USA
Haibing Lu, Santa Clara University, USA
Roy Maxion, Carnegie Mellon University, USA
Catherine Meadows, Naval Research Laboratory, USA
Carroll Morgan, University of New South Wales, Australia
David Naccache, ENS, France
Rolf Oppliger, eSecurity Technologies, Switzerland
Stefano Paraboschi, Universita` degli Studi di Bergamo, Italy
Olivier Pereira, UCL Crypto Group, Belgium
Guenther Pernul, University of Regensburg, Germany
Bart Preneel, Katholieke Universiteit Leuven , Belgium
Jean-Jacques Quisquater, UCL, Belgium
Kui Ren, State University of New York, Buffalo, USA
Mark Ryan, University of Birmingham, UK
Ahmad-Reza Sadeghi, TU Darmstadt, Germany
Pierangela Samarati, Universita` degli Studi di Milano, Italy
Nitesh Saxena, University of Alabama at Birmingham, USA
Andreas Schaad, SAP, Germany
Steve Schneider, University of Surrey, UK
Basit Shafiq, Lahore University of Management Sciences, Pakistan
Einar Snekkenes, Gjovik University College, Norway
Philip Stark, University of California, Berkeley, USA
Vanessa Teague, University of Melbourne, Australia
Jaideep Vaidya, Rutgers University, USA
Paulo Verissimo, University of  Luxembourg, Luxembourg
Luca Vigano, Kingís College London, UK
Michael Waidner, TU Darmstadt, Germany
Cong Wang, City University of Hong Kong, China
Lingyu Wang, University of Concordia, Canada
Ting Yu, North Carolina State University, USA
Meng Yu, Virginia Commonwealth University, USA
Moti Yung, Google, USA
Jianying Zhou, Institute for Infocomm Research, Singapore
Sencun Zhu, Pennsylvania State University, USA

This call for papers and additional information about the conference
can be found at http://www.esorics2015.sba-research.org
YuHui Lin | 21 Jan 13:50 2015
Picon
Picon

AVoCS 2015: First Call for Papers

---------------------------------------------------------------------
                      FIRST CALL FOR PAPERS

              The 15th International Workshop on 
          Automated Verification of Critical Systems 
                        AVoCS 2015

             1-4 September 2015, Edinburgh, UK

          https://sites.google.com/site/avocs15/
                avocs2015 <at> easychair.org
---------------------------------------------------------------------

IMPORTANT DATES
  Submission of abstract (full papers): 5th June 2015
  Submission of full papers: 12th June 2015
  Notification (full papers): 14th July 2015
  Submission of research idea papers: 7th August 2015
  Notification (research idea): 14th August 2015
  Early registration: 18th August 2015
  Submissions of final versions: 21st August 2015 

INVITED SPEAKERS
  Colin O'Halloran (D-RisQ & the University of Oxford)
  Don Sannella (Contemplate & the University of Edinburgh)

SPONSORS
  Formal Methods Europe (FME)
  The Scottish Informatics & Computer Science Alliance (SICSA)

BACKGROUND 
  The aim of Automated Verification of Critical Systems (AVoCS) 2015 
  is to contribute to the interaction and exchange of ideas among members 
  of the international research community on tools and techniques for the 
  verification of critical systems. 

SCOPE
  The subject is to be interpreted broadly and inclusively. It covers 
  all aspects of automated verification, including model checking, 
  theorem proving, SAT/SMT constraint solving, abstract interpretation, 
  and refinement pertaining to various types of critical systems which 
  need to meet stringent dependability requirements (safety-critical, 
  business-critical, performance-critical, etc.). Contributions that 
  describe different techniques, or industrial case studies are encouraged. 

  The technical programme will consist of invited and contributed talks 
  and also allow for short presentations of research ideas. The workshop 
  will be relatively informal, with an emphasis on discussion where special 
  discussion sessions will be organised around the research ideas presentations. 
  Topics include (but are not limited to):
    - Model Checking
    - Automatic and Interactive Theorem Proving
    - SAT, SMT or Constraint Solving for Verification
    - Abstract Interpretation
    - Specification and Refinement
    - Requirements Capture and Analysis
    - Verification of Software and Hardware
    - Specification and Verification of Fault Tolerance and Resilience
    - Probabilistic and Real-Time Systems
    - Dependable Systems
    - Verified System Development
    - Industrial Applications

WORKSHOPS
  AI4FM 2015: 1 September 2015 -- www.ai4fm.org/ai4fm-2015/

VENUE
  The event will be held in the International Centre for Mathematical Sciences 
  (ICMS) in the centre of the historic old town of Edinburgh - an UNESCO world
  heritage site. 

STUDENT GRANTS
  Thanks to sponsorships from FME and SICSA we can offer financial support for a 
  limited number of students registering for AVoCS in the form of a registration 
  fee waiver (full or partial). As this is limited, we ask the students that 
  would like to take the advantage of this support to submit a short application. 
  The details on how to apply will be available in due course from the AVoCS 
  webpage.

SUBMISSION DETAILS
   Submissions of full papers to the workshop must not have been published 
   or be concurrently considered for publication elsewhere. All submissions 
   will be peer-reviewed and judged on the basis of originality, contribution 
   to the field, technical and presentation quality, and relevance to the 
   workshop. Submissions are handled via Easychair: 

       https://easychair.org/conferences/?conf=avocs2015

   The papers must be written in English and not exceed 15 pages and should 
   use the dedicated AVoCS 2015 EASST template available rom the the 
   following link (for LaTeX and Word):

       http://journal.ub.tu-berlin.de/eceasst

   AVoCS also encourages the submissions of research ideas in order to stimulate 
   discussions at the workshop. Reports on ongoing work or surveys on work 
   published elsewhere are welcome. The Programme Committee will select 
   research ideas on the basis of submitted abstracts according to significance 
   and general interest. Research ideas must be written in English and not exceed 
   2 pages using the EASST template. The presentation of these ideas will be organised 
   around discussions, where the presenter should also prepare a set of question in 
   which the audience will discuss.

PROCEEDINGS
  At the workshop, pre-proceedings will be available in the form of a Heriot-Watt 
  University Technical Report; this report will also include the research ideas.
  After the workshop, the authors of accepted full papers will have about one 
  month in order to revise their papers for publication in the workshop post-
  proceedings which will appear in the Electronic Communications of the EASST 
  Open Access Journal. Research ideas will not be part of the proceedings in the 
  Open Access Journal.

SPECIAL SCP JOURNAL ISSUE
  Authors of a selection of the best papers presented at the workshop will be 
  invited to submit extended versions of their work for publication in a 
  special issue of Elsevier's journal Science of Computer Programming.

PROGRAM COMMITTEE  
  Ernie Cohen, University of Pennsylvania, USA
  Ewen Denney, NASA Ames, USA
  Jean-Christophe Filliatre, CNRS, France
  Michael Goldsmith, University of Oxford, UK
  Gudmund Grov, Heriot-Watt University, UK (co-chair)
  Keijo Heljanko, Aalto University, Finland
  Mike Hinchey, University of Limerick, Ireland
  Marieke Huisman, University of Twente, Netherlands
  Andrew Ireland, Heriot-Watt University, UK (co-chair)
  Gerwin Klein, NICTA/UNSW, Australia
  Thierry Lecomte, ClearSy, France
  Peter Gorm Larsen, Aarhus University, Denmark 
  Panagiotis (Pete) Manolios, Northeastern University, USA
  Stephan Merz, INRIA Nancy & LORIA, France
  Jaco van de Pol, University of Twente, Netherlands
  Markus Roggenbach, Swansea University, UK
  Marco Roveri, FBK, Italy
  Thomas Santen, Microsoft Research, Germany
  Bernard Steffen, Technical University Dortmund, Germany
  Jan Strejček, Masaryk University, Czech Republic
  Jun Sun, Singapore University of Technology and Design, Singapore
  Tayssir Touili, LIAFA, CNRS & University Paris Diderot, France
  Helen Treharne, University of Surrey, UK
  Laurent Voisin, Systerel, France
  Angela Wallenburg, Altran, UK
  John Wickerson, Imperial College London, UK
  Peter Ölveczky, University of Oslo, Norway

ORGANISERS 
  Gudmund Grov, Heriot-Watt University, UK
  Andrew Ireland, Heriot-Watt University, UK
  Yuhui Lin, Heriot-Watt University, UK (Local arrangements and publicity chair)

STEERING COMMITTEE 
  Michael Goldsmith, University of Oxford, UK
  Stephan Merz, INRIA Nancy & LORIA, France
  Markus Roggenbach, Swansea University, UK

----- 
We invite research leaders and ambitious early career researchers to 
join us in leading and driving research in key inter-disciplinary themes. 
Please see www.hw.ac.uk/researchleaders for further information and how
to apply.

Heriot-Watt University is a Scottish charity
registered under charity number SC000278.

_______________________________________________
Om-announce mailing list
Om-announce <at> openmath.org
http://openmath.org/mailman/listinfo/om-announce
DBSec 2015 | 21 Jan 18:46 2015
Picon

Call for Papers - 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2015)

CALL FOR PAPERS
29th Annual IFIP WG 11.3 Working Conference on Data and
Applications Security and Privacy (DBSec 2015)
Fairfax, VA, USA -- July 13-15, 2015
http://dbsec2015.di.unimi.it

DBSec is an annual international conference covering research in data
and applications security and privacy. The 29th Annual IFIP WG 11.3
Working Conference on Data and Applications Security and Privacy
(DBSec 2015) will be held in Fairfax, VA, USA. The conference seeks
submissions from academia, industry, and government presenting novel
research on all theoretical and practical aspects of data protection,
privacy, and applications security. Topics of interest include,
but are not limited to:

- access control   
- anonymity        
- applied cryptography in data security
- authentication   
- big data security
- data and system integrity
- data protection  
- database security
- digital rights management
- identity management
- intrusion detection
- knowledge discovery and privacy
- methodologies for data and application security
- network security 
- organizational security
- privacy          
- secure cloud computing
- secure distributed systems
- secure information integration
- secure Web services
- security and privacy in crowdsourcing
- security and privacy in IT outsourcing
- security and privacy in the Internet of Things
- security and privacy in location-based services
- security and privacy in P2P scenarios and social networks
- security and privacy in pervasive/ubiquitous computing
- security and privacy policies
- security management
- security metrics
- threats, vulnerabilities, and risk management
- trust and reputation systems
- trust management
- wireless and mobile security

PAPER SUBMISSIONS
Submitted papers should be at most 16 pages in the LNCS format,
including the bibliography and well-marked appendices. Committee
members are not required to read the appendices, and so the paper
should be intelligible without them. Submissions are to be made to
the submission web site at
https://easychair.org/conferences/?conf=dbsec2015 .
Only pdf files will be accepted.
Submissions not meeting these guidelines risk rejection without
consideration of their merits. Papers must be received by the
deadline of February 21, 2015 (11:59 PM American Samoa time).
Authors of accepted papers must guarantee that their papers will
be presented at the conference. Accepted papers will be published
by Springer in the Lecture Notes in Computer Science (LNCS) series.
The final version of the accepted papers must be in the format
required of publications in the LNCS series (a Latex source file
will be required).
A paper submitted to DBSec 2015 cannot be under review for any other
conference or journal during the time it is being considered for
DBSec 2015. Furthermore, after you submit to DBSec 2015,
you must await our response before submitting elsewhere. If you
submit your paper to another conference or journal either
before/after submission of the paper to DBSec 2015, we will reject
your paper without review and will notify the other
conference/journal as well. This restriction applies to identical
as well as to substantially similar papers.

IMPORTANT DATES
Paper Submission due: February 21, 2015 - 11:59 PM American Samoa Time
Notification to authors: April 20, 2015
Final papers due: April 30, 2015

PROGRAM CHAIR
Pierangela Samarati
Dipartimento di Informatica
Universita' degli Studi di Milano, Italy

This call for papers and additional information about the conference
can be found at http://dbsec2015.di.unimi.it
Boubaker, Anis | 20 Jan 05:14 2015
Picon

CFP: MCETECH2015 - May 12-15 <at> Montreal - Workshop & Tutorial proposals due FEB 13, 2015

Dear colleagues, 

My apologies for cross-postings.

============================
CALL FOR WORKSHOP & TUTORIAL PROPOSALS
SIXTH INTERNATIONAL MCETECH CONFERENCE ON E-TECHNOLOGIES (MCETECH2015)
May 12-15, 2015, Montreal, Canada

IMPORTANT INFORMATION:
======================
WORKSHOP AND TUTORIAL PROPOSALS DUE FEBRUARY 13, 2015
NOTIFICATION OF ACCEPTANCE: FEBRUARY 27, 2015

DESCRIPTION: The successful implementation of Internet applications is a multi-faceted problem,
involving technological, managerial, economic, cognitive, social, ethical, and legal issues. The 6th
edition of MCETECH aims at bringing together researchers and practitioners interested in exploring
these multiple facets with a focus on the technological, managerial, and organizational issues. 

TOPICS FOR WORKSHOPS/TUTORIALS: Submissions are invited in the following non-exhaustive list of
topics: 1) architectures and infrastructure, 2) methodologies and models (computational models, BPM,
service composition), 3) applications (e-business, e-health, e-government, e-justice, e-tc.), 4)
business implications (organizational transformation, new business models), 5) social and legal
implications, and 6) news trends and paradigms (e.g. social computing, ubiquitous computing, the IoT,
etc.); more details on the topics can be found in http://www.mcetech.org/cfp.php

ACCEPTANCE CRITERIA:
For workshops: 1) relevance of workshop theme to conference, 2) novelty of research problem, or problem
solving approach, or solution, 3) expertise, diversity and organizational experience of organizers,
and 4) potential to generate interest in the community.
For tutorials: 1) relevance of tutorial theme, 2) timeliness, and 3) expertise and (tutorial) experience
of presenter.
For more information about workshops and tutorial submissions, check the "Workshop submissions" and
"Tutorial submissions" sections in the 'Instructions to Authors page (http://www.mcetech.org/instructions-authors.php)

MORE INFORMATION:  please write to the workshops & tutorials chair, Anis Boubaker, anis@...
Jon Sneyers | 19 Jan 11:13 2015
Picon

Book announcement: Robert Kowalski, LOGIC FOR PROBLEM SOLVING, REVISITED

New Book

Robert Kowalski
LOGIC FOR PROBLEM SOLVING, REVISITED

ISBN 9783837036299      Also available as E-Book
http://books.google.de/books?id=6vh1BQAAQBAJ&hl=en

Algorithm = Logic + Control

Robert Kowalski revisits his classic text on Computational Logic in the
light of subsequent developments, extending it by a substantial
commentary of fifty pages.
Ian Miguel | 18 Jan 18:55 2015
Picon

[logic-programming] Call For Workshop Proposals: 31st International Conference on Logic Programming (ICLP 2015)


*** CALL FOR WORKSHOP PROPOSALS ***

     ICLP 2015

 31st International Conference on Logic Programming

Aug 31 - Sep 4, 2015
 Cork, Ireland

URL: http://booleconferences.ucc.ie/iclp2015

ICLP 2015, the 31st International Conference on Logic Programming,
will be held in Cork, Ireland, from August 31 to September 4, 2015.
The conference is is part of The Year of George Boole, a celebration
of the life and work of George Boole who was born in 1815 and worked
at the University College of Cork. ICLP 2015 will also be collocated
with CP 2015.

Workshops collocated with an international conference are one of the
best venues for the presentation and discussion of preliminary work,
novel ideas, and new open problems to a wide and interested audience.
Collocated workshops also provide an opportunity for presenting
specialized topics and opportunities for intensive discussions and
project collaboration. The topics of the workshops collocated with
ICLP 2015 can cover any areas related to logic programming, (e.g.,
theory, implementation, environments, language issues, alternative
paradigms, applications), including cross-disciplinary areas. However,
any relevant workshop proposal will be considered.

The format of the workshop will be decided by the workshop organizers,
but ample time should be allowed for general discussion. Workshops can
vary in length, but the optimal duration will be half a day or a full
day.

Workshop Proposal:
==================

Those interested in organizing a workshop at ICLP 2015 are invited to
submit a workshop proposal. Proposals should be in English and about
two pages in length. They should contain:

 * The title of the workshop.
 * A brief technical description of the topics covered by the workshop.
 * A discussion of the timeliness and relevance of the workshop.
 * A list of some related workshops held in the last years
 * The requested number of half-days allotted to the workshop
   and an estimate of the number of expected attendees.
 * The names, affiliation and contact details (email, web page,
   phone) of the workshop organizers together with a designated
   contact person.
 * Previous experience of the workshop organizers in
   workshop/conference organization.

Proposals are expected in text or PDF format. All proposals should be
submitted to the Workshop Chair by email by March 1, 2015.

Reviewing Process:
==================

Each submitted proposal will be reviewed by the Workshop, Program and
General Chairs. Proposals that appear well-organized and that fit the
goals and scope of ICLP will be selected.  The decision will be
notified by email to the responsible organizer by March 15, 2015.

The definitive length of the workshop will be planned according to the
number of submissions received by the different workshops. For every
accepted workshop, the ICLP local organizers will prepare a meeting
room. The proceedings should be produced and distributed (usually via
web pages) by each workshop organizer.

Workshop Organizers' Tasks:
===========================

 * Producing a "Call for Papers" for the workshop and posting it
   on the Internet and other means.  A web page URL which will linked
   into the ICLP 2015 home page should be provided by April 10, 2015.
 * Providing a brief description of the workshop for the conference
   program.
 * Reviewing/accepting submitted papers.
 * Scheduling workshop activities in collaboration with the local
   organizers and the Workshop Chair.
 * Sending workshop program in PDF format to the Workshop Chair for
   distribution and posting at the conference by June 31, 2015.
 * The use of the Computing Research Repository (CoRR) for the
   workshop proceedings is strongly recommended. For guidelines, see:
     http://dtai.cs.kuleuven.be/projects/ALP/electronic_publishing.html
   We encourage reading these instructions in advance so that you can
   ask paper authors to prepare the final versions of their papers
   accordingly. 
   

Location:
=========

All workshops will take place at the main conference venue. See the
ICLP 2015 web site for location details.

Important Dates:
================

March        1, 2015: Proposal submission deadline
March       16, 2015: Notification
April       10, 2015: Deadline for receipt of CfP and workshop web page URL
July        31, 2015: Deadline for workshop program 
Aug         31, 2015: ICLP workshops (preliminary date)

Workshop Chair:
===============

Mats Carlsson    matsc-02ecni/8Nmo@public.gmane.org

=========================================================================

_______________________________________________
logic-programming mailing list
logic-programming@...
http://lists.picat-lang.org/mailman/listinfo/logic-programming
_______________________________________________
Om-announce mailing list
Om-announce@...
http://openmath.org/mailman/listinfo/om-announce
Kashif Akhtar Saleem | 18 Jan 16:37 2015
Picon

IEEE Sensors Journal Top 25

Paper being one of the 25 most downloaded Sensors Journal papers in the months of June, July and August 2014.

 

Title: Empirical Studies of Bio-Inspired Self-Organized Secure Autonomous Routing Protocol

 

http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6749271&queryText%3DEmpirical+Studies+of+Bio-Inspired+Self-Organized+Secure+Autonomous+Routing+Protocol

 

Code available via https://code.google.com/p/biosarp/

 

Queries are welcome.



Disclaimer:
This communication is intended for the above named person and is confidential and / or legally privileged. Any opinion(s) expressed in this communication are not necessarily those of KSU (King Saud University). If it has come to you in error you must take no action based upon it, nor must you print it, copy it, forward it, or show it to anyone. Please delete and destroy the e-mail and any attachments and inform the sender immediately. Thank you.
KSU is not responsible for the political, religious, racial or partisan opinion in any correspondence conducted by its domain users. Therefore, any such opinion expressed, whether explicitly or implicitly, in any said correspondence is not to be interpreted as that of KSU.
KSU may monitor all incoming and outgoing e-mails in line with KSU business practice. Although KSU has taken steps to ensure that e-mails and attachments are free from any virus, we advise that, in keeping with best business practice, the recipient must ensure they are actually virus free.
_______________________________________________
Om-announce mailing list
Om-announce@...
http://openmath.org/mailman/listinfo/om-announce
jun sun | 21 Jan 02:56 2015
Picon

TASE 2015: Call for Paper, Nanjing 12 - 14 September

                   TASE 2015 - Preliminary CALL FOR PAPERS

******************************************************************
                The 9th International Symposium on
           Theoretical Aspects of Software Engineering
                           (TASE 2015)
                12-14 September 2015, Nanjing, China
                  http://tase2015.nuaa.edu.cn

        For more information email: tase2015-bC77Qfv0vuxrovVCs/uTlw@public.gmane.org
******************************************************************

--------
OVERVIEW
--------
The 9th Theoretical Aspects of Software Engineering Conference (TASE 2015) will be held in Nanjing, China in September, 2015.

Modern society is increasingly dependent on software systems that are becoming larger and more complex. This poses new challenges to the various aspects of software engineering, for instance, software dependability in trusted computing, interaction with physical components in cyber physical systems, distribution in cloud computing applications, etc. Hence, new concepts and methodologies are required to enhance the development of software engineering from theoretical aspects. TASE 2015 aims to provide a forum for people from academia and industry to communicate their latest results on theoretical advances in software engineering. 

TASE 2015 is the 9th in the TASE series. The past TASE symposiums were successfully held in Shanghai ('07), Nanjing ('08), Tianjin ('09), Taipei ('10), Xi'an ('11), Beijing ('12), Birmingham ('13), Changsha('14).The proceedings of the TASE 2015 symposium are planned to be published by the IEEE Computer Society Press. 

------
TOPICS
------
The symposium is devoted to theoretical aspects of software engineering. Topics of interest include, but are not limited to:

* Requirements Engineering 
* Specification and Verification 
* Program Analysis 
* Software Testing
* Model-Driven Engineering 
* Software Architectures and Design
* Aspect and Object Orientation
* Embedded and Real-Time Systems
* Software Processes and Workflows
* Component-Based Software Engineering
* Software Safety, Security and Reliability 
* Reverse Engineering and Software Maintenance
* Service-Oriented and Cloud Computing 
* Semantic Web and Web Services
* Type System and Theory 
* Program Logics and Calculus
* Probability in Software Engineering

----------
SUBMISSION
----------
Submission should be done through the TASE 2015 submission page, handled by the EasyChair conference system:


As in previous years, the proceedings of the conference are planned to be published by the IEEE Computer Society Press. Papers must be written in English and not exceed 8 pages in Two-Column IEEE format

---------------
IMPORTANT DATES
---------------
Abstract submission:  7  March 2015 (23h59 GMT)
Paper submission:    14  March 2015 (23h59 GMT)
Notification:        23  May   2015
Camera-ready:        13  June  2015
Conference:          12-14 September 2015


-------------
GENERAL CHAIR
-------------
Jifeng He         (East China Normal University, China)

-----------------
PROGRAM CO-CHAIRS
-----------------
Zhiqiu Huang      (Nanjing University of Aeronautics and Astronautics, China)
Jun Sun           (Singapore University of Technology and Design)

-----------------
STEERING COMMITTE
-----------------
Keijiro Araki     (Kyushu University, Japan)
Shengchao Qin     (Teesside University, UK)
Jifeng He         (East China Normal University, China) 
Huibiao Zhu       (East China Normal University, China)
Michael Hinchey   (Lero, Ireland)

-----------------
PROGRAM COMITTIEE
-----------------
TBA

----------------
ORGANIZING CHAIR
----------------
Ou Wei            (Nanjing University of Aeronautics and Astronautics, China)

----------------
PUBLICITY CHAIRS
----------------
Jun Hun           (Nanjing University of Aeronautics and Astronautics, China)
Yu Zhou           (Nanjing University of Aeronautics and Astronautics, China)
Jun Pang          (University of Luxembourg)

_______________________________________________
Om-announce mailing list
Om-announce@...
http://openmath.org/mailman/listinfo/om-announce
GRLMC | 18 Jan 08:47 2015

BigDat 2015: early registration deadline 23 January

*To be removed from our mailing list, please respond to this message with
UNSUBSCRIBE in the subject line*

*****************************************************

INTERNATIONAL WINTER SCHOOL ON BIG DATA

BigDat 2015

Tarragona, Spain

January 26-30, 2015

Organized by
Rovira i Virgili University

http://grammars.grlmc.com/bigdat2015/

*****************************************************

--- Early registration deadline: January 23, 2015 ---

*****************************************************

AIM:

BigDat 2015 is a research training event for graduates and postgraduates in
the first steps of their academic career. It aims at updating them about the
most recent developments in the fast developing area of big data, which
covers a large spectrum of current exciting research, development and
innovation with an extraordinary potential for a huge impact on scientific
discoveries, medicine, engineering, business models, and society itself.
Renowned academics and industry pioneers will lecture and share their views
with the audience.

All big data subareas will be displayed, namely: foundations,
infrastructure, management, search and mining, security and privacy, and
applications. Main challenges of analytics, management and storage of big
data will be identified through 4 keynote lectures, 22 six-hour courses, and
1 round table, which will tackle the most lively and promising topics. The
organizers believe outstanding speakers will attract the brightest and most
motivated students. Interaction will be a main component of the event.

ADDRESSED TO:

Graduate and postgraduates from around the world. There are no formal
pre-requisites in terms of academic degrees. However, since there will be
differences in the course levels, specific knowledge background may be
required for some of them.

BigDat 2015 is also appropriate for more senior people who want to keep
themselves updated on recent developments and future trends. They will
surely find it fruitful to listen and discuss with major researchers,
industry leaders and innovators.

REGIME:

In addition to keynotes, 3 courses will run in parallel during the whole
event. Participants will be able to freely choose the courses they will be
willing to attend as well as to move from one to another.

VENUE:

BigDat 2015 will take place in Tarragona, located 90 kms. to the south of
Barcelona. The venue will be:

Campus Catalunya
Universitat Rovira i Virgili
Av. Catalunya, 35
43002 Tarragona

KEYNOTE SPEAKERS:

Ian Foster (Argonne National Laboratory), Taming Big Data: Accelerating
Discovery via Outsourcing and Automation

Geoffrey C. Fox (Indiana University, Bloomington), Mapping Big Data
Applications to Clouds and HPC

C. Lee Giles (Pennsylvania State University, University Park), Scholarly Big
Data: Information Extraction and Data Mining

William D. Gropp (University of Illinois, Urbana-Champaign), Using MPI I/O
for Big Data

COURSES AND PROFESSORS:

Hendrik Blockeel (KU Leuven), [intermediate] Decision Trees for Big Data
Analytics

Diego Calvanese (Free University of Bozen-Bolzano),
[introductory/intermediate] End-User Access to Big Data Using Ontologies

Jiannong Cao (Hong Kong Polytechnic University), [introductory/intermediate]
Programming with Big Data

Edward Y. Chang (HTC Corporation, New Taipei City), [introductory/advanced]
Big Data Analytics: Architectures, Algorithms, and Applications

Ernesto Damiani (University of Milan), [introductory/intermediate] Process
Discovery and Predictive Decision Making from Big Data Sets and Streams

Gautam Das (University of Texas, Arlington), [intermediate/advanced] Mining
Deep Web Repositories

Maarten de Rijke (University of Amsterdam), tba

Geoffrey C. Fox (Indiana University, Bloomington), [intermediate] Using
Software Defined Systems to Address Big Data Problems

Minos Garofalakis (Technical University of Crete, Chania)
[intermediate/advanced], Querying Continuous Data Streams

Vasant G. Honavar (Pennsylvania State University, University Park)
[introductory/intermediate], Learning Predictive Models from Big Data

Tao Li (Florida International University, Miami),
[introductory/intermediate] Data Mining Techniques to Understand Textual
Data

Kwan-Liu Ma (University of California, Davis), [intermediate] Big Data
Visualization

Christoph Meinel (Hasso Plattner Institute, Potsdam),
[introductory/intermediate] New Computing Power by In-Memory and Multicore
to Tackle Big Data

Manish Parashar (Rutgers University, Piscataway), [intermediate] Big Data
Challenges in Simulation-based Science

Srinivasan Parthasarathy (Ohio State University, Columbus), [intermediate]
Scalable Data Analysis

Evaggelia Pitoura (University of Ioannina), [introductory/intermediate]
Online Social Networks

Vijay V. Raghavan (University of Louisiana, Lafayette),
[introductory/intermediate] Visual Analytics of Time-evolving Large-scale
Graphs

Pierangela Samarati (University of Milan), [intermediate], Data Security and
Privacy in the Cloud

Peter Sanders (Karlsruhe Institute of Technology),
[introductory/intermediate] Algorithm Engineering for Large Data Sets

Johan Suykens (KU Leuven), [introductory/intermediate] Fixed-size Kernel
Models for Big Data

Domenico Talia (University of Calabria, Rende), [intermediate] Scalable Data
Mining on Parallel, Distributed and Cloud Computing Systems

Jieping Ye (Arizona State University, Tempe), [introductory/advanced]
Large-Scale Sparse Learning and Low Rank Modeling

ORGANIZING COMMITTEE:

Adrian Horia Dediu (Tarragona)
Carlos Martín-Vide (Tarragona, chair)
Florentina Lilica Voicu (Tarragona)

REGISTRATION:

It has to be done at

http://grammars.grlmc.com/bigdat2015/registration.php 

The selection of up to 8 courses requested in the registration template is
only tentative and non-binding. For the sake of organization, it will be
helpful to have an approximation of the respective demand for each course.

Since the capacity of the venue is limited, registration requests will be
processed on a first come first served basis. The registration period will
be closed and the on-line registration facility disabled when the capacity
of the venue will be complete. It is much recommended to register prior to
the event.

FEES:

As far as possible, participants are expected to stay full-time. Fees are a
flat rate covering the attendance to all courses during the week. There are
several early registration deadlines. Fees depend on the registration
deadline.

ACCOMMODATION:

Suggestions of accommodation are available on the webpage.

CERTIFICATE:

Participants will be delivered a certificate of attendance.

QUESTIONS AND FURTHER INFORMATION:

florentinalilica.voicu@... 

POSTAL ADDRESS:

BigDat 2015
Lilica Voicu
Rovira i Virgili University
Av. Catalunya, 35
43002 Tarragona, Spain

Phone: +34 977 559 543
Fax: +34 977 558 386

ACKNOWLEDGEMENTS:

Universitat Rovira i Virgili

---
Este mensaje no contiene virus ni malware porque la protección de avast! Antivirus está activa.
http://www.avast.com

Gmane