Wenjun Jiang (姜文君 | 27 Mar 05:07 2015

TSP 2015 Call for Papers:The Fifth International Symposium on Trust, Security and Privacy for Emerging Applications,Zhangjiajie, China, November 18-20, 2015

TSP 2015 | Call for Papers
The Fifth International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2015)
Zhangjiajie, China, November 18-20, 2015

Authors of selected, high-quality papers of the symposium would be invited to submit their improved
versions to one of SCI & EI indexed  Special Issues (confirmed), including:
(1) Information Sciences - Elsevier (SCI&EI Indexed, Impact Factor: 3.893, 5-Year Impact Factor: 3.969)
(2) Mobile Information Systems - Hindawi (SCI&EI Indexed, Impact Factor: 1.789)
(3) IEICE Transactions on Information and Systems (SCI&EI Indexed, Impact Factor: 0.191)
(4) International Journal of Computational Science and Engineering (IJCSE) - INDERSCIENCE (EI Indexed)
(5) International Journal of Embedded Systems (IJES) - INDERSCIENCE (EI Indexed)
(6) International Journal of High Performance Computing and Networking (IJHPCN) - INDERSCIENCE (EI Indexed)
In Conjunction with ICA3PP 2015 [http://trust.csu.edu.cn/conference/ICA3PP2015/]
Co-Located with IEEE PRDC 2015 [http://prdc.dependability.org/PRDC2015/index.html]
Hosted by:
College of Computer Science and Electronic Engineering, Hunan University, China
and Trusted Computing Institute, Central South University, China [http://trust.csu.edu.cn/]
Technical Sponsorship:
Springer Lecture Notes in Computer Science
TSP 2015 is a timely event that aims at bringing together researchers and practitioners in the world working on trust, security, and privacy
issues in  social networks, cloud computing, Internet of Things (IoT), wireless sensor networks, and other networking environments or system
applications; and providing a forum for them to present and discuss emerging ideas and trends in this highly challenging research area. 
Satisfying user requirements for trust, security and privacy in an efficient way is one of the first considerations for almost all emerging
applications, using emerging technologies such as pervasive computing, peer to peer computing, grid computing, cloud computing,
virtualization and, mobile and wireless technologies. Challenges arise as emerging applications evolve to provide more scalable and
comprehensive services. One of the biggest challenges is that traditional security technologies and measures may not meet user requirements
in open, dynamic, heterogeneous, and distributed computing environments. Therefore, we need to build networks and systems in which emerging
applications allow users to enjoy more scalable and comprehensive services while preserving trust, security and privacy at the same time.
Following the success of TSP 2008 in Shanghai, China during December 17-20, 2008, TSP-09 in Macau SAR, China, during October 12-14, 2009,
TSP-10 in Bradford, UK, during June 29-July 1, 2010, and TSP-13 in Zhangjiajie, China, during November 13-15, 2013, “The Fifth International
Symposium on Trust, Security and Privacy for Emerging Applications (TSP-15)” will be held in Zhangjiajie, China, during November 18-20, 2015,
in conjunction with “The 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015)."

Scope and Interests
TSP is an international symposium for presenting and discussing emerging ideas and trends, algorithms and applications, systems design
techniques, platforms and tools, as well as measurement assessment tools in all aspects of the trust, security, and privacy issues of
networks. Topics include, but are not limited to, the following research directions(1) TSP metrics, architectures, and models 
(1) TSP metrics, architectures, and models
(2) TSP in big data
(3) TSP in pervasive computing
(4) TSP in peer to peer computing
(5) TSP in social computing (online/mobile social networks)
(6) TSP in cloud computing
(7) TSP in mobile and wireless communications
(8) TSP in cyber-physical systems
(9) TSP in parallel and distributed systems
(10) TSP in e-commerce and e-government systems
(11) TSP in hardware and software co-design
(12) TSP in operating systems
(13) TSP in database systems
(14) TSP in virtualization technologies
(15) Privacy and anonymity technologies
(16) Risk analysis and management
(17) Reliability, dependability, and fault tolerance
(18) Network attacks and defenses
(19) Cryptography and security protocols
(20) Authentication, access control, and accounting

Submission and Publication Information
All papers in PDF format need to be submitted electronically through the symposium website
(https://easychair.org/conferences/?conf=TSP2015). Submitted papers must not substantially
overlap with papers that have been published or that are simultaneously
submitted to a journal or a conference with proceedings. Papers must be clearly presented in English,
must not exceed 10 pages (or 14 pages with the over length charge), including tables, figures,
references and appendixes, in Springer LNCS Format with PDF. The majority of papers that
finally appear in the symposium will likely be the result of the symposium solicitation. Papers will
be evaluated based on their originality, significance, relevance, and clarity of presentation assessed
by at least three reviewers from respective research areas.
Submission of a paper should be regarded as a commitment that, should the paper be accepted,
at least one of the authors will register and present the work at the conference. All accepted papers
will be published by Springer LNCS (EI-Indexed).

Important Dates
(1) Paper Submission Deadline:   May 15, 2015 (11:59 PM Beijing Time)
(2) Author Notification:  July 15, 2015
(3) Camera-Ready Paper Due:   September 15, 2015
(4) Conference Dates:                   November 18-20, 2015
Steering Chairs
Wenjun Jiang, Hunan University, China (Chair)
Laurence T. Yang, St. Francis Xavier University, Canada
Guojun Wang, Central South University, China
Minyi Guo, Shanghai Jiao Tong University, China
Jie Li, University of Tsukuba, Japan
Jianhua Ma, Hosei University, Japan
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Indrakshi Ray, Colorado State University, USA
Kouichi Sakurai, Kyushu University, Japan
Bhavani Thuraisingham, The University of Texas at Dallas, USA
Jie Wu, Temple University, USA
Yang Xiang, Deakin University, Australia
Kun Yang, University of Essex, UK
Wanlei Zhou, Deakin University, Australia

General Co-Chairs
Geyong Min, The University of Bradford, UK
Vijay Varadharajan, Macquarie University, Australia
Ryan K. L. Ko, The University of Waikato, New Zealand

Program Co-Chairs
Dr. Imad Jawhar, Associate Professor, United Arab Emirates University, UAE
Deqing Zou, Huazhong University of Science of Technology

Program Committee Members (In alphabetical order)
Abdallah Mhamed, TELECOM SudParis, France
Adrian Waller, Thales Research and Technology (UK) Ltd., UK
Alex Aravind, University of Northern British Columbia, Canada
Aloysius Cheang, Cloud Security Alliance, Singapore
Amiya Nayak, University of Ottawa, Canada
Anupam Chattopadhyay, RWTH, Germany
Baoliu Ye, Nanjing University, P. R. China
Bimal Roy, Indian Statistical Institute, India
Chang-Ai Sun, University of Science and Technology Beijing, P. R. China
Christian Callegari, The University of Pisa, Italy
Christopher Leckie, University of Melbourne, Australia
Christoph Sorge, University of Paderborn, Germany
Chunhua Su, JAIST, Japan
Dhiah el Diehn I. Abou-Tair, University of Siegen, Germany
Francis Bu Sung Lee, Nanyang Technological University, Singapore
Franco Chiaraluce, Polytechnical University of Marche (UVPM), Italy
Gang Pan, Zhejiang University, P. R. China
Georgios Kambourakis, University of the Aegean, Greece
Giovanni Livraga, Universita' degli Studi di Milano, Italy
Giovanni Russello, University of Auckland, New Zealand
Habtamu Abie, Norwegian Computing Center, Norway
Hai Jiang, Arkansas State University, USA
Haitao Lang, Beijing University of Chemical Technoloty
Hejun Wu, Sun Yat-Sen University, P. R. China
Imed Romdhani, Edinburgh Npier University, UK
Is-Haka Mkwawa, University of Plymouth, UK
Jianfeng Chu, Jilin University, China
Jianming Fu, Wuhan University, P. R. China
John A. Clark, University of York, UK
Joon S. Park, Syracuse University, USA
Jorde Forne, Universitat Politècnica de Catalunya (UPC), Spain
Juan Li, North Dakota State University, USA
Junzhao Du, Xidian University, P. R. China
Kannan Govindan, Samsung Research, India
Kenichi Takahashi, Tottori University, Japan
Lizhe Wang, Rochester Institute of Technology, USA
Luis Javier García Villalba, Complutense University of Madrid, Spain
Masakazu Soshi, Hiroshima City University, Japan
Melike Erol-Kantarci, University of Ottawa, Canada
Mingwu Zhang, Hubei University of Technology, China
Muneer Bani Yassein, Jordan University of Science and Technology, Jordan
Nils Gruschka, Fachhochschule Kiel, Germany
Peng Liu, Hangzhou Dianzi University, P. R. China
Pramode Verma, The University of Oklahoma-Tulsa, USA
Rajendra V. Boppana, UT San Antonio, USA
Ravi Jhawar, Università degli Studi di Milano, Italy
Ricardo Azevedo Pereira, Portugal Telecom Inovacao, Portugal
Robert C. H. Hsu, Chung Hua University, Taiwan
Roberto Di Pietro, Roma Tre University of Rome, Italy
Rongxing Lu, Nanyang Technological University, Singapore
Ruggero Donida Labati, Università degli Studi di Milano, Italy
Ruo Ando, NICT, Japan
Saad Bani Mohammad, Al al-Bayt University, Jordan
Salima Benbernou, Universite Paris Descartes, France
Sanjay Madria, Missouri University of Science and Technology, USA
Sheikh Mahbub Habib, TU Darmstadt, Germany
Sherali Zeadally, University of the District of Columbia, USA
Shucheng Yu, University of Arkansas at Little Rock, USA
Shui Yu, Deakin University, Australia
Sudip Chakraborty, Valdosta State University, USA
Sugang Xu, NICT, Japan
Tai-hoon Kim, Sungshin W. University, Korea
Tanya Ignatenko, Eindhoven University of Technology, The Netherlands
Toshihiro Yamauchi, Okayama University, Japan
Vincenzo Piuri, University of Milan, Italy
Volkmar Lotz, SAP Labs France, France
Willy Susilo, University of Wollongong, Australia
Xiaodong Lin, University of Ontario Institute of Technology, Canada
Xiaojun Hei, Huazhong University of Science and Technology, China
Xuanxia Yao, University of Science and Technology Beijing, China
Yanjiang Yang, Institute for Infocomm Research, Singapore
Yaxiong Zhao, Google Inc., USA
Yongdong Wu, Institute for Infocomm Research, Singapore
Yoshiaki Hori, Saga University, Japan
Yoshifumi UESHIGE, Nagasaki University, Japan
Yunsheng Wang, Kettering University, USA
Zhe Tang, Central South University, P. R. China

Publication Co-Chairs
Al-Sakib Khan Pathan, IIUM, Malaysia
Kejie Lu, University of Puerto Rico at Mayaguez, USA
Raja Naeem Akram, Edinburgh Napier, UK

Local Arrangement Co-Chairs
Fang Qi, Central South University, China
Qin Liu, Hunan University, China
Hongzhi Xu, Jishou University, China
Web Chair
Shan Peng, Central South University, China
Please email inquiries concerning TSP 2015 to:
Dr. Wenjun Jiang: wenjj8a AT 163 DOT com and the conference organizers ( tsp2015zhangjiajie AT gmail DOT com).
Homepage: https://sites.google.com/site/happywenjunjiang2012/ 
Please, accept our apologies in case of multiple copies of this CFP
Copyright <at> Trusted Computing Institute, CSU

Wenjun Jiang(姜文君),
School of Information Science and Engineering, 
Hunan University, Changsha, China.
Cellphone: 18684821531
Email: wenjj8a <at> gmail.comwenjj8a <at> 163.com

Om-announce mailing list
Fulvio Frati | 26 Mar 17:26 2015

Call for papers: 5th International Symposium on Cloud & Trusted Computing (C&TC 2015)

[Apologies if you receive multiple copies of this message]




5th International Symposium on Cloud Computing, Trusted Computing and

Secure Virtual Infrastructures -- Cloud and Trusted Computing (C&TC 2015)

October 26-28, 2015 -- Rhodes, Greece








Current and future software needs to remain focused towards the development and deployment of large and complex intelligent and networked information systems, required for internet-based and intranet-based systems in organizations. Today software covers a very wide range of application domains as well as technology and research issues. This has found realization through Cloud Computing. Vital element in such networked information systems are the notions of trust, security, privacy and risk management.


Cloud and Trusted Computing (C&TC 2015) is the 5th International Symposium on Cloud Computing, Trusted Computing and Secure Virtual Infrastructures, organized as a component conference of the OnTheMove Federated Conferences & Workshops. C&TC 2015 will be held in Rhodes, Greece.


The conference solicits submissions from both academia and industry presenting novel research in the context of Cloud Computing, presenting theoretical and practical approaches to cloud trust, security, privacy and risk management. The conference will provide a special focus on the intersection between cloud and trust bringing together experts from the two communities to discuss on the vital issues of trust, security, privacy and risk management in Cloud Computing. Potential contributions could cover new approaches, methodologies, protocols, tools, or verification and validation techniques. We also welcome review papers that analyze critically the current status of trust, security, privacy and risk management in the cloud. Papers from practitioners who encounter trust, security, privacy and risk management problems and seek understanding are also welcome.


Topics of interests of C&TC 2015 include, but are not limited to:



- Assurance Techniques

- Access Control, Authorization, and Authentication

- Cloud Computing with Autonomic and Trusted Environment

- Cryptographic Algorithms and Protocols

- Cyber Attack, Crime and Cyber War

- DRM, Watermarking Technology, IP Protection

- Emergency and Security Systems

- End-to-end security over complex cloud supply chain

- Forensics

- Human Interaction with Trusted and Autonomic Computing Systems

- Identity and Trust Management

- Multimedia Security Issues over Mobile and Wireless Clouds

- Network Security

- Networks of Trust, Clouds of Trust

- Privacy, Anonymity

- Privilege Management Infrastructure

- Reliable Computing and Trusted Computing

- Risk evaluation and Management

- Security, Dependability and Autonomic Issues in Ubiquitous Computing

- Security Models and Quantifications

- Self-protection and Intrusion-detection in Security

- Trust Evaluation and Prediction in Service-Oriented Environments

- Trust, Security, Privacy and Confidentiality

- Trusted Computing in virtualized environments

- Trusted P2P, Web Service, SoA, SaaS, EaaS, PaaS, XaaS

- Virus Detections and Anti-virus Techniques/Software



- Algorithms and Computations on Encrypted Data

- Big Data, Frameworks and Systems for Parallel and Distributed Computing

- Database as a Service, Multi-tenancy, Data management and analytics as a service

- Data Science and Scalable Machine Learning

- Elasticity and Scalability for Cloud Data Management Systems

- High Availability and Reliability

- Interoperability between Clouds

- New Protocols, Interfaces and Data Models for Cloud Databases

- Resource and Workload Management in Cloud Databases

- Service Level Agreements and Contracts

- Transactional Models for Cloud Databases, Consistency and Replication

- Virtualization and Cloud databases, Storage Structures and Indexing



- Autonomic Computing Theory, Models, Architectures and Communications

- Cloud Resource provisioning with QoS Guarantees

- Cloud Operation and Resource Management

- Cloud Performance Modeling and Benchmarks

- Datacenter Architecture and Management

- Formal methods and Tools for Cloud computing

- Infrastructures for Social Computing and Networking

- Software Architectures and Design for Trusted Emerging Systems

- Virtualized Computing Infrastructures



- Cloud Business Applications and Case Studies

- Clouds and Social Media, Network and Link Analysis

- Large Scale Cloud Applications, Reality Mining

- Mobile Cloud Services

- New Parallel / Concurrent Programming Models for Cloud Computing

- Pervasive / Ubiquitous Computing in the Cloud

- Reliability, Fault Tolerance, Quality-of-Service

- Service Level Agreements and Performance Measurement

- Service-Oriented Architectures, RESTful Services in Cloud Environments



Important Dates



- Abstract Submission Deadline: June 23, 2015

- Paper Submission Deadline: June 30, 2015

- Acceptance Notification: August 7, 2015

- Camera Ready Due: September 1, 2015

- Author Registration Due: September 1, 2015



Paper Submission




Full paper submissions to Cloud and Trusted Computing 2015 (C&TC 2015) must present original, highly innovative, prospective and forward-looking research in one or more of the themes given above. Full papers must break new ground, present new insight, deliver a significant research contribution and provide validated support for its results and conclusions. Successful submissions typically represent a major advance for the field of cloud computing, referencing and relating the contribution to existing research work, giving a comprehensive, detailed and understandable explanation of a system, study, theory or methodology, and support the findings with a compelling evaluation and/or validation. Each paper must be submitted as a single PDF file in Springer Lecture Notes in Computer Science format (not longer than 18 pages in length). Accepted regular papers will be included in the printed conference main proceedings and presented in the paper sessions. Submissions to C&TC 2015 must not be under review by any other conference or publication at any time during the C&TC review cycle, and must not be previously published or accepted for publication elsewhere.



Notes (not longer than 6 pages in length) must report new results and provide support for the results, as a novel and valuable contribution to the field – just like full papers. Notes are intended for succinct work that is nonetheless in a mature state ready for inclusion in archival proceedings. Notes will be held to the same standard of scientific quality as full papers, albeit for a shorter presentation, and must still state how they fit with respect to related work, and provide a compelling explanation and validation. Notes must be submitted as single PDF file in Springer Lecture Notes in Computer Science format. Accepted notes will be published in the conference main proceedings and will be presented in the paper sessions of the conference.


A selection of the best papers from Cloud and Trusted Computing 2015 will be published in a special issue of The International Journal of Computer Systems Science and Engineering.

Submissions are to be made to the submission web site available at http://www.onthemove-conferences.org/index.php/submitpaper



The paper and notes submission site giving all the relevant submission details is located at: http://www.onthemove-conferences.org/index.php/authors-kit/camconfpapers. Failure to comply with the formatting instructions for submitted papers or notes will lead to the outright rejection of the paper without review. Failure to commit to presentation at the conference automatically excludes a paper from the proceedings.



Program Chairs



- Claudio Agostino Ardagna, Universita' degli studi di Milano, Italy

- Meiko Jensen, Independent Centre for Privacy Protection Schleswig-Holstein, Germany



Advisory Committee



- Ernesto Damiani, Universita' degli studi di Milano, Italy

- Salim Hariri, The University of Arizona, USA

- Robert Meersman, Vrije Universiteit Brussel, Belgium

- Siani Pearson, HP Labs, UK



Program Committee





Marco Anisetti, Universita' degli Studi di Milano, Italy

Vijay Atluri, Rutgers University, USA

N. Balakrishnan, Indian Institute of Science, India

Endre Bangerter, Bern University of Applied Sciences, Switzerland       

Michele Bezzi, SAP, France

Bud Brugger, Fraunhofer IAO, Germany

Marco Casassa Mont, HP Labs, UK

David Chadwick, University of Kent, UK

Henry Chan, The Hong Kong Polytechnic University

Alfredo Cuzzocrea, University of Calabria, Italy

Ernesto Damiani, Università degli Studi di Milano, Italy

Stefan Dessloch, University of Kaiserslautern, Germany

Francesco Di Cerbo, SAP Labs, France

Scharam Dustdar, Technical University of Vienna, Austria

Stefanos Gritzalis, University of the Aegean, Greece

Nils Gruschka, FH Kiel, Germany

Marit Hansen, Unabhangiges Landeszentrum fur Datenschutz Schleswig-Holstein, Kiel, Germany

Ching Hsien Hsu, Chung Hua University, Taiwan

Patrick Hung, University of Ontario, Canada

Martin Jaatun, SINTEF ICT, Norway

Florian Kerschbaum, SAP, Germany

Ryan Ko, University of Waikato, New Zealand

Zhiqiang Lin, UT Dallas, USA

Luigi Lo Iacono, Cologne University of Applied Sciences, Germany

Gregorio Martinez, University of Murcia, Spain

Hadi Otrok, Khalifa University, Abu Dhabi, UAE

Smriti R. Ramakrishnan, Oracle Corporation, USA

Damien Sauveron, Universite' de Limoges, France

Jorg Schwenk, Ruhr-Universität Bochum, Germany

Russell Sears, Pure Storage, USA

Bhavani Thuraisingham, UT Dallas, USA

Luca Vigano', King's College London, UK



Publicity Chair



- Fulvio Frati, Universita' degli Studi di Milano, Italy


More information available at http://www.onthemove-conferences.org/index.php/cloud-trust-15



Om-announce mailing list
Dominik Herrmann | 27 Mar 09:43 2015

IFIP SEC 2015: Call for Participation / Early Bird until 2015-03-31


                       CALL FOR PARTICIPATION

                            IFIP SEC 2015

         30th IFIP TC-11 SEC 2015 International Information
                   Security and Privacy Conference

                  Hamburg, Germany, 26-28 May 2015


Early Registration until 31 March 2015
via https://ifipsec.org/2015/reg-index.php

The IFIP SEC conference is the flagship event of the International
Federation for Information Processing (IFIP) Technical Committee 11 on
Security and Privacy Protection in Information Processing Systems
(TC-11, www.ifiptc11.org). IFIP SEC 2015 is organized by and hosted at
the University of Hamburg, a vibrant harbor city in Northern Germany.
The program committee selected 42 out of 232 submissions, which present
novel research on various theoretical and practical aspects of security
and privacy protection in ICT systems.

- 42 paper presentations (14 sessions)
- Four co-located conferences/workshops
- Keynote and Award Sessions
- Reception, Gala Dinner and Social Event

- Privacy
- Web Security
- Access Control, Trust and Identity Management
- Network Security
- Security Management and Human Aspects of Security
- Software Security
- Applied Cryptography
- Mobile and Cloud Services Security
- Cyber-physical systems and Critical Infrastructures Security

The detailed program is available here:

IFIP WG 11.11 International Conference on Trust Management (IFIPTM)
IFIP WG 11.8 World Conference on Information Security Education (WISE)
IFIP WG 11.5 Workshop on IT Assurance & Control (27 May)
IFIP WG 11.1 Workshop on Information Security Management (29 May)

Details regarding all co-located events can be found here:

Kai Rannenberg (Goethe-Universitaet Frankfurt, DE)
Steven Furnell (Plymouth University, UK)

Hannes Federrath (University of Hamburg, DE)
Dieter Gollmann (Hamburg University of Technology, DE)

Dominik Herrmann (University of Hamburg, DE)

see https://ifipsec.org/2015/committees.php

For more information, please feel free to contact the chairs at
sec2015@... or visit https://ifipsec.org/2015/

We look forward to welcoming you in Hamburg!

Matthew England | 26 Mar 12:33 2015

[ISSAC-ANNOUNCE] ISSAC 2015: Call for Software Presentations


ISSAC 2015
Call for Software Presentations

International Symposium on Symbolic and Algebraic Computation
The University of Bath, Bath, UK, 6-9 July 2015


ISSAC, the International Symposium on Symbolic and Algebraic Computation, is the premier annual gathering of the Symbolic Mathematical Computation community to present and discuss new developments and original research results in symbolic and algebraic computation.

Software developers are invited to present new software for solving problems in symbolic and algebraic computation at ISSAC 2015. Presenters will be given 15 minutes to demonstrate their software to participants in a special session for software presentations. There will be 5 additional minutes between presentations for setup.

Please submit an extended abstract in PDF format describing your software and what you will present at ISSAC to Francois Boulier by email at


Please include in the subject heading ISSAC 2015 Software Presentation.  Please include a valid URL or contact address for obtaining the software packages and documentation.  The extended abstracts should be at most 4 pages when prepared using the CCA style files available from:


Abstracts will be evaluated based on content, novelty, originality, importance and the potential value of the software to the community. Please identify in your extended abstract what is new in your proposed ISSAC 2015 software presentation. If you are also submitting a related paper at ISSAC 2015, please identify, in your email, the differences between the two submissions. You may also present your software as a poster.

Extended abstracts of accepted software presentations will be printed in an issue of the ACM SIGSAM Communications in Computer Algebra. 


Software presentations can be on any topic mentioned in the Call for Papers of ISSAC 2015 which include but are not restricted to the following areas:

  * Algorithmic Mathematics: Algebraic, Symbolic and     Symbolic-Numeric Algorithms.

  * Computer Science: Theoretical and practical problems in Symbolic Computation.

  * Applications: Of Symbolic or Symbolic-Numeric algorithms in novel or essential ways, in Education, The Sciences, Engineering, or Business.

Important Dates

  Abstract submission (.pdf)                    May 8, 2015
  Notification of acceptance/rejection          May 22, 2015
  Final version (.tex) due                      June 12, 2015

Software Presentations Chair

   Bernard Mourrain (Inria Sophia Antipolis): software2015-qa6th/uj2ecVErMyI6klTEB+6BGkLq7r@public.gmane.org

To unsubscribe from the ISSAC-ANNOUNCE list, click the following link:

Om-announce mailing list
Daniel Bundala | 26 Mar 08:41 2015

VSTTE 15, Second Call for Papers

7th Working Conference on Verified Software: Theories, Tools, and Experiments
July 18 - 19, 2015
San Francisco, California, USA

Co-located with 25th Conference on Computer Aided Verification

Full Paper Submission Deadline: April 27, 2015


The Seventh Working Conference on Verified Software: Theories, Tools,
and Experiments follows a successful inaugural working conference at
Zurich in 2005 followed by conferences in Toronto (2008), Edinburgh
(2010), Philadelphia (2012), Atherton (2013), and Vienna (2014). The
goal of this conference is to advance the state of the art in the
science and technology of software verification, through the
interaction of theory development, tool evolution, and experimental

We welcome submissions describing significant advances in the
production of verified software, i.e., software that has been
proved to meet its functional specifications.  We are
especially interested in submissions describing large-scale
verification efforts that involve collaboration, theory unification,
tool integration, and formalized domain knowledge.  We welcome papers
describing novel experiments and case studies evaluating verification
techniques and technologies.  Topics of interest include education,
requirements modeling, specification languages,
specification/verification case-studies, formal calculi, software
design methods, automatic code generation, refinement methodologies,
compositional analysis, verification tools (e.g., static analysis, dynamic
analysis, model checking, theorem proving, satisfiability), tool
integration, benchmarks, challenge problems, and integrated
verification environments.


Papers will be evaluated by at least three members of the
Program Committee. We are accepting both long (limited to 16 pages)
and short (limited to 10 pages) paper submissions, written in English.
Short submissions also cover Verification Pearls describing an
elegant proof or proof technique.  Submitted research papers and
system descriptions must be original and not submitted for publication

Research paper submissions must be in LNCS format and must
include a cogent and self-contained description of the ideas, methods,
results, and comparison to existing work.  Submissions of theoretical,
practical, and experimental contributions are equally encouraged,
including those that focus on specific problems or problem domains.

Papers should be submitted through:

Submissions that arrive late, are not in the proper format, or are too
long will not be considered.  The post-conference proceedings of VSTTE
2015 will be published by Springer-Verlag in the LNCS series.  Authors
of accepted papers will be requested to sign a form transferring
copyright of their contribution to Springer-Verlag.  The use of LaTeX
and the Springer LNCS class files, obtainable


Accepted  papers will be  published as post-Proceedings, to
appear in Springer's Lectures Notes in Computer Science.


Abstract submission: April 20, 2015
Full paper submission: April 27, 2015
Notification: June 8, 2015

General Chair:          
Martin Schaef (SRI International)

Program Chairs: 
Arie Gurfinkel (Software Engineering Institute, Carnegie Mellon University)
Sanjit A. Seshia (University of California, Berkeley)

Publicity Chair:        
Daniel Bundala (UC Berkeley)

Elvira Albert (Complutense University of Madrid)
Nikolaj Bjorner (Microsoft Research)
Evan Chang (University of Colorado, Boulder)
Ernie Cohen (University of Pennsylvania)
Jyotirmoy Deshmukh (Toyota)
Jin Song Dong (National University of Singapore)
Vijay D'Silva (Google)
Vijay Ganesh (University of Waterloo)
Alex Groce (Oregon State)
Arie Gurfinkel (Software Engineering Institute, Carnegie Mellon University) (co-chair)
Bill Harris (Georgia Institute of Technology)
Chris Hawblitzel (Microsoft Research)
Bart Jacobs (Katholieke Universiteit Leuven, Belgium)
Susmit Jha (United Technologies)
Rajeev Joshi (Laboratory for Reliable Software, Jet Propulsion Laboratory)
Vladimir Klebanov, Karlsruhe Institute of Technology, DE
Akash Lal (Microsoft Research India)
Ruzica Piskac (Yale)
Zvonimir Rakamaric (University of Utah)
Kristin Yvonne Rozier (University of Cincinnati)
Sanjit A. Seshia (UC Berkeley) (co-chair)
Natarajan Shankar (SRI)
Carsten Sinz (KIT)
Nishant Sinha (IBM Research Labs)
Alexander Summers (ETH Zurich)
Zachary Tatlock (University of Washington)
Sergey Tverdyshev (Sysgo AG)
Arnaud Venet (CMU / NASA Ames Research Center)
Karen Yorav (IBM Haifa Research Lab)

Please contact vstte2015-bC77Qfv0vuxrovVCs/uTlw@public.gmane.org  for further information
Om-announce mailing list
Maurizio Proietti | 26 Mar 14:47 2015

LOPSTR 2015, Siena (Italy): Last call for papers

============================================================ 25th International Symposium on Logic-Based Program Synthesis and Transformation LOPSTR 2015 Special Issue of Formal Aspects of Computing http://alpha.diism.unisi.it/lopstr15/ University of Siena, Siena, IT, July 13-15, 2015 (co-located with PPDP 2015) DEADLINES Abstract submission: April 6, 2015 Paper/Extended abstract submission: April 13, 2015 ============================================================ The aim of the LOPSTR series is to stimulate and promote international research and collaboration on logic-based program development. LOPSTR is open to contributions in logic-based program development in any language paradigm. LOPSTR has a reputation for being a lively, friendly forum for presenting and discussing work in progress. Formal proceedings are produced only after the symposium so that authors can incorporate this feedback in the published papers. The 25th International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR 2015) will be held at the University of Siena, Siena, Italy; previous symposia were held in Canterbury, Madrid, Leuven, Odense, Hagenberg, Coimbra, Valencia, Lyngby, Venice, London, Verona, Uppsala, Madrid, Paphos, London, Venice, Manchester, Leuven, Stockholm, Arnhem, Pisa, Louvain-la-Neuve, and Manchester. LOPSTR 2015 will be co-located with PPDP 2015 (International Symposium on Principles and Practice of Declarative Programming). Topics of interest cover all aspects of logic-based program development, all stages of the software life cycle, and issues of both programming-in-the-small and programming-in-the-large. Both full papers and extended abstracts describing applications in these areas are especially welcome. Contributions are welcome on all aspects of logic-based program development, including, but not limited to: * synthesis * transformation * specialization * composition * optimization * inversion * specification * analysis and verification * testing and certification * program and model manipulation * transformational techniques in SE * applications and tools Survey papers that present some aspects of the above topics from a new perspective, and application papers that describe experience with industrial applications are also welcome. Papers must describe original work, be written and presented in English, and must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal, conference, or workshop with refereed proceedings. Work that already appeared in unpublished or informally published workshop proceedings may be submitted (please contact the PC chair in case of questions). Important Dates Abstract submission: April 6, 2015 Paper/Extended abstract submission: April 13, 2015 Notification: May 25, 2015 Camera-ready (for electronic pre-proceedings): June 15, 2015 Symposium: July 13-15, 2015 Submission Guidelines Authors should submit an electronic copy of the paper (written in English) in PDF, formatted in the Lecture Notes in Computer Science style. Each submission must include on its first page the paper title; authors and their affiliations; contact author's email; abstract; and three to four keywords which will be used to assist the PC in selecting appropriate reviewers for the paper. Page numbers should appear on the manuscript to help the reviewers in writing their report. Submissions cannot exceed 15 pages including references but excluding well-marked appendices not intended for publication. Reviewers are not required to read the appendices, and thus papers should be intelligible without them. Papers should be submitted via the Easychair submission website for LOPSTR 2015, which can be accessed through the website of LOPSTR 2015. Proceedings The formal post-conference proceedings will be published by Springer in the Lecture Notes in Computer Science series. Full papers can be directly accepted for publication in the formal proceedings, or accepted only for presentation at the symposium and inclusion in informal proceedings. After the symposium, all authors of extended abstracts and full papers accepted only for presentation will be invited to revise and/or extend their submissions in the light of the feedback solicited at the symposium. Then, after another round of reviewing, these revised papers may also be published in the formal proceedings. Special journal issue After the symposium, a selection of the best papers will be invited to a special issue of the 'Formal Aspects of Computing' journal. The submissions to the special issue must be substantial extensions of the proceedings versions and will undergo the usual journal reviewing process. Invited speakers Patrick Cousot, New York University, USA (Jointly with PPDP) Gilles Barthe, IMDEA Software Institute, Spain Dale Miller, INRIA and LIX/Ecole Polytechnique, France Program Committee Slim Abdennadher, German University of Cairo, Egypt Maria Alpuente, Universitat Politecnica de Valencia, Spain Demis Ballis, University of Udine, Italy Olaf Chitil, University of Kent, UK Michael Codish, Ben-Gurion University, Israel Moreno Falaschi, University of Siena, Italy (Program Chair) Jerome Feret, INRIA and ENS, France Maurizio Gabbrielli, University of Bologna, Italy Jurgen Giesl, RWTH Aachen University, Germany Miguel Gomez-Zamalloa, Complutense University of Madrid, Spain Arnaud Gotlieb, SIMULA Research Laboratory, Norway Gopal Gupta, University of Texas at Dallas, USA Manuel Hermenegildo, IMDEA, Spain Viktor Kuncak, EPFL Lausanne, Switzerland Luigi Liquori, INRIA Sophia-Antipolis Mediterranee, France Alexei Lisitsa, University of Liverpool, UK Narciso Marti-Oliet, Universidad Complutense de Madrid, Spain Jorge Navas, NASA, USA Kazuhiro Ogata, JAIST, Japan Carlos Olarte, ECT, Univ. Federal do Rio Grande do Norte, Brasil Catuscia Palamidessi, INRIA and Ecole Polytechnique, France Maurizio Proietti, IASI-CNR, Italy Albert Rubio, Universitat Politecnica de Catalunya, Barcelona, Spain Wim Vanhoof, University of Namur, Belgium Program and Symposium Chair: Moreno Falaschi, Dept. of Information Engineering and Mathematics, Univ. of Siena, Italy (moreno.falaschi-ymfxQW11/6A@public.gmane.org) Organizing Committee Monica Bianchini, DIISM, Univ. of Siena, Italy Sara Brunetti, DIISM, Univ. of Siena, Italy Andrea Machetti, DIISM, Univ. of Siena, Italy Simonetta Palmas, DIISM, Univ. of Siena, Italy Maurizio Proietti, IASI-CNR, Italy Simone Rinaldi, DIISM, Univ. of Siena, Italy Elisa Tiezzi, DIISM, Univ. of Siena, Italy Sara Ugolini, Dip. Informatica, Univ. of Pisa
Om-announce mailing list
YuHui Lin | 27 Mar 12:42 2015

AVoCS 2015: Second Call for Papers

                      SECOND CALL FOR PAPERS

              The 15th International Workshop on 
          Automated Verification of Critical Systems 
                        AVoCS 2015

             1-4 September 2015, Edinburgh, UK

                avocs2015 <at> easychair.org

  Submission of abstract for full papers: 5th June 2015
  Submission of full papers: 12th June 2015
  Notification (full papers): 14th July 2015
  Submission of research idea papers: 7th August 2015
  Notification (research idea): 14th August 2015
  Early registration: 18th August 2015
  Submissions of final versions: 21st August 2015 

  Colin O'Halloran (D-RisQ & the University of Oxford)
  Don Sannella (Contemplate & the University of Edinburgh)

  Formal Methods Europe (FME)
  The Scottish Informatics & Computer Science Alliance (SICSA)

  The aim of Automated Verification of Critical Systems (AVoCS) 2015 
  is to contribute to the interaction and exchange of ideas among members 
  of the international research community on tools and techniques for the 
  verification of critical systems. 

  The subject is to be interpreted broadly and inclusively. It covers 
  all aspects of automated verification, including model checking, 
  theorem proving, SAT/SMT constraint solving, abstract interpretation, 
  and refinement pertaining to various types of critical systems which 
  need to meet stringent dependability requirements (safety-critical, 
  business-critical, performance-critical, etc.). Contributions that 
  describe different techniques, or industrial case studies are encouraged. 

  The technical programme will consist of invited and contributed talks 
  and also allow for short presentations of research ideas. The workshop 
  will be relatively informal, with an emphasis on discussion where special 
  discussion sessions will be organised around the research ideas presentations. 
  Topics include (but are not limited to):
    - Model Checking
    - Automatic and Interactive Theorem Proving
    - SAT, SMT or Constraint Solving for Verification
    - Abstract Interpretation
    - Specification and Refinement
    - Requirements Capture and Analysis
    - Verification of Software and Hardware
    - Specification and Verification of Fault Tolerance and Resilience
    - Probabilistic and Real-Time Systems
    - Dependable Systems
    - Verified System Development
    - Industrial Applications

  AI4FM 2015: 1 September 2015 -- www.ai4fm.org/ai4fm-2015/

  The event will be held in the International Centre for Mathematical Sciences 
  (ICMS) in the centre of the historic old town of Edinburgh - an UNESCO world
  heritage site. 

  Thanks to sponsorships from FME and SICSA we can offer financial support for a 
  limited number of students registering for AVoCS in the form of a registration 
  fee waiver (full or partial). As this is limited, we ask the students that 
  would like to take the advantage of this support to submit a short application. 
  The details on how to apply will be available in due course from the AVoCS 

   Submissions of full papers to the workshop must not have been published 
   or be concurrently considered for publication elsewhere. All submissions 
   will be peer-reviewed and judged on the basis of originality, contribution 
   to the field, technical and presentation quality, and relevance to the 
   workshop. Submissions are handled via Easychair: 


   The papers must be written in English and not exceed 15 pages and should 
   use the dedicated AVoCS 2015 EASST template available rom the the 
   following link (for LaTeX and Word):


   AVoCS also encourages the submissions of research ideas in order to stimulate 
   discussions at the workshop. Reports on ongoing work or surveys on work 
   published elsewhere are welcome. The Programme Committee will select 
   research ideas on the basis of submitted abstracts according to significance 
   and general interest. Research ideas must be written in English and not exceed 
   2 pages using the EASST template. The presentation of these ideas will be organised 
   around discussions, where the presenter should also prepare a set of question in 
   which the audience will discuss.

  At the workshop, pre-proceedings will be available in the form of a Heriot-Watt 
  University Technical Report; this report will also include the research ideas.
  After the workshop, the authors of accepted full papers will have about one 
  month in order to revise their papers for publication in the workshop post-
  proceedings which will appear in the Electronic Communications of the EASST 
  Open Access Journal. Research ideas will not be part of the proceedings in the 
  Open Access Journal.

  Authors of a selection of the best papers presented at the workshop will be 
  invited to submit extended versions of their work for publication in a 
  special issue of Elsevier's journal Science of Computer Programming.

  Ernie Cohen, University of Pennsylvania, USA
  Ewen Denney, NASA Ames, USA
  Jean-Christophe Filliatre, CNRS, France
  Michael Goldsmith, University of Oxford, UK
  Gudmund Grov, Heriot-Watt University, UK (co-chair)
  Keijo Heljanko, Aalto University, Finland
  Mike Hinchey, University of Limerick, Ireland
  Marieke Huisman, University of Twente, Netherlands
  Andrew Ireland, Heriot-Watt University, UK (co-chair)
  Gerwin Klein, NICTA/UNSW, Australia
  Thierry Lecomte, ClearSy, France
  Peter Gorm Larsen, Aarhus University, Denmark 
  Panagiotis (Pete) Manolios, Northeastern University, USA
  Stephan Merz, INRIA Nancy & LORIA, France
  Jaco van de Pol, University of Twente, Netherlands
  Markus Roggenbach, Swansea University, UK
  Marco Roveri, FBK, Italy
  Thomas Santen, Microsoft Research, Germany
  Bernard Steffen, Technical University Dortmund, Germany
  Jan Strejček, Masaryk University, Czech Republic
  Jun Sun, Singapore University of Technology and Design, Singapore
  Tayssir Touili, LIAFA, CNRS & University Paris Diderot, France
  Helen Treharne, University of Surrey, UK
  Laurent Voisin, Systerel, France
  Angela Wallenburg, Altran, UK
  John Wickerson, Imperial College London, UK
  Peter Ölveczky, University of Oslo, Norway

  Gudmund Grov, Heriot-Watt University, UK
  Andrew Ireland, Heriot-Watt University, UK
  Yuhui Lin, Heriot-Watt University, UK (Local arrangements and publicity chair)

  Michael Goldsmith, University of Oxford, UK
  Stephan Merz, INRIA Nancy & LORIA, France
  Markus Roggenbach, Swansea University, UK

We invite research leaders and ambitious early career researchers to 
join us in leading and driving research in key inter-disciplinary themes. 
Please see www.hw.ac.uk/researchleaders for further information and how
to apply.

Heriot-Watt University is a Scottish charity
registered under charity number SC000278.

Om-announce mailing list
Om-announce <at> openmath.org
Geoff Sutcliffe | 26 Mar 15:30 2015

Verification Mentoring Workshop Student Scholarships

Verification Mentoring Workshop 2015: 
CALL for Applications for Student Travel Scholarships 

We are organizing a new one-day workshop called the Verification Mentoring 
Workshop (VMW). It is co-located with the International Conference on Computer 
Aided Verification (CAV), to be held in San Francisco, July 18-24, 2015. CAV 
is a premier conference in the area of verification, dedicated to the 
advancement of the theory and practice of computer-aided formal analysis 
methods for hardware and software systems.

The goal of VMW is to attract early-stage graduate students to pursue research 
careers in the area of computer-aided verification and formal methods.  Invited 
talks at the workshop will cover a broad overview of research topics in the 
area (so students can follow sessions of interest at CAV), the range of career 
options and perspectives (academia, industry, research labs, etc.), and job 
search advice (especially from young researchers). Participation of women and 
under-represented minorities is especially encouraged. 

We will provide travel scholarships to student participants, where the 
scholarships will cover registration for the VMW workshop and CAV conference, 
accommodations, plus travel expenses. The workshop website 
(http://i-cav.org/2015/workshop-mentorship/) is now accepting applications for 
student travel scholarships. 

Important Dates:
Deadline for submission of applications: April 20, 2015
Notification of travel scholarships awarded: May 1, 2015
VMW Workshop: July 19, 2015
CAV Conference: July 20 - 24, 2015

VMW 2015 is partially supported by the NSF (National Science Foundation, USA). 
More details on the VMW workshop and CAV conference can be found at 

Organizers of VMW 2015:
Aarti Gupta, Princeton, USA
Rupak Majumdar, Max Plank Institute for Software Systems, Germany
Corina Pasareanu, NASA/CMU, USA
Ruzica Piskac, Yale, USA
SECRYPT 2015 | 25 Mar 17:35 2015

Call for position papers - 12th International Conference on Security and Cryptography (SECRYPT 2015)


12th International Conference on Security and Cryptography (SECRYPT 2015)
Colmar, France, 20-22 July 2015

The 12th International Conference on Security and Cryptography
(SECRYPT 2015) to be held in Colmar, France, 20-22 July 2015, is now
welcoming the submission of position papers whose deadline is
scheduled for April 15, 2015.

A position paper presents results that are preliminary or that simply
require fewer pages to describe. A position paper may be a short
report and discussion of ideas, facts, situations, methods, procedures
or results of scientific research (theoretical or experimental) on one
of the conference topics.

The conference topics include, but are not limited to:

Access Control
Applied Cryptography
Biometrics Security and Privacy
Critical Infrastructure Protection
Data Integrity
Data Protection
Database Security and Privacy
Digital Forensics
Digital Rights Management
Ethical and Legal Implications of Security and Privacy
Formal Methods for Security
Human Factors and Human Behavior Recognition Techniques
Identification, Authentication and Non-repudiation
Identity Management
Information Hiding
Information Systems Auditing
Insider Threats and Countermeasures
Intellectual Property Protection
Intrusion Detection & Prevention
Management of Computing Security
Network Security
Organizational Security Policies
Peer-to-Peer Security
Personal Data Protection for Information Systems
Privacy Enhancing Technologies
Reliability and Dependability
Risk Assessment
Secure Software Development Methodologies
Security and privacy in Complex Systems
Security and Privacy in Crowdsourcing
Security and Privacy in IT Outsourcing
Security and Privacy in Location-based Services
Security and Privacy in Mobile Systems
Security and Privacy in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grids
Security and Privacy in Social Networks
Security and Privacy in the Cloud
Security and Privacy in Web Services
Security and Privacy Policies
Security Area Control
Security Deployment
Security Engineering
Security in Distributed Systems
Security Information Systems Architecture
Security Management
Security Metrics and Measurement
Security Protocols
Security requirements
Security Verification and Validation
Sensor and Mobile Ad Hoc Network Security
Service and Systems Design and QoS Network Security
Software Security
Trust management and Reputation Systems
Ubiquitous Computing Security
Wireless Network Security

Submitted papers must be in English and must not substantially overlap
with papers that have been published or that are simultaneously
submitted to a journal or a conference with proceedings. Submissions
are to be made to the submission web site at

Submitted papers must be formatted according to the SECRYPT format,
which is described at http://secrypt.icete.org/GuidelinesTemplates.aspx.
After a double-blind peer review, qualifying Position Papers will be
accepted as Short Papers. Submission page limit is 8 pages. Accepted
position papers will be then subject to the limit of: 8 pages for
short papers with oral presentation, and 6 pages for short papers with
poster presentation. Authors of accepted papers must guarantee that
their papers will be presented at the conference. All papers presented
in the conference will be published in the conference proceedings and
in the digital library.


- Paper Submission: April 15, 2015 (11:59 PM American Samoa time)
- Authors Notification: May 19, 2015
- Camera Ready and Registration: June 1, 2015

Pierangela Samarati, Universita' degli Studi di Milano, Italy

Alessandro Armando, FBK, Italy
Reza Azarderakhsh, Rochester Institute of Technology, United States
Prithvi Bisht, Adobe, United States
Carlo Blundo, Universita' di Salerno, Italy
Andrey Bogdanov, Technical University of Denmark, Denmark
Francesco Buccafurri, University of Reggio Calabria, Italy
Sherman S. M. Chow, Chinese University of Hong Kong, Hong Kong
Frederic Cuppens, TELECOM Bretagne, France
Nora Cuppens-Boulahia, Institut Mines Telecom / Telecom Bretagne, France
Jun  Dai, California State University at Sacramento, United States
Sabrina De Capitani di Vimercati, Universita' degli Studi di Milano, Italy
Roberto Di Pietro, Universita' di Roma Tre, Italy
Tassos Dimitriou, Computer Technology Institute, Greece and Kuwait
University, Kuwait 
Ruggero Donida Labati, Universita' degli Studi di Milano, Italy
Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
Bao Feng, Security and Privacy Lab, Huawei, Singapore
Alberto Ferrante, Universita' della Svizzera italiana, Switzerland
Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain
William M. Fitzgerald, United Technologies Research Center Ireland
(UTRCI), Ireland 
Sara Foresti, Universita' degli Studi di Milano, Italy
Steven Furnell, Plymouth University, United Kingdom
Joaquin Garcia-Alfaro, Institut Mines-Telecom, TELECOM SudParis, France
Dieter Gollmann, Tu Hamburg-Harburg, Germany
Mark Gondree, Naval Postgraduate School, United States
Dimitris A. Gritzalis, Athens University of Economics & Business, Greece
Sotiris Ioannidis, Foundation for Research and Technology - Hellas, Greece
Wael Kanoun, Bell Labs, France
Sokratis Katsikas, University of Piraeus, Greece
Florian Kerschbaum, SAP, Germany
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Costas Lambrinoudakis, University of Piraeus, Greece
Adam Lee, University of Pittsburgh, United States
Patrick P. C. Lee, The Chinese University of Hong Kong, Hong Kong
Albert Levi, Sabanci University, Turkey
Ming Li, Utah State University, United States
Jiguo Li, Hohai University, China
Peng Liu, Penn. State University, United States
Giovanni Livraga, Universita degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Haibing Lu, Santa Clara University, United States
Emil Lupu, Imperial College London, United Kingdom
Olivier Markowitch, Universite' Libre de Bruxelles, Belgium
Fabio Martinelli, IIT-CNR, Italy
Vashek Matyas, Masaryk University, Czech Republic
Carlos Maziero, UTFPR - Federal University of Technology - Paraná state,
Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan
Mehran Mozaffari-Kermani, Rochester Institute of Technology, United States
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, University of Bergamo, Italy
Joon Park, Syracuse University, United States
Gerardo Pelosi, Politecnico di Milano, Italy
Gunther Pernul, University of Regensburg, Germany
Joachim Posegga, Institute of IT Security and Security Law, Germany
Silvio Ranise, Fondazione Bruno Kessler, Italy
Kui Ren, state university of new york at buffalo, United States
Andreas Schaad, Huawei Research, Germany
Daniele Sgandurra, Imperial College, London, United Kingdom
Nicolas Sklavos, Technological Educational Institute of Western Greece,
Einar Snekkenes, Gjøvik University College, Norway
Alessandro Sorniotti, IBM Research - Zurich, Switzerland
Willy Susilo, University of Wollongong, Australia
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Vicenc Torra, U. of Skövde, Sweden
Jaideep Vaidya, Rutgers Business School, United States
Luca Vigano’, University of Verona, Italy
Haining Wang, The College of William and Mary, United States
Xinyuan (Frank) Wang, George Mason University, United States
Ping Wang, Symantec Corporation, United States
Cong Wang, City University of Hong Kong, Hong Kong
Lingyu Wang, Concordia University, Canada
Edgar Weippl, SBA Research / TU Wien, Austria
Meng Yu, Virginia Commonwealth University, United States
Lei Zhang, Thomson Reuters, United States
Hang Zhao, Columbia University, United States
Jianying Zhou, Institute for Infocomm Research, Singapore

For any questions, please contact the program chair:
secrypt2015 <at> unimi.it

Om-announce mailing list
Om-announce <at> openmath.org

Call for Book Chapters - Springer “Internet of Things (IoT) in 5G Mobile Technologies”

**** Apologies for cross-posting ****

[This CFC can also be found in pdf format at:  http://www.cs.unic.ac.cy/cmavrom/SpringerBook_CFC_fin2015.pdf]

Call for Book Chapters for the Springer-Verlag Handbook:

“Internet of Things (IoT) in 5G Mobile Technologies”



Constandinos X. Mavromoustakis, University of Nicosia, Cyprus

George Mastorakis, Technological Educational Institute of Crete, Greece

Jordi Mongay Batalla, National Institute of Telecommunications, Poland


As an increasing number of people communicate and collaborate over the Internet, via different accessing systems and mobile devices, the need for new wireless networks infrastructures, facilitating ubiquitous availability and efficient access to large quantities of distributed resources, has become manifest. The integration of resources availability through the 3As (Anywhere, Anything, Anytime) will become a reality, through the 5G mobile technologies. Notwithstanding, there are a lot of challenges to meet, in order to have the 5G mobile technologies applicable in an efficiently utilized manner. The most complicated and at the same time challenging paradigm is the Internet of Things (IoT) that poses a fertile ground and a hot Research and Development (R&D) area for Pervasive and Ubiquitous computing, being projected as a future growth area in both academia and industry. In this context, this book aims at presenting the current state-of-the-art research and future trends on various aspects of IoT in 5G mobile technologies. It will combine the emerging mobile communications and IoT paradigms, in a common research ground, in order to present various research concepts. The major subjects of the book will cover methodologies, modeling, analysis and newly introduced mobile technologies.

Topics of interest include but are not limited to:

       Machine-to-Machine (M2M) Data Processing and Controlling Networking at the Edge (Sensing and sensor signal processing, sensor networking protocols, energy harvesting and energy management);

     Middleware (System and network architectures, middleware for heterogeneous sensors, devices & protocols, QoS provisioning, security issues [data confidentiality, integrity, network resilience, etc.]);

        Applications and case studies of M2M communications and IoT ecosystems;

    Analytics and management (Data management and analytics: data-stream, sharing, mining etc, business intelligence from sensor data, social network analysis in IoT)

        M2M Infrastructure (Big Data Storage and processing, management and analysis, back-end (cloud based) infrastructure, distributed processing);

     Related applications (Novel application developments and case studies in energy, healthcare, logistics and transportation, manufacturing etc., test-beds and field trials etc.);

     IoT/MP2M/M2M/D2D Management (Device management evolutions, self-coordinated and autonomous management, service harmonization etc.);

         Security in Smart Grids and Smart Spaces for smooth IoT deployment in 5G

         Advanced indexing, naming, and addressing of the IoT in 5G;

        Network-distributed signal processing for security solutions in 5G (joint security and privacy aware protocol design, Test-bed and performance metrics of security solutions in IoT, Deployment and performance evaluation of secure IoT in 5G, Architectures for secure hardware/software IoT systems etc.);

          Network control systems for IoT applications;

       Inter-networking with other technologies and systems (Network Functions Virtualization (NFV) and Cloud Computing as well Mobile Cloud Computing implementation/wearable devices in IoT using 5G etc.);

     Next generation of open platforms and novel hardware for the IoT in 5G access technology, Network middleware and protocols to facilitate Smart environments, Innovative sensing devices and innovative uses of existing sensors (e.g. RFID), use of mobile, wireless, visual, and multi-modal sensor networks in intelligent systems;

    Smart Devices and their inter-communication with other devices/spaces (ie. smart glasses’ communication with smart watch and/or smart wearable devices, Grid and Cloud-oriented devices etc.) including open interfaces and close environments;

         Management of smart services (discovery, publishing) in IoT ecosystems (smart shopping, house, factory, etc.);

         Interconnection of IoT with social network environments (Multimedia transmission, Big data transfer);

         Performance and scalability issues of IoT ecosystems.

We strongly welcome other topic suggestions, dealing with IoT in emerging mobile computing environments.

Sections of the above mentioned topics will be hosted under the following sections:

Section I — Introduction and Applications of IoT in 5G access technologies


Section II — Architecture of IoT in 5G access technologies


Section III— 5G and related technologies


Section IV— IoT in Smart Ambient Systems within 5G


Section V— IoT-Cloud oriented systems for 5G environments


Section VI— IoT smart resource management in 5G


Section VII— 5G and cognitive radio in Smart environments


Section VIII—Resource and Power management in 5G networks


Section IX— Performance Evaluation of IoT-related systems and applications using 5G technologies


Schedule & Deadlines

·         30th March 2015 
Chapter proposal (max. 2-pages)/Intention to submit a chapter

·         31st July. 2015 
Review comments

·         30th Sept. 2015 
Submission of the revised version 

·         30th Oct. 2015 
Final acceptance notification  Final manuscript

·         15th Nov. 2015 
Final manuscript

Manuscript Preparation

·         Each final manuscript should be 18-25 pages long (formatted). Depending on the number of submissions, longer manuscripts will also be accepted.

Om-announce mailing list
TSD 2015 | 24 Mar 11:51 2015

TSD 2015 - Second Call for Papers


Eighteenth International Conference on TEXT, SPEECH and DIALOGUE (TSD 2015)
            Plzen (Pilsen), Czech Republic, 14-17 September 2015


The submission deadline March 31 is approaching. We will not extend the deadline.
However, in case you need some extra days, please let us know and do
the following: Register yourself and submit your paper with a valid abstract.
Put “UNFINISHED” as the first word in the abstract (both in the system
and in the paper). We need at least the abstract to organize the reviews.
When you finish your work, please, update the paper.


* Keynote speakers: Hermann Ney, Dan Roth, Björn W. Schuller,
      Peter D. Turney, and Alexander Waibel.
* TSD is traditionally published by Springer-Verlag and regularly listed in
      all major citation databases: Thomson Reuters Conference Proceedings
      Citation Index, DBLP, SCOPUS, EI, INSPEC, COMPENDEX, etc.
* TSD offers high-standard transparent review process - double blind, final
      reviewers discussion.
* TSD is officially recognized as an INTERSPEECH 2015 satellite event.
* TSD will take place in Pilsen, the European Capital of Culture 2015.
* TSD provides an all-service package (conference access and material, all
      meals, one social event, etc) for an easily affordable fee starting at
      270 EUR for students and 330 EUR for full participants.


March 31, 2015 ............ Submission of full papers
May 10, 2015 .............. Notification of acceptance
May 31, 2015 .............. Final papers (camera ready) and registration

September 14-17, 2015 ....... Conference date


TSD series have evolved as a prime forum for interaction between
researchers in both spoken and written language processing from all over
the world. Proceedings of TSD form a book published by Springer-Verlag in
their Lecture Notes in Artificial Intelligence (LNAI) series. The TSD
proceedings are regularly indexed by Thomson Reuters Conference
Proceedings Citation Index. LNAI series are listed in all major citation
databases such as DBLP, SCOPUS, EI, INSPEC, or COMPENDEX.

The contributions to the conference will be published in proceedings that
will be made available on a CD to participants at the time of the


Keynote topic:
    Challenges of Modern Era in Speech and Language Processing

Topics of the conference will include (but are not limited to):

    Corpora and Language Resources (monolingual, multilingual,
    text and spoken corpora, large web corpora, disambiguation,
    specialized lexicons, dictionaries)

    Speech Recognition (multilingual, continuous, emotional
    speech, handicapped speaker, out-of-vocabulary words,
    alternative way of feature extraction, new models for
    acoustic and language modelling)

    Tagging, Classification and Parsing of Text and Speech
    (multilingual processing, sentiment analysis, credibility
    analysis, automatic text labeling, summarization, authorship

    Speech and Spoken Language Generation (multilingual, high
    fidelity speech synthesis, computer singing)

    Semantic Processing of Text and Speech (information
    extraction, information retrieval, data mining, semantic web,
    knowledge representation, inference, ontologies, sense
    disambiguation, plagiarism detection)

    Integrating Applications of Text and Speech Processing
    (machine translation, natural language understanding,
    question-answering strategies, assistive technologies)

    Automatic Dialogue Systems (self-learning, multilingual,
    question-answering systems, dialogue strategies, prosody in

    Multimodal Techniques and Modelling (video processing, facial
    animation, visual speech synthesis, user modelling, emotions
    and personality modelling)


    Elmar Noeth, Germany (general chair)
    Eneko Agirre, Spain
    Genevieve Baudoin, France
    Vladimir Benko, Slovakia
    Paul Cook, Australia
    Jan Cernocky, Czech Republic
    Simon Dobrisek, Slovenia
    Kamil Ekstein, Czech Republic
    Karina Evgrafova, Russia
    Darja Fiser, Slovenia
    Eleni Galiotou, Greece
    Radovan Garabik, Slovakia
    Alexander Gelbukh, Mexico
    Louise Guthrie, United Kingdom
    Jan Hajic, Czech Republic
    Eva Hajicova, Czech Republic
    Yannis Haralambous, France
    Hynek Hermansky, USA
    Jaroslava Hlavacova, Czech Republic
    Ales Horak, Czech Republic
    Eduard Hovy, USA
    Maria Khokhlova, Russia
    Daniil Kocharov, Russia
    Miloslav Konopik, Czech Republic
    Ivan Kopecek, Czech Republic
    Valia Kordoni, Germany
    Siegfried Kunzmann, Germany
    Natalija Loukachevitch, Russia
    Bernardo Magnini, Italy
    Vaclav Matousek, Czech Republic
    Diana McCarthy, United Kingdom
    France Mihelic, Slovenia
    Roman Moucek, Czech Republic
    Hermann Ney, Germany
    Karel Oliva, Czech Republic
    Karel Pala, Czech Republic
    Nikola Pavesic, Slovenia
    Maciej Piasecki, Poland
    Adam Przepiorkowski, Poland
    Josef Psutka, Czech Republic
    James Pustejovsky, USA
    German Rigau, Spain
    Leon Rothkrantz, The Netherlands
    Anna Rumshisky, USA
    Milan Rusko, Slovakia
    Mykola Sazhok, Ukraine
    Pavel Skrelin, Russia
    Pavel Smrz, Czech Republic
    Petr Sojka, Czech Republic
    Stefan Steidl, Germany
    Georg Stemmer, Germany
    Marko Tadic, Croatia
    Tamas Varadi, Hungary
    Zygmunt Vetulani, Poland
    Pascal Wiggers, The Netherlands
    Yorick Wilks, United Kingdom
    Marcin Wolinski, Poland
    Victor Zakharov, Russia


The official language of the event will be English. However, papers on
processing of languages other than English are strongly encouraged.


The conference fee depends on the date of payment and on your status. It
includes one copy of the conference proceedings, refreshments/coffee
breaks, opening dinner, welcome party, mid-conference social event
admissions, and organizing costs. In order to lower the fee as much as
possible, the accommodation and the conference trip are not included. 

Full participant:
early registration by May 31, 2015 - CZK 9.000 (approx. 330 EUR)
late registration by August 1, 2015 - CZK 10.000 (approx. 370 EUR)
on-site registration - CZK 10.700 (approx. 390 EUR)

Student (reduced):
early registration by May 31, 2015 - CZK 7.400 (approx. 270 EUR)
late registration by August 1, 2015 - CZK 9.000 (approx. 330 EUR)
on-site registration - CZK 10.000 (approx. 370 EUR)


The city of Plzeň (Pilsen) is situated in Western Bohemia at the
confluence of four rivers. With its 170,000 inhabitants it is the fourth
largest city in the Czech Republic and an important industrial,
commercial, and administrative centre. It is also the capital of the
Pilsen Region. In addition, Pilsen won the title of the European Capital
of Culture for the upcoming year 2015.

Pilsen is well-known for its brewing tradition. The trademark
Pilsner-Urquell has a good reputation all over the world thanks to the
traditional recipe, high quality hops and good groundwater. Beer lovers
will also appreciate a visit to the Brewery Museum or the Brewery itself.

Apart from its delicious beer, Pilsen hides lots of treasures in its core.
The city can boast the second largest synagogue in Europe. The dominant of
the old part of the city center is definitely the 13th-century Gothic
cathedral featuring the highest church tower in Bohemia (102.34 m). It is
possible to go up and admire the view of the city. Not far from the
cathedral is the splendid Renaissance Town Hall from 1558 and plenty of
pleasant cafes and pubs are situated on and around the main square.

There is also the beautiful Pilsen Historical Underground - under the city
center, a complex network of passageways and cellars can be found. They
are about 14 km long and visitors can see the most beautiful part of this
labyrinth during the tour. It is recommended to visit the City Zoological
Garden, having the second largest space for bears in Europe and keeping
several Komodo dragons, large lizards which exist only in a few zoos in
the world.

The University of West Bohemia in Pilsen provides a variety of courses for
both Czech and international students. It is the only institution of
higher education in this part of the country which prepares students for
careers in engineering (electrical and mechanical), science (computer
science, applied mathematics, physics, and mechanics), education (both
primary and secondary), economics, philosophy, politics, archeology,
anthropology, foreign languages, law and public administration, art and


The conference is organized by the Faculty of Applied Sciences, University
 of West Bohemia, Pilsen, and the Faculty of Informatics, Masaryk University,
Brno. The conference is supported by International Speech Communication
Association (ISCA).

Venue: Plzeň (Pilsen), Parkhotel Congress Center Plzeň, Czech Republic


All correspondence regarding the conference should be addressed to:
Ms Anna Habernalová, TSD2015 Conference Secretary
E-mail: tsd2015@...
Phone: (+420) 724 910 148
Fax: +420 377 632 402 - Please, mark the faxed material with capitals
                        'TSD' on top.
TSD 2015 conference web site: http://www.tsdconference.org/tsd2015
Om-announce mailing list