Sara Foresti | 27 Aug 14:16 2015
Picon

IEEE Workshop on Security and Privacy in the Cloud (SPC 2015) - Call for Participation


CALL FOR PARTICIPATION

**********************************************************************
First IEEE Workshop on Security and Privacy in the Cloud (SPC 2015)
Florence, Italy - September 30, 2015
http://www.zurich.ibm.com/spc2015/
**********************************************************************

** Register by August 31, 2015 to enjoy the early bird rate! **
** Special discount for combined registration (conference+workshop) **


ABOUT THE WORKSHOP
The goal of this workshop is to bring together researchers and
practitioners who are interested in discussing the security, privacy,
and data protection issues emerging in cloud scenarios, and possible
solutions to them.
IEEE SPC 2015 will be held in Florence, Italy, on September 30, 2015
in conjunction with the IEEE Conference on Communications and
Network Security (CNS 2015).

The workshop will be a 1-day event, featuring one keynote talk
(Pierangela Samarati, Universita' degli Studi di Milano) and
SPC technical program (9 full papers and 8 short papers).

REGISTRATION
Registration information is available at:
http://cns2015.ieee-cns.org/registration

(Continue reading)

Giovanni Livraga | 26 Aug 12:56 2015
Picon

Deadline extended to 2015/08/30 - IEEE CNS 2015 Student Travel Grants

IEEE CNS 2015 Student Travel Grants - Extended Deadline 08/30

======================================================
IEEE Conference on Communications and Network Security
Florence, Italy
September 28-30, 2015
http://cns2015.ieee-cns.org/
======================================================

*** Application deadline extended to August 30, 2015 [firm deadline] ***

 
IEEE CNS 2015, along with NSF, ARO, IEEE, and other sponsors, 
would like to encourage student participation at the conference. 
With the support of NSF and ARO, CNS 2015 will be able to partially 
support the travel, accommodation, and registration costs of student 
registrants who might otherwise be unable to attend the conference.

All eligible applications will be considered, especially female 
and under-represented minority students. We also encourage those 
who do not have a paper in the conference, but wish to attend, 
to submit a travel grant application. The number and amount of 
awards will be determined based on the available funding and the 
applications received.

TYPE OF GRANTS
==============

The IEEE CNS 2015 conference is pleased to announce the availability 
of the following types of student travel grants:
(Continue reading)

Ruggero Donida Labati | 25 Aug 12:11 2015
Picon

Call for participation - 1st IEEE Workshop on Security and Privacy in Cybermatics (SPiCy 2015)

CALL FOR PARTICIPATION

**********************************************************************
1st IEEE Workshop on Security and Privacy in Cybermatics (SPiCy 2015)
Florence, Italy - September 30, 2015
http://spicy2015.di.unimi.it
**********************************************************************

** Register by August 31, 2015 to enjoy the early bird rate! **
** Special discount for combined registration (conference+workshop) **


ABOUT THE WORKSHOP

In the modern age Cybermatics is differentiating itself by designing the
physical and social places into the cyber space to accomplish the union
of three spaces: (i) Physical Cyberworld, (ii) Social Cyberworld, and
(iii) Thinking Cyberworld. In the cyber space, everywhere cyber-nodes
are significantly independent from the space-time limitations that
exist in the physical space. Along with the development of intelligent
systems, Cybermatics has brought a wide area of open issues during the
cyber interaction, physical perception, social correlation, and
cognitive thinking. Currently, Cybermatics is still in its initial stage,
and it is expected that Cybermatics will lead industrialization and IT
applications to a new level and will significantly change the way of
producing, living, and even thinking of the mankind. Cybermatics will
transform how we interact with and control the physical world around us,
just in the same way as the Internet transformed how we interact and
communicate with one another and revolutionized how and where we access
information.
(Continue reading)

Damien Sauveron | 24 Aug 15:27 2015
Picon

Special issue on Security, Privacy and Trust of the User-centric Solutions - Deadline is approaching

** Deadline is approaching **

<!-- /* Font Definitions */ <at> font-face {font-family:"MS ??"; mso-font-charset:78; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:1 134676480 16 0 131072 0;} <at> font-face {font-family:"MS ??"; mso-font-charset:78; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:1 134676480 16 0 131072 0;} <at> font-face {font-family:Cambria; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:0; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:-536870145 1073743103 0 0 415 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:Cambria; mso-ascii-font-family:Cambria; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"MS ??"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Cambria; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} a:link, span.MsoHyperlink {mso-style-priority:99; color:blue; mso-themecolor:hyperlink; text-decoration:underline; text-underline:single;} a:visited, span.MsoHyperlinkFollowed {mso-style-noshow:yes; mso-style-priority:99; color:purple; mso-themecolor:followedhyperlink; text-decoration:underline; text-underline:single;} .MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; font-family:Cambria; mso-ascii-font-family:Cambria; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"MS ??"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Cambria; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} <at> page WordSection1 {size:612.0pt 792.0pt; margin:72.0pt 90.0pt 72.0pt 90.0pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.WordSection1 {page:WordSection1;} /* List Definitions */ <at> list l0 {mso-list-id:1; mso-list-type:hybrid; mso-list-template-ids:1 1 2 -1 -1 -1 -1 -1 -1 -1;} <at> list l0:level1 {mso-level-number-format:bullet; mso-level-text:&#8226;; mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-18.0pt;} <at> list l0:level2 {mso-level-number-format:bullet; mso-level-text:?; mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-18.0pt;} <at> list l0:level3 {mso-level-start-at:0; mso-level-text:""; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:0cm; text-indent:0cm;} <at> list l0:level4 {mso-level-start-at:0; mso-level-text:""; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:0cm; text-indent:0cm;} <at> list l0:level5 {mso-level-start-at:0; mso-level-text:""; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:0cm; text-indent:0cm;} <at> list l0:level6 {mso-level-start-at:0; mso-level-text:""; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:0cm; text-indent:0cm;} <at> list l0:level7 {mso-level-start-at:0; mso-level-text:""; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:0cm; text-indent:0cm;} <at> list l0:level8 {mso-level-start-at:0; mso-level-text:""; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:0cm; text-indent:0cm;} <at> list l0:level9 {mso-level-start-at:0; mso-level-text:""; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:0cm; text-indent:0cm;} <at> list l1 {mso-list-id:2; mso-list-type:hybrid; mso-list-template-ids:2 101 -1 -1 -1 -1 -1 -1 -1 -1;} <at> list l1:level1 {mso-level-number-format:bullet; mso-level-text:&#8226;; mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-18.0pt;} <at> list l1:level2 {mso-level-start-at:0; mso-level-text:""; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:0cm; text-indent:0cm;} <at> list l1:level3 {mso-level-start-at:0; mso-level-text:""; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:0cm; text-indent:0cm;} <at> list l1:level4 {mso-level-start-at:0; mso-level-text:""; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:0cm; text-indent:0cm;} <at> list l1:level5 {mso-level-start-at:0; mso-level-text:""; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:0cm; text-indent:0cm;} <at> list l1:level6 {mso-level-start-at:0; mso-level-text:""; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:0cm; text-indent:0cm;} <at> list l1:level7 {mso-level-start-at:0; mso-level-text:""; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:0cm; text-indent:0cm;} <at> list l1:level8 {mso-level-start-at:0; mso-level-text:""; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:0cm; text-indent:0cm;} <at> list l1:level9 {mso-level-start-at:0; mso-level-text:""; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:0cm; text-indent:0cm;} ol {margin-bottom:0cm;} ul {margin-bottom:0cm;} -->

Please accept our apologies if you receive multiple copies of this CFP

 

.:: Call for Papers ::.

=======================

 

Future Generation Computer Systems (Elsevier)

Special issue on Security, Privacy and Trust of the User-centric Solutions

 

In future computing environments, due to the ongoing development of pervasive and smart technologies, movement towards user-centric solutions must be paramount. The frameworks for everyday personal computing devices, including smartphones, smart cards and sensors, are becoming user-centric instead of issuer-centric. User-centric solutions can target a wide range of applications, ranging from individual devices communicating with other connected devices, through to data-sharing in cloud computing and open grids on very powerful computing systems. User-centric solutions address the devices themselves and the ways in which they communicate, i.e., the networks and the end-user applications. The key factor in the success of user-centric solutions is the peace of mind of users. To achieve this the security, privacy and trust in the user-centric ecosystem for any device must be ensured.

 

This special issue aims to further scientific research within the field of security, privacy and trust for user-centric solutions. It will accept original research papers that report the latest results and advances in this area. It also invites review articles that focus on the state of the art in security, privacy and trust solutions for user-centric devices, network and applications, highlighting trends and challenges. The papers will be peer reviewed and will be selected on the basis of their quality and relevance to the topic of this special issue. Topics include (but are not limited to):

 

       Security, Privacy and Trust of:

-       User-centric Devices (Smartphones, PDA, RFID, Sensors, Smart Cards, Smart Cameras, Smart Objects)

-       User-centric Networks (Mobile Ad hoc Networks, M2M Networks, Urban Networks, Wireless Sensor Networks)

-       User-centric Applications (Cloud Computing, Data Provenance, Smart Grids, Smart Homes, Healthcare, Smart Spaces, Convergent Pervasive and Smart Environments)

       Technologies used to enhance Security, Privacy and Trust in User-centric solutions (NFC, IPv6, TPM)

       Societal issues related to Security, Privacy and Trust in User-centric solutions (HCI, User interactions)

 

Submission Guidelines

Papers submitted to this special issue for possible publication must be original and must not be under consideration for publication in any other journal or conference proceedings. Previously published or accepted conference papers must contain at least 30% new material to be considered for the special issue. Submitted papers should be formatted according to the journal style. For more detailed information concerning the requirements for submission, please refer to the complete Author Guidelines at: http://www.elsevier.com/journals/future-generation-computer-systems/0167-739X/guide-for-authors.

Papers should be uploaded via journal online system: ees.elsevier.com/fgcs. Authors must select “SI: SPT-UCS” when they reach the “Article Type” step in the submission process.

 

Selection and Evaluation Criteria

       Significance to the research community of the journal

       Relevance to the special issue

       Originality of research innovation, technical contribution, and significance of the presented results

       Quality, clarity, and readability of the written text

       Quality of references and related work

       Quality of research hypothesis, assertions, and conclusion

 

Important Dates

Full manuscript due: September 1, 2015

Notification of the first review process: November 15, 2015

Revision due: December 15, 2015

Final acceptance notification: January 15, 2016

Final manuscript due: January 31, 2016

Publication date: Summer 2016 (Tentative)

 

Journal Metrics

Source Normalized Impact per Paper (SNIP): 3.278

SCImago Journal Rank (SJR): 2.146

Impact Factor: 2.786

5-Year Impact Factor: 2.464

 

Lead Guest Editor

Raja Naeem Akram, Information Security Group, Royal Holloway, University of London. United Kingdom. Email: r.n.akram-PS1buWBl23a1Qrn1Bg8BZw@public.gmane.org

 

Guest Editors

Hsiao-Hwa Chen, Department of Engineering Science, National Cheng Kung University, Taiwan, Email: hshwchen <at> mail.ncku.edu.tw

Javier Lopez, Computer Science Department, University of Malaga, Spain, Email: jlm-Pr4/EHIlQh3e5aOfsHch1g@public.gmane.org

Damien Sauveron, XLIM (UMR CNRS 7252), University of Limoges, France, Email: Damien.Sauveron-9aeBYpXgKEhQFI55V6+gNQ@public.gmane.org

Laurence T. Yang, Department of Computer Science, St. Francis Xavier University, Canada, Email: ltyang-zunJFYPhlDo@public.gmane.org

 


-- Damien Sauveron http://damien.sauveron.fr/
_______________________________________________
Om-announce mailing list
Om-announce@...
http://openmath.org/mailman/listinfo/om-announce
Neng-Fa Zhou | 23 Aug 03:43 2015
Picon

[logic-programming] LP/CP Programming Contest: Call-for-Participation

The LP/CP programming contest will be run from 7:45PM to
9:45PM (Ireland time) on September 2 (Wednesday) during
ICLP/CP 2015, which will be held in Cork, Ireland. This
programming contest combines the Prolog programming contest,
the ASP model & solve contest, and the Minizinc model &
solve contest.

The LP/CP programming contest consists of two tracks: one
on-site track and one online track. For both tracks, each
team can consist of up to three participants, and each team
may only use a single LP/CP system. Each team is given 2
hours to solve 5 combinatorial problems. Please see the web
site below for the details:

http://picat-lang.org/lp_cp_pc/

No prior registration is required. Nevertheless, potential
teams are encouraged to register by submitting an empty
solution via Easychair at
https://easychair.org/conferences/?conf=lpcppc2015.


Organizers
===================
Peter Stuckey, University of Melbourne, Australia
Antonius Weinzierl, TU Wien, Austria
Neng-Fa Zhou (chair),  CUNY, USA

_______________________________________________
logic-programming mailing list
logic-programming@...
http://lists.picat-lang.org/mailman/listinfo/logic-programming
_______________________________________________
Om-announce mailing list
Om-announce@...
http://openmath.org/mailman/listinfo/om-announce
Carlo Alberto Furia | 24 Aug 09:51 2015
Picon

SCORE 2016 Student Contest: 2nd Call

[Apologies for multiple postings]

*** SCORE 2016 Student Contest: Second Call for Contributions ***

http://score-contest.org

The Student Contest on Software Engineering (SCORE) is a worldwide
competition for undergraduate and master's level students. It
emphasizes the engineering aspects of software development, not
limited to programming. The fourth edition of the Student Contest on
Software Engineering (SCORE) is part of the 38th International
Conference on Software Engineering (ICSE 2016) and is currently
underway.

We encourage you to advertise SCORE 2016 to your students, and to
consider using its project topics in the courses you will teach in the
year 2015!

Between January and November 2015, teams of students can enter SCORE
2016: they select a project topic among those offered, and register
following the instructions at score-contest.org. Their goal is to
undertake a full-fledged software engineering project that adheres to
the chosen topic description and encompasses all aspects of the
engineering process, including planning, requirements, design,
implementation, and testing.  Following the best software engineering
practices, teams document the process and its outcomes using formal
and informal notations, configuration management tools, and
process-specific techniques. They collect all artifacts and
documentation and produce a detailed project report. By the 15 January
2016 deadline, teams submit a 20-page summary report, which gives a
self-contained summary of their project development.  Based on the
summary reports, the SCORE Program Committee selects a number of
semi-finalist teams to submit their complete project reports and
artifacts by the 4 March 2016 deadline. After evaluating the complete
reports and artifacts of semi-finalist teams, the SCORE Program
Committee selects a limited number of finalist teams by the 7 April
2016 deadline, and invites them to present their projects at ICSE 2016
in Austin, TX, USA.  Finally, after presentations at ICSE 2016, the
SCORE Program Committee selects the winning team and presents awards
during the conference.

* Important dates *

30 November 2015: Deadline for team registration.

15 January 2016: Deadline for the submission of summary reports.

7 April 2016: Notification of finalists who will be invited
               to ICSE 2016.

ICSE 2016 (14--22 May 2016): Final evaluation and presentation
                              of the awards.

* Organization *

The SCORE 2016 contest is organized by Jonathan Cook (New Mexico State
University, USA) and Carlo A. Furia (ETH Zurich, Switzerland).

- Nazareno Aguirre, Universidad Nacional de Río Cuarto, Argentina
- Benoit Baudry, INRIA, France
- Alexandre Bergel, University of Chile, Chile
- Domenico Bianculli, University of Luxembourg, Luxembourg
- Paolo Bonzini, Red Hat, Inc., Italy
- Yuanfang Cai, Drexel University, USA
- Yvonne Coady, University of Victoria, Canada
- Ivica Crnkovic, Mälardalen University, Sweden
- John Georgas, Northern Arizona University, USA
- Jeff Gray, University of Alabama, USA
- Eunkyoung Jee, KAIST, Korea
- Einar Broch Johnsen, University of Oslo, Norway
- Akash Lal, Microsoft Research, India
- Otávio Lemos, Universidade Federal de São Paulo, Brazil
- Timothy Lethbridge, University of Ottawa, Canada
- Jonathan Maletic, Kent State University, USA
- Timothy Menzies, North Carolina State University, USA
- Martin Nordio, ETH Zurich, Switzerland
- Richard Paige, University of York, UK
- Liliana Pasquale, Lero — the Irish Software Engineering Research 
Centre, Ireland
- Michael Pradel, TU Darmstadt, Germany
- Rafael Prikladnicki, PUCRS, Brazil
- Derek Rayside, University of Waterloo, Canada
- Roshanak Roshandel, Seattle University, USA
- Matteo Rossi, Politecnico di Milano, Italy
- Kevin Schneider, University of Saskatchewan, Canada
- Elena Sherman, Boise State University, USA
- Paola Spoletini, Kennesaw State University, USA and Universitá 
dell'Insubria, Italy
- Claudia Szabo, University of Adelaide, Australia
- Shingo Takada, Keio University, Japan
- Zhenchang Xing, Nanyang Technological University, China
- Michal Young, University of Oregon, USA

_______________________________________________
Om-announce mailing list
Om-announce <at> openmath.org
http://openmath.org/mailman/listinfo/om-announce
Marco Gavanelli | 5 Aug 16:13 2015
Picon

[logic-programming] CfP PADL16: Practical Aspects of Declarative Languages

                         Call for Papers
                         ===============

               18th International Symposium on
     Practical Aspects of Declarative Languages (PADL 2016)

           http://conf.researchr.org/home/PADL-2016

              St. Petersburg, Florida, United States
                  Mon 18 - Tue 19 January 2016
                 Co-located with ACM POPL 2016

                      Conference Description
                      ======================

Declarative languages build on sound theoretical bases to provide
attractive frameworks for application development. These languages
have been successfully applied to many different real-world
situations, ranging from data base management to active networks to
software engineering to decision support systems.

New developments in theory and implementation have opened up new
application areas. At the same time, applications of declarative
languages to novel problems raise numerous interesting research
issues. Well-known questions include designing for scalability,
language extensions for application deployment, and programming
environments. Thus, applications drive the progress in the theory and
implementation of declarative systems, and benefit from this progress
as well.

    PADL is a forum for researchers and practitioners to present
original work emphasizing novel applications and implementation
techniques for all forms of declarative concepts, including,
functional, logic, constraints, etc. Topics of interest include, but
are not limited to:

    * Innovative applications of declarative languages
    * Declarative domain-specific languages and applications
    * Practical applications of theoretical results
    * New language developments and their impact on applications
    * Declarative languages and software engineering
    * Evaluation of implementation techniques on practical applications
    * Practical experiences and industrial applications
    * Novel uses of declarative languages in the classroom
    * Practical extensions such as constraint-based, probabilistic, and
      reactive languages.

    PADL 2016 welcomes new ideas and approaches pertaining to
applications and implementation of declarative languages. PADL 2016 will
be co-located with the Symposium on Principles of Programming Languages
(POPL 2016), in St. Petersburg, Florida (USA).

          Important Dates and Submission Guidelines
          =========================================

               Abstract Submission:    September 10, 2015
               Paper Submission:       September 18, 2015
               Notification:             October 21, 2015
               Camera-ready:            November 10, 2015
               Symposium:             January 18-19, 2016

Authors should submit an electronic copy of the full paper in PDF
using the Springer LNCS format. The submission will be done through
EasyChair conference system:

	https://easychair.org/conferences/?conf=padl2016

All submissions must be original work written in English. Submissions
must be unpublished and not submitted for publication elsewhere. Work
that already appeared in unpublished or informally published workshops
proceedings may be submitted but the authors should notify the program
chair about the place on which it has previously appeared.

PADL 2016 will accept both technical and application papers:

    * Technical papers must describe original, previously unpublished
      research results. Technical papers must not exceed 15 pages (plus
      one page of references) in Springer LNCS format.
    * Application papers are a mechanism to present important practical
      applications of declarative languages that occur in industry or
      in areas of research other than Computer Science.
      Application papers are expected to describe complex and/or
      real-world applications that rely on an innovative use of
      declarative languages. Application descriptions, engineering
      solutions and real-world experiences (both positive and negative)
      are solicited. The limit for application papers is 8 pages in
      Springer LNCS format but such papers can also point to sites with
      supplemental information about the application or the system that
      they describe.

The proceedings of PADL 2016 will appear in the LNCS series of Springer
Verlag.

                              Contacts
                              ========

    For additional information about papers and submissions, please
contact the Program Chairs:

          Marco Gavanelli              and          John Reppy
      University of Ferrara                     University of Chicago
              Italy                                     USA
http://docente.unife.it/marco.gavanelli http://people.cs.uchicago.edu/~jhr

email: padl2016@...
_______________________________________________
logic-programming mailing list
logic-programming@...
http://lists.picat-lang.org/mailman/listinfo/logic-programming
Giovanni Livraga | 24 Aug 17:44 2015
Picon

Call for Participation - 3rd IEEE Conference on Communications and Network Security (IEEE CNS 2015)

CALL FOR PARTICIPATION

******************************************************************************
3rd IEEE Conference on Communications and Network Security (IEEE CNS 2015)
Florence, Italy -- September 28-30, 2015
http://cns2015.ieee-cns.org/
******************************************************************************

** Early bird registration: August 31, 2015 **


ABOUT THE CONFERENCE
====================

IEEE Conference on Communications and Network Security (CNS) is a new
conference series in IEEE Communications Society (ComSoc) core conference
portfolio and the only ComSoc conference focusing solely on cyber security.
IEEE CNS is also a spin-off of IEEE INFOCOM, the premier ComSoc conference on
networking. IEEE CNS 2015, the third conference in the series, will be held 
in Florence, Italy, from September 28 to September 30, 2015.

IEEE CNS 2015 is organized as a 3-day event featuring:

- two keynote speeches (Adrian Perrig, ETH & CMU and Patrick Drew McDaniel, 
  Pennsylvania State University)

- CNS technical program consisting of 48 papers and a poster session (Sept 28-29)

- 4 co-located workshops (Sept 30): 

    * The 2nd Workshop on Physical-layer Methods for Wireless Security
      http://www.princeton.edu/~rafaelfs/CNS2015/index.html 

    * The 1st Workshop on Security and Privacy in the Cloud (IEEE SPC 2015)
      http://www.zurich.ibm.com/spc2015/ 

    * The 1st Workshop on Security and Privacy in Cybermatics (IEEE SPiCy 2015)
      http://spicy2015.di.unimi.it/

    * Catastrophic events related to CRYPTography and security with their 
      possible solutions (IEEE cataCRYPT 2015)
      http://catacrypt.net/

COMPLETE PROGRAM
================

The program is available at:
http://cns2015.ieee-cns.org/content/technical-program

REGISTRATION
============

Registration information is available at:
http://cns2015.ieee-cns.org/registration

Early registration fees apply until August 31, 2015.

HOTEL AND TRAVEL
================
Information on the conference venue is available at:
http://cns2015.ieee-cns.org/travel

STUDENT TRAVEL GRANTS
=====================
IEEE CNS 2015, along with NSF, ARO, IEEE, and other sponsors, would like 
to encourage student participation at the conference. With the support of 
NSF and ARO, CNS 2015 will be able to partially support the travel, 
accommodation, and registration costs of student registrants who might 
otherwise be unable to attend the conference.

Application due August 25, 2015. Additional information is available at:
http://cns2015.ieee-cns.org/content/student-travel-grant

MORE INFORMATION
================

Additional information about the conference and co-located workshops is available at:
http://cns2015.ieee-cns.org/
****************
Per destinare il 5x1000 all'Universita' degli Studi di Milano: indicare nella dichiarazione dei redditi
il codice fiscale 80012650158.

http://www.unimi.it/13084.htm?utm_source=firmaMail&utm_medium=email&utm_content=linkFirmaEmail&utm_campaign=5xmille
Crossfyre Committee | 21 Aug 17:08 2015
Picon

Call for Papers: CrossFyre Workshop, Nov 2-3, 2015 - Radboud University, Nijmegen, Netherlands


***********************************
Call for Papers

CrossFyre 2015

5th Workshop on Cryptography, Robustness, and Provably Secure Schemes
for Female Young Researchers (CrossFyre)

November 2-3, 2015
Radboud University, Nijmegen, Netherlands
http://crossfyre15.cs.ru.nl/

*****************************************************************
Extended Abstract deadline: September 4, 2015
Registration Deadline: September 18, 2015
*****************************************************************

The Digital Security group at Radboud University, Nijmegen will
organize the fifth International Workshop on Cryptography, Robustness,
and Provably Secure Schemes for Female Young Researchers (CrossFyre).
This 2-day workshop will be held at Huize Heyendael (of Radboud University),
Nijmegen, Netherlands, on 2-3 November 2015, with the support and funding of
Microsoft Research.

This workshop aims to bring female researchers in the field of
Cryptography and Information Security together to promote their research
topics and their careers as women in science and engineering. We hope to
encourage a tighter cooperation between women in Cryptography and
Information Security, and to motivate joint papers. In this spirit, you
are kindly invited to attend and give a short presentation of your
research topic to your fellow participants.

Though the workshop is primarily aimed at female researchers, male
researchers are also invited to take part.

We also welcome undergraduate students to this workshop and strongly
encourage supervisors to support participation, be it passive (mainly
listening) or active (all students are encouraged to submit abstracts
and give talks during the workshop).

Format:
 * 2 keynote talks,
 * Fellow researchers introducing themselves: selected fields in
cryptography, security, robustness, provable security etc. are briefly
outlined,
 * A plenary discussion on positions and perspectives of women in research

IMPORTANT: A few grants will be awarded for those students who are
presenting and least able to attend.

Important dates:
-- September 04, 2015: Deadline for extended abstract of your talk
-- October 01, 2015: Notification for grant applicants + Announcement of the program
-- November 2-3, 2015: CrossFyre workshop

Website: http://crossfyre15.cs.ru.nl/

Contact: crossfyre2015(at)gmail(dot)com

Disclaimer: This workshop aims at bringing women together to discuss
their career opportunities, make contacts, and exchange experiences. The
workshop does NOT intend to discriminate men. Male researchers are of
course welcome to attend.
_______________________________________________
Om-announce mailing list
Om-announce@...
http://openmath.org/mailman/listinfo/om-announce
Geoff Sutcliffe | 24 Aug 16:36 2015
Picon

TABLEAUX/FroCoS 2015 - Call for Participation

Registration for TABLEAUX/FroCoS 2015 in Wroclaw is Open
--------------------------------------------------------

Dates:
   20-24 september 2015.

Invited Speakers:
   Christoph Benzmueller: On a (Quite) Universal Theorem Proving Approach
                          and its Application to Metaphysics
   Roy Dyckhoff:  Coherentisation of First-Order Logic 
   Andreas Herzig: Knowledge and Action: How should we combine their logics?
   Oliver Ray: Symbolic Support for Scientific Discovery in Systems Biology
   Philipp Ruemmer: Free variables and theories: Revisiting Rigid E-Unification
   Thomas Sturm: From Complete Elimination Procedures to Subtropical 
                 Decisions over the Reals

Tutorials:
   - The distributed Ontology, Modeling and Specification Language (DOL),
       Till Mossakowski
   - Lean Theorem Proving and Connection Tableaux,
        Jens Otten
   - Formal Representation of Inductive and Coinductive Datatypes with
     Applications to Modelling Tableaux Structures,
       Andrei Popescu
   - Automated Reasoning Building Blocks,
       Christoph Weidenbach
   - A Taste of CVC4,
       Cesare Tinelli, Andrew Reynolds, Clark Barrett

Wroclaw:
   Wroclaw is a pleasant, moderately sized town in the center
   of Europe, approximately 350 km from Berlin, Prag and
   Warsaw. The old town is nice, and the conference is
   only 20 minutes walking away. 

TABLEAUX 2015: 
   Tableaux methods offer a convenient and flexible set of tools for automated 
   reasoning in classical logic, extensions of classical logic, and a large 
   number of non-classical logics. For large groups of logics, tableaux 
   methods can be generated automatically. Areas of application include 
   verification of software and computer systems, deductive databases, 
   knowledge representation and its required inference engines, teaching, 
   and system diagnosis. The conference series aims to bring together 
   researchers interested in all aspects of tableaux - theoretical 
   foundations, applications, and implementation techniques. 

FroCoS 2015:
   In various areas of computer science, such as logic, computation, 
   program development and verification, artificial intelligence, 
   knowledge representation, and automated reasoning, there is an obvious 
   need for using specialized formalisms and inference systems for selected 
   tasks. To be usable in practice, these specialized systems must be 
   combined with each other and integrated into general purpose systems. 
   This has led---in many research areas---to the development of techniques 
   and methods for the combination and integration of dedicated formal 
   systems, as well as for their modularization and analysis.
   The International Symposium on Frontiers of Combining Systems (FroCoS) 
   traditionally focusses on these types of research questions and activities. 
   Like its predecessors, FroCoS 2015 seeks to offer a common forum for 
   research in the general area of combination, modularization, and 
   integration of systems, with emphasis on logic-based ones, and of their 
   practical use. 

Early Registration:
   Early registration costs 1200 PLN (292 euro, 330 US dollar).
   That's a bargain!

Travel Awards:
   There are some travel awards for young researchers
   (students/PhD students/postdocs), sponsored by
   Springer Verlag. application deadline is September 1st. 

Website:
   http://tableaux2015.ii.uni.wroc.pl/
   http://frocos2015.ii.uni.wroc.pl/
Giovanni Livraga | 23 Aug 03:46 2015
Picon

IEEE CNS 2015 Student Travel Grants - Deadline 08/25

IEEE CNS 2015 Student Travel Grants - Deadline 08/25

======================================================
IEEE Conference on Communications and Network Security
Florence, Italy
September 28-30, 2015
http://cns2015.ieee-cns.org/
======================================================

IEEE CNS 2015, along with NSF, ARO, IEEE, and other sponsors, 
would like to encourage student participation at the conference. 
With the support of NSF and ARO, CNS 2015 will be able to partially 
support the travel, accommodation, and registration costs of student 
registrants who might otherwise be unable to attend the conference.

All eligible applications will be considered, especially female 
and under-represented minority students. We also encourage those 
who do not have a paper in the conference, but wish to attend, 
to submit a travel grant application. The number and amount of 
awards will be determined based on the available funding and the 
applications received.

TYPE OF GRANTS
==============

The IEEE CNS 2015 conference is pleased to announce the availability 
of the following types of student travel grants:

A. Travel grants sponsored by the IEEE Communications Society.

B. NSF and ARO travel grant opportunity for US-based students.

ELIGIBILITY REQUIREMENTS
========================

Following the application guidelines below, a student may apply to one 
or both categories for which he/she is eligible. The eligibility criteria 
for each category are:

A. These student travel grants are sponsored by the IEEE Communications Society. 
Applications are invited from qualified full-time graduate students. To qualify, 
a student must (i) be a valid Student Member of the COMSOC at the time of 
application; (ii) be a full-time student registered toward a Bachelors, Masters, 
or Ph.D. degree in engineering or related field in a college or university when 
submitting the application; (iii) applicant may not receive more than one IEEE 
ComSoc STG in any 12-month period.

B. These student travel grants are sponsored by the U.S. National Science 
Foundation and Army Research Office. To qualify, a student must be a graduate 
student studying in an accredited U.S. institution at the time of attending CNS 
2015. Student recipients must submit valid receipts for reimbursement after the 
conference. Only airfare on a US-based carrier will be reimbursed by this type 
of support!

APPLICATION MATERIALS
=====================

Applicants should create their application as a single PDF file, following the 
format described below. Direct links to the submission pages of both types of 
grants is here: https://edas.info/G.php?g=495

 
An application for a student travel grant will consist of:

* A request letter from the student (see below).
* The student's CV.
* A supporting letter from the student's graduate advisor.
* Expected Expenses (broken down as registration, travel, and lodging). It is 
anticipated that travel grants will partially cover these overall costs.

Incomplete applications will not be considered.
The request letter from the student should include the following information:

* Name
* Affiliation
* Address
* Type of student (PhD, MS, undergraduate, etc.)
* A clear indication of the type(s) of travel grant the student is applying 
  for (A and/or B)
* Number of years that the applicant have been a student in the current program, 
  and expected date of completion
* Name and email address of advisor
* Title and Authors of paper presenting at CNS 2015 conference, if applicable.
* A short statement (maximum 250 words) describing briefly why the student wants 
  to attend CNS 2015.

The advisor's recommendation letter for the student should include:

* Confirmation that student is a full-time Ph.D. or M.S. candidate in good 
  academic standing at the given institution.
* Explain how this particular student would benefit from attendance at the 
  conference.
* The strengths and potential contributions of the student.

If an advisor prefers to submit the recommendation letter separately, please ask 
him/her to email it (pdf file) to the Student Travel Grant Chairs Walid Saad 
(walids@...) and Yingying Chen
(yingying.chen@...) by August 25, 2015.

DEADLINE AND DATES
==================

* Application due August 25, 2015.
* Award decisions made to the applicants: Around August 31st, 2015.

AWARDS
======

Student travel grant awardees are required to provide taxpayer information 
(e.g., SSNs in the US) if applicable.

CONTACT
=======
If you have a question, please contact the Student Travel Grant Chairs, 
Dr. Walid Saad (walids@...) and Dr. Yingying Chen (yingying.chen@...).
****************
Per destinare il 5x1000 all'Universita' degli Studi di Milano: indicare nella dichiarazione dei redditi
il codice fiscale 80012650158.

http://www.unimi.it/13084.htm?utm_source=firmaMail&utm_medium=email&utm_content=linkFirmaEmail&utm_campaign=5xmille

Gmane