Dirk Hain | 24 Jun 22:55 2013
Picon

HTTPS handling

Hi, 

I am fairly new to using twill (3 days down so far) and was wondering if/how https handling is supported. 
I am using twill through the zenoss integration but am testing all my scripts through twill-sh (twill v0.9). This is all on RedHat 6.4.

I am trying to access a resource through https but when sending the request I am getting back a 500 in twill even though it works just fine in chrome/ff.

This is the (anonymized) script I am running:

current page:  *empty page*
>> go https://mysshside.com/csr
send: 'GET /csr HTTP/1.1\r\nAccept-Encoding: identity\r\nHost: mysshside.com\r\nConnection: close\r\nAccept: text/html; */*\r\n\r\n'
reply: 'HTTP/1.1 500 Internal Server Error\r\n'
header: Cache-control: no-cache="set-cookie"
header: Content-Type: text/html; charset=utf-8
header: Date: Mon, 24 Jun 2013 20:49:33 GMT
header: Server: nginx/1.2.3 + Phusion Passenger 3.0.17 (mod_rails/mod_rack)
header: Set-Cookie: AWSELB=BD0F21D514BAD7C5E0A05D5562B6EB2E7DA2E1DDD21A495168D65BC9137C7FAE51663423F30A04FF3371A64FCC560E49FBFAF96563D69094CA71AC20A3AE9CB0EDF2BB3A48;PATH=/;MAX-AGE=1200
header: Status: 500
header: X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 3.0.17
header: X-Rack-Cache: miss
header: X-Request-Id: a03e3163709ebef935a5bed19074a0e7
header: X-Runtime: 0.125581
header: Content-Length: 656
header: Connection: Close
==> at https://mysshside.com/csr
current page: https://mysshside.com/csr
>> info

Page information:
URL: https://mysshside.com/csr
HTTP code: 500
Content type: text/html; charset=utf-8 (HTML)
Page title: C3 Commercial

current page: https://mysshside.com/csr 

Any help or maybe a link to a working example would be greatly appreciated. As you can see above the resource is behind a load balancer. 

Many Thanks,
- Dirk 
_______________________________________________
twill mailing list
twill@...
http://lists.idyll.org/listinfo/twill
Perihan Cumali | 30 Nov 13:36 2012
Picon

(no subject)

_______________________________________________
twill mailing list
twill@...
http://lists.idyll.org/listinfo/twill
Picon

Call for Papers: The Second International Conference on Informatics & Applications (ICIA2013)

The Society of Digital Information and Wireless Communications (SDIWC)
The Second International Conference on Informatics & Applications (ICIA2013)
September 23-25, 2013
Technical University of Lodz, Poland

The Society of Digital Information and Wireless Communications is devoted
to promoting science and technology in digital technology. SDIWC organizes
multidisciplinary conferences for academics and professionals, primarily
in the fields of computer software and hardware, networking, and wireless
communication. SDIWC holds conferences in both the industrialized and
developing countries.

Original papers, demonstrations, tutorials, and posters are invited in
every area of such languages. Papers may address any aspect, including
language design, implementation strategies, theoretical issues, usability,
and practicality in the real world. We are especially interested in how
this work adds new insights into how to build innovative languages.

All accepted papers will be submitted to IEEE for potential inclusion to
IEEE Xplore.

Sample topics include (but are not limited to):

Information Ethics
Information Content Security
Data Compression
E-Technology
E-Government
E-Learning
Cloud Computing
Grid Computing
Green Computing
Access Controls
Data Mining
Social Search
Computer Forensics
Computer Security
Peer-to-Peer Social Networks
Information and Data Management
Network Security
Social Networks
Real-Time Systems
Internet Modeling
Assurance of Service
Image Processing
Web Services Security
Multimedia Computing
Software Engineering
Biometrics Technologies
Wireless Communications
Semantic Web, Ontologies
Mobile Social Networks
Distributed and Parallel Applications
Embedded Systems and Software
Critical Computing and Storage
Critical Infrastructure Management
Soft Computing Techniques
Confidentiality Protection
Mobile Networking, Mobility and Nomadicity
Anti-cyberterrorism
Ubiquitous Computing, Services and Applications
Forensics, Recognition Technologies and Applications
Fuzzy and Neural Network Systems
Signal Processing, Pattern Recognition and Applications
User Interfaces,Visualization and Modeling
Mobile, Ad Hoc and Sensor Network Management
Web Services Architecture, Modeling and Design
Quality of Service, Scalability and Performance
Self-Organizing Networks and Networked Systems
Computational Intelligence
Data Management in Mobile Peer-to-Peer Networks
Data Stream Processing in Mobile/Sensor Networks
Indexing and Query Processing for Moving Objects
User Interfaces and Usability Issues form Mobile Applications
Sensor Networks and Social Sensing
XML-Based Languages
Cryptography and Data Protection
Information Propagation on Social Networks
Resource and Knowledge Discovery Using Social Networks
Computer Crime Prevention and Detection

All the accepted papers for the ICIA2013 will be published in the
proceedings of the conference. In addition, high quality papers with
improvements and extension will be published in any one of the following
special issues.

1. International Journal of New Computer Architectures and their
Applications (IJNCAA)
http://www.sdiwc.net/ijncaa/

2. International Journal of Digital Information and Wireless
Communications (IJDIWC)
http://www.sdiwc.net/ijdiwc/

3. International Journal of Cyber-Security and Digital Forensics (IJCSDF)
http://sdiwc.net/security-journal/

Researchers are encouraged to submit their work electronically. All papers
will be fully refereed by a minimum of two specialized referees. Before
final acceptance, all referees comments must be considered.

For details of submission, see
http://sdiwc.net/conferences/2013/icia2013/paper-submission/

    Deadline: Paper submissions due: August 5, 2013
    Notification to authors of acceptance: September 5, 2013
    Final camera-ready manuscripts: September 15, 2013
    Information Sources

    More information: http://sdiwc.net/conferences/2013/icia2013/

    Questions to:
			Liezelle Ann Canadilla
			sdiwc.net
			icia@...
Picon

CFP : The Second International Conference on Informatics & Applications (ICIA2013)

Call For Papers
The Second International Conference on Informatics & Applications (ICIA2013)
23-25, September 2013
Technical University of Lodz
icia [at] sdiwc [dot] net
http://sdiwc.net/conferences/2013/icia2013/

The Society of Digital Information and Wireless Communications (SDIWC)
invites the submission of papers for The Second International Conference
on Informatics & Applications (ICIA2013) hosted jointly with the Technical
University of Lodz, Poland. Papers are invited on substantial, original,
and unpublished research on all aspects of informatics and its
applications including, but not limited to: Information Ethics;
Information Content Security; Data Compression; E-Technology;
E-Government; E-Learning; Cloud Computing; Grid Computing; Green
Computing; Access Controls; Data Mining; Social Search; Computer
Forensics; Computer Security; Peer-to-Peer Social Networks; Information
and Data Management; Network Security; Social Networks; Real-Time Systems;
Internet Modeling; Assurance of Service; Image Processing; Web Services
Security; Multimedia Computing; Software Engineering; Biometrics
Technologies; Wireless Communications; Semantic Web, Ontologies; Mobile
Social Networks; Distributed and Parallel Applications; Embedded Systems
and Software; Critical Computing and Storage; Critical Infrastructure
Management; Soft Computing Techniques; Confidentiality Protection; Mobile
Networking, Mobility and Nomadicity; Anti-cyberterrorism; Ubiquitous
Computing, Services and Applications; Forensics, Recognition Technologies
and Applications; Fuzzy and Neural Network Systems; Signal Processing,
Pattern Recognition and Applications; User Interfaces,Visualization and
Modeling; Mobile, Ad Hoc and Sensor Network Management; Web Services
Architecture, Modeling and Design; Quality of Service, Scalability and
Performance; Self-Organizing Networks and Networked Systems; Computational
Intelligence; Data Management in Mobile Peer-to-Peer Networks; Data Stream
Processing in Mobile/Sensor Networks; Indexing and Query Processing for
Moving Objects; User Interfaces and Usability Issues form Mobile
Applications; Sensor Networks and Social Sensing; XML-Based Languages;
Cryptography and Data Protection; Information Propagation on Social
Networks; Resource and Knowledge Discovery Using Social Networks; Computer
Crime Prevention and Detection.

Paper Submission
----------------
Researchers are encouraged to submit their work electronically. Submitted
paper should not exceed 15 pages, including illustrations. Papers are to
be numbered starting from page one. Papers should be submitted
electronically as MS word or pdf format without author(s) name. All papers
will be fully refereed by a minimum of two specialized referees. Before
final acceptance, all referees comments must be considered. Accepted
papers will be published in the conference proceedings. Best papers awards
will be distributed during the conference.

All accepted papers will be submitted to IEEE for potential inclusion to
IEEE Xplore. In addition, all accepted papers will be included in SDIWC
Digital Library, and in the proceedings of the conference.

All Papers submitted will be reviewed by a minimum of two reviewers. The
published proceedings will be reviewed for possible inclusion within the
INSPEC Database. In addition, best selected papers will be published in
one of the following special issues provided that the author do major
improvements and extension within the time frame that will be set by the
conference and his/her paper is approved by the chief editor:

International Journal of New Computer Architectures and their Applications
(IJNCAA)
International Journal of Digital Information and Wireless Communications
(IJDIWC)
International Journal of Cyber-Security and Digital Forensics (IJCSDF)

Important Dates
---------------
Submission Deadline: August 5, 2013
Notification of Acceptance: September 5, 2013
Camera Ready Submission: September 15, 2013
Registration: September 15, 2013
Conference Dates: September 23-25, 2013

Liezelle Ann Canadilla
icia [at] sdiwc [dot] net
Picon

CALL FOR PAPERS - The 2nd Int'l Conference on Informatics & Applications (ICIA2013)

Apologies if you are receiving this mail more than once.

Please disseminate by colleagues, researchers, students, etc. Thanks a lot!

===========================================================================

The Second International Conference on Informatics & Applications (ICIA2013)
Technical University of Lodz
September 23-25, 2013
http://sdiwc.net/conferences/2013/icia2013/

========================================================================
The proposed conference on the above theme will be held at Technical
University of Lodz, Poland, From September 23-25, 2013 which aims to
enable researchers build connections between different digital
applications.

The conference welcomes papers on the following (but not limited to)
research topics:

- Information Ethics
- Information Content Security
- Data Compression
- E-Technology
- E-Government
- E-Learning
- Cloud Computing
- Grid Computing
- Green Computing
- Access Controls
- Data Mining
- Social Search
- Computer Forensics
- Computer Security
- Peer-to-Peer Social Networks
- Information and Data Management
- Network Security
- Social Networks
- Real-Time Systems
- Internet Modeling
- Assurance of Service
- Image Processing
- Web Services Security
- Multimedia Computing
- Software Engineering
- Biometrics Technologies
- Wireless Communications
- Semantic Web, Ontologies
- Mobile Social Networks
- Distributed and Parallel Applications
- Embedded Systems and Software
- Critical Computing and Storage
- Critical Infrastructure Management
- Soft Computing Techniques
- Confidentiality Protection
- Mobile Networking, Mobility and Nomadicity
- Anti-cyberterrorism
- Ubiquitous Computing, Services and Applications
- Forensics, Recognition Technologies and Applications
- Fuzzy and Neural Network Systems
- Signal Processing, Pattern Recognition and Applications
- User Interfaces,Visualization and Modeling
- Mobile, Ad Hoc and Sensor Network Management
- Web Services Architecture, Modeling and Design
- Quality of Service, Scalability and Performance
- Self-Organizing Networks and Networked Systems
- Computational Intelligence
- Data Management in Mobile Peer-to-Peer Networks
- Data Stream Processing in Mobile/Sensor Networks
- Indexing and Query Processing for Moving Objects
- User Interfaces and Usability Issues form Mobile Applications
- Sensor Networks and Social Sensing
- XML-Based Languages
- Cryptography and Data Protection
- Information Propagation on Social Networks
- Resource and Knowledge Discovery Using Social Networks
- Computer Crime Prevention and Detection

All accepted papers will be submitted to IEEE for potential inclusion to
IEEE Xplore.
Researchers are encouraged to submit their work electronically. All papers
will be fully refereed by a minimum of two specialized referees. Before
final acceptance, all referees comments must be considered.

Important Dates
===============

Submission Date              : August 5, 2013
Notification of acceptance   : September 5, 2013
Camera Ready submission      : September 15, 2013
Registration                 : September 15, 2013
Conference dates             : September 23-25, 2013
Picon

retwill - a fork of twill

Hello, all.

I needed some functionalities in twill so I forked it to a project
named retwill. This can be found in BitBucket[1]
(https://bitbucket.org/brandizzi/retwill/).

The changelog explains the changes:
https://bitbucket.org/brandizzi/retwill/src/42130c2aa177/doc/ChangeLog
Basically:

 * it now accepts non string values in dollar expressions (so you can
write ${1} instead of ${str(1)})
 * find/notfind command can search by elements with XPath
 * the output is better controllable now: retwill supports log levels,
log redirecting and output redirecting
 * you can use an specific tidy command (so you can e.g. compile the
tidy-html5 (https://github.com/w3c/tidy-html5) and config it to do not
remove the damned empty <option> tags from your <selects>)

 Note that it includes the excellent updates from Jonathan Rogers.

It is available in PyPI too (http://pypi.python.org/pypi/retwill) so
you can install it via easy_install/pip:

  $ pip install retwill

...at least in theory. I am a setuptools noob and may have made some errors.

I hope it can be helpful to you :)

[1] It is mirrored in github too: https://github.com/brandizzi/retwill

--

-- 
Adam Victor Nazareth Brandizzi
http://brandizzi.googlepages.com/
Ram Rachum | 25 Mar 19:43 2012

Why are hidden fields read-only?

Hello,

I'm using Twill and I tried to fill in a form which has a hidden field.

Twill doesn't let me fill in the hidden field, saying it's read-only:

    AttributeError: control 'user' is readonly

Why is this? What's the problem with writing to a hidden field?


Thanks for your help,
Ram Rachum.
_______________________________________________
twill mailing list
twill@...
http://lists.idyll.org/listinfo/twill
Picon

CFP:: ICIA2012- Malaysia- Kuala Terengganu

The International Conference on Informatics & Applications (ICIA2012)
     University Sultan Zainal Abidin, Kuala Terengganu, Malaysia
                               June 3-5, 2012
                  http://sdiwc.net/conferences/2012/icia2012
========================================================================
The proposed conference on the above theme will be held at University
Sultan Zainal Abidin, Kuala Terengganu, Malaysia, From June 3-5, 2012
which aims to enable researchers build connections between different
digital applications.

The conference welcomes papers on the following (but not limited to)
research topics:

- Information Ethics
- Information Content Security
- Data Compression
- E-Technology
- E-Government
- E-Learning
- Cloud Computing
- Grid Computing
- Green Computing
- Access Controls
- Data Mining
- Social Search
- Computer Forensics
- Computer Security
- Peer-to-Peer Social Networks
- Information and Data Management
- Network Security
- Social Networks
- Real-Time Systems
- Internet Modeling
- Assurance of Service
- Image Processing
- Web Services Security
- Multimedia Computing
- Software Engineering
- Biometrics Technologies
- Wireless Communications
- Semantic Web, Ontologies
- Mobile Social Networks
- Distributed and Parallel Applications
- Embedded Systems and Software
- Critical Computing and Storage
- Critical Infrastructure Management
- Soft Computing Techniques
- Confidentiality Protection
- Mobile Networking, Mobility and Nomadicity
- Anti-cyberterrorism
- Ubiquitous Computing, Services and Applications
- Forensics, Recognition Technologies and Applications
- Fuzzy and Neural Network Systems
- Signal Processing, Pattern Recognition and Applications
- User Interfaces,Visualization and Modeling
- Mobile, Ad Hoc and Sensor Network Management
- Web Services Architecture, Modeling and Design
- Quality of Service, Scalability and Performance
- Self-Organizing Networks and Networked Systems
- Computational Intelligence
- Data Management in Mobile Peer-to-Peer Networks
- Data Stream Processing in Mobile/Sensor Networks
- Indexing and Query Processing for Moving Objects
- User Interfaces and Usability Issues form Mobile Applications
- Sensor Networks and Social Sensing
- XML-Based Languages
- Cryptography and Data Protection
- Information Propagation on Social Networks
- Resource and Knowledge Discovery Using Social Networks
- Computer Crime Prevention and Detection

Researchers are encouraged to submit their work electronically. All papers
will be fully refereed by a minimum of two specialized referees. Before
final acceptance, all referees comments must be considered.

Important Dates
==============

Submission Date           : Apr. 1, 2012
Notification of acceptance: Apr. 15, 2012
Camera Ready submission   : May 2, 2012
Registration              : May 2, 2012
Conference dates          : June 3-5, 2012

Please contact us in facebook:
http://www.facebook.com/pages/The-Society-of-International-and-Wireless-Communications/302179459801047
Picon

CFP:: ICIA2012- Malaysia- Kuala Terengganu

Apologies in advance for multiple received copies of the CFP.

The International Conference on Informatics & Applications (ICIA2012)
     University Sultan Zainal Abidin, Kuala Terengganu, Malaysia
                               June 3-5, 2012
                  http://sdiwc.net/conferences/2012/icia2012
========================================================================
The proposed conference on the above theme will be held at University
Sultan Zainal Abidin, Kuala Terengganu, Malaysia, From June 3-5, 2012
which aims to enable researchers build connections between different
digital applications.

The conference welcomes papers on the following (but not limited to)
research topics:

- Information Ethics
- Information Content Security
- Data Compression
- E-Technology
- E-Government
- E-Learning
- Cloud Computing
- Grid Computing
- Green Computing
- Access Controls
- Data Mining
- Social Search
- Computer Forensics
- Computer Security
- Peer-to-Peer Social Networks
- Information and Data Management
- Network Security
- Social Networks
- Real-Time Systems
- Internet Modeling
- Assurance of Service
- Image Processing
- Web Services Security
- Multimedia Computing
- Software Engineering
- Biometrics Technologies
- Wireless Communications
- Semantic Web, Ontologies
- Mobile Social Networks
- Distributed and Parallel Applications
- Embedded Systems and Software
- Critical Computing and Storage
- Critical Infrastructure Management
- Soft Computing Techniques
- Confidentiality Protection
- Mobile Networking, Mobility and Nomadicity
- Anti-cyberterrorism
- Ubiquitous Computing, Services and Applications
- Forensics, Recognition Technologies and Applications
- Fuzzy and Neural Network Systems
- Signal Processing, Pattern Recognition and Applications
- User Interfaces,Visualization and Modeling
- Mobile, Ad Hoc and Sensor Network Management
- Web Services Architecture, Modeling and Design
- Quality of Service, Scalability and Performance
- Self-Organizing Networks and Networked Systems
- Computational Intelligence
- Data Management in Mobile Peer-to-Peer Networks
- Data Stream Processing in Mobile/Sensor Networks
- Indexing and Query Processing for Moving Objects
- User Interfaces and Usability Issues form Mobile Applications
- Sensor Networks and Social Sensing
- XML-Based Languages
- Cryptography and Data Protection
- Information Propagation on Social Networks
- Resource and Knowledge Discovery Using Social Networks
- Computer Crime Prevention and Detection

Researchers are encouraged to submit their work electronically. All papers
will be fully refereed by a minimum of two specialized referees. Before
final acceptance, all referees comments must be considered.

Important Dates
==============

Submission Date           : Apr. 1, 2012
Notification of acceptance: Apr. 15, 2012
Camera Ready submission   : May 2, 2012
Registration              : May 2, 2012
Conference dates          : June 3-5, 2012

Please contact us in facebook:
http://www.facebook.com/pages/The-Society-of-International-and-Wireless-Communications/302179459801047
Picon

CFP:: ICIA2012- Malaysia- Kuala Terengganu

Apologies in advance for multiple received copies of the CFP.

The International Conference on Informatics & Applications (ICIA2012)
     University Sultan Zainal Abidin, Kuala Terengganu, Malaysia
                               June 3-5, 2012
                       http://www.sdiwc.net/icia2012/
========================================================================
The proposed conference on the above theme will be held at University
Sultan Zainal Abidin, Kuala Terengganu, Malaysia, From June 3-5, 2012
which aims to enable researchers build connections between different
digital applications.

The conference welcomes papers on the following (but not limited to)
research topics:

- Information Ethics
- Information Content Security
- Data Compression
- E-Technology
- E-Government
- E-Learning
- Cloud Computing
- Grid Computing
- Green Computing
- Access Controls
- Data Mining
- Social Search
- Computer Forensics
- Computer Security
- Peer-to-Peer Social Networks
- Information and Data Management
- Network Security
- Social Networks
- Real-Time Systems
- Internet Modeling
- Assurance of Service
- Image Processing
- Web Services Security
- Multimedia Computing
- Software Engineering
- Biometrics Technologies
- Wireless Communications
- Semantic Web, Ontologies
- Mobile Social Networks
- Distributed and Parallel Applications
- Embedded Systems and Software
- Critical Computing and Storage
- Critical Infrastructure Management
- Soft Computing Techniques
- Confidentiality Protection
- Mobile Networking, Mobility and Nomadicity
- Anti-cyberterrorism
- Ubiquitous Computing, Services and Applications
- Forensics, Recognition Technologies and Applications
- Fuzzy and Neural Network Systems
- Signal Processing, Pattern Recognition and Applications
- User Interfaces,Visualization and Modeling
- Mobile, Ad Hoc and Sensor Network Management
- Web Services Architecture, Modeling and Design
- Quality of Service, Scalability and Performance
- Self-Organizing Networks and Networked Systems
- Computational Intelligence
- Data Management in Mobile Peer-to-Peer Networks
- Data Stream Processing in Mobile/Sensor Networks
- Indexing and Query Processing for Moving Objects
- User Interfaces and Usability Issues form Mobile Applications
- Sensor Networks and Social Sensing
- XML-Based Languages
- Cryptography and Data Protection
- Information Propagation on Social Networks
- Resource and Knowledge Discovery Using Social Networks
- Computer Crime Prevention and Detection

Researchers are encouraged to submit their work electronically. All papers
will be fully refereed by a minimum of two specialized referees. Before
final acceptance, all referees comments must be considered.

Important Dates
==============

Submission Date           : Apr. 1, 2012
Notification of acceptance: Apr. 15, 2012
Camera Ready submission   : May 2, 2012
Registration              : May 2, 2012
Conference dates          : June 3-5, 2012
Picon

CFP:: ICIA2012- Malaysia- Kuala Terengganu

Apologies in advance for multiple received copies of the CFP.

The International Conference on Informatics & Applications (ICIA2012)
     University Sultan Zainal Abidin, Kuala Terengganu, Malaysia
                               June 3-5, 2012
                       http://www.sdiwc.net/icia2012/
========================================================================
The proposed conference on the above theme will be held at University
Sultan Zainal Abidin, Kuala Terengganu, Malaysia, From June 3-5, 2012
which aims to enable researchers build connections between different
digital applications.

The conference welcomes papers on the following (but not limited to)
research topics:

- Information Ethics
- Information Content Security
- Data Compression
- E-Technology
- E-Government
- E-Learning
- Cloud Computing
- Grid Computing
- Green Computing
- Access Controls
- Data Mining
- Social Search
- Computer Forensics
- Computer Security
- Peer-to-Peer Social Networks
- Information and Data Management
- Network Security
- Social Networks
- Real-Time Systems
- Internet Modeling
- Assurance of Service
- Image Processing
- Web Services Security
- Multimedia Computing
- Software Engineering
- Biometrics Technologies
- Wireless Communications
- Semantic Web, Ontologies
- Mobile Social Networks
- Distributed and Parallel Applications
- Embedded Systems and Software
- Critical Computing and Storage
- Critical Infrastructure Management
- Soft Computing Techniques
- Confidentiality Protection
- Mobile Networking, Mobility and Nomadicity
- Anti-cyberterrorism
- Ubiquitous Computing, Services and Applications
- Forensics, Recognition Technologies and Applications
- Fuzzy and Neural Network Systems
- Signal Processing, Pattern Recognition and Applications
- User Interfaces,Visualization and Modeling
- Mobile, Ad Hoc and Sensor Network Management
- Web Services Architecture, Modeling and Design
- Quality of Service, Scalability and Performance
- Self-Organizing Networks and Networked Systems
- Computational Intelligence
- Data Management in Mobile Peer-to-Peer Networks
- Data Stream Processing in Mobile/Sensor Networks
- Indexing and Query Processing for Moving Objects
- User Interfaces and Usability Issues form Mobile Applications
- Sensor Networks and Social Sensing
- XML-Based Languages
- Cryptography and Data Protection
- Information Propagation on Social Networks
- Resource and Knowledge Discovery Using Social Networks
- Computer Crime Prevention and Detection

Researchers are encouraged to submit their work electronically. All papers
will be fully refereed by a minimum of two specialized referees. Before
final acceptance, all referees comments must be considered.

Important Dates
==============

Submission Date           : Apr. 1, 2012
Notification of acceptance: Apr. 15, 2012
Camera Ready submission   : May 2, 2012
Registration              : May 2, 2012
Conference dates          : June 3-5, 2012

Gmane