The 2016 International Conference on Security and Management
Las Vegas, USA, July 25-28
WORLDCOMP 2016
Call for Papers
The 2016 International Conference on Security and Management (SAM’16) is the 15th annual comprehensive security conference dealing with all aspects of security. This annual Security and Management Conference is a leading international opportunity for computer and network security professionals and users to investigate innovative ideas and outcomes, and to exchange experiences on various aspects of information security.
You are invited to submit a full paper for consideration. Novel research in all practical areas of computer and network security is sought. Submissions from academia, government, and industry are encouraged. All accepted papers will be published in the SAM’16 conference proceedings (in printed book form; later, the proceedings will also be accessible online). Papers should demonstrate significant contribution to the construction, evaluation, application, or operation of secure systems.
There are nine tracks in this conference; Cryptographic Technologies, Security Applications, Information Assurance, Network Security, Hardware Security, Computer Security, Security management, Security Education, and Biometrics and Forensics. For details of the tracks, please refer to the conference website at http://sam.udmercy.edu/sam16 and click on “Call for Papers.”
Prospective authors are invited to submit their papers by uploading them to the evaluation website at:
https://easychair.org/conferences/?conf=sam160
If you have not used EasyChair before, please create your new account first. To upload your paper, please click on “New Submission.” The first page of the draft paper should include: title of the paper, name, affiliation, postal address, and email address for each author. The first page should also identify the name of the Contact Author and a maximum of 5 topical keywords that would best represent the content of the paper. Please ensure that the first page also includes the TRACK(s) that you regard as the most appropriate one for your paper review.
Important Dates
March 22, 2016
Submission of full papers (about 7 pages)
April 17, 2016
Notification of acceptance (+/- two days)
May 10, 2016
Final papers + Copyright + Registration
July 25-28, 2016 The 2016 International Conference on Security and Management
Contact Information
Dr. Kevin Daimi, Conference Chair
Computer Science and Software Engineering
University of Detroit Mercy,
Detroit, MI, 48221-3038, USA
Email: daimikj@udmercy.edu
This site is for announcements for The International Conference on Security and Management (SAM) at The World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP). See http://www.world-academy-of-science.org for the WORLDCOMP Web site. SAM'15 URL: http://sam.udmercy.edu/sam15/
Showing posts with label SAM. Show all posts
Showing posts with label SAM. Show all posts
Sunday, January 24, 2016
Call for Posters: The 2016 International Conference on Security and Management (SAM'16), Las Vegas, USA, July 25-28, 2016
The 2016 International Conference on Security and Management
Las Vegas, USA, July 25 - 28
WORLDCOMP 2016
Call for Posters
The 2016 International Conference on Security and Management (SAM’16) is the 15th annual comprehensive security conference dealing with all aspects of security. This annual Security and Management Conference is a leading international opportunity for computer and network security professionals and users to investigate innovative ideas and outcomes, and to exchange experiences on various aspects of information security.
There are nine tracks in this conference; Cryptographic Technologies, Security Applications, Information Assurance, Network Security, Hardware Security, Computer Security, Security management, Security Education, and Biometrics and Forensics. For details of the tracks, please refer to the conference website at http://sam.udmercy.edu/sam16.
The 2016 International Conference on Security and Management (SAM’16) encourages the submission of posters to provide an environment for demonstrating and discussing work in progress, and industry presentations of new applications, techniques, technologies, or approaches in the field of computer and network security. Interested authors are invited to submit a short proposal illustrating the main contributions of their posters. Proposals should contain an abstract stressing the motivation and rationale for their contribution. Poster may reflect initial results of the work.
Posters will be evaluated mainly on their ability to promote discussion, inspire the exchange of ideas, and foster collaborations among conference participants. Poster proposals must conform to IEEE writing style guidelines with 3 pages maximum including title, authors’ affiliation, abstract, content, figures, and references.
Accepted posters will be published as an extended abstract. The maximum number of pages for the extended abstract is 2.
Poster boards will be provided on site at the conference. The poster boards will be large enough to accommodate 8 US standard size stationaries to be pinned on them using 4 rows with 2 pages per row, or 2 rows with 4 pages per row. The poster board sizes are 45 inches x 22 inches. The boards can be flipped if desired. Two poster boards next to each other for one accepted poster can be arranged if needed.
Submissions should be emailed to the Posters Co-Chair; Hanen Idoudi (Hanen.Idoudi@ensi.rnu.tn), or Esmiralda Moradian (esmirald@dsv.su.se).
Las Vegas, USA, July 25 - 28
WORLDCOMP 2016
Call for Posters
The 2016 International Conference on Security and Management (SAM’16) is the 15th annual comprehensive security conference dealing with all aspects of security. This annual Security and Management Conference is a leading international opportunity for computer and network security professionals and users to investigate innovative ideas and outcomes, and to exchange experiences on various aspects of information security.
There are nine tracks in this conference; Cryptographic Technologies, Security Applications, Information Assurance, Network Security, Hardware Security, Computer Security, Security management, Security Education, and Biometrics and Forensics. For details of the tracks, please refer to the conference website at http://sam.udmercy.edu/sam16.
The 2016 International Conference on Security and Management (SAM’16) encourages the submission of posters to provide an environment for demonstrating and discussing work in progress, and industry presentations of new applications, techniques, technologies, or approaches in the field of computer and network security. Interested authors are invited to submit a short proposal illustrating the main contributions of their posters. Proposals should contain an abstract stressing the motivation and rationale for their contribution. Poster may reflect initial results of the work.
Posters will be evaluated mainly on their ability to promote discussion, inspire the exchange of ideas, and foster collaborations among conference participants. Poster proposals must conform to IEEE writing style guidelines with 3 pages maximum including title, authors’ affiliation, abstract, content, figures, and references.
Accepted posters will be published as an extended abstract. The maximum number of pages for the extended abstract is 2.
Poster boards will be provided on site at the conference. The poster boards will be large enough to accommodate 8 US standard size stationaries to be pinned on them using 4 rows with 2 pages per row, or 2 rows with 4 pages per row. The poster board sizes are 45 inches x 22 inches. The boards can be flipped if desired. Two poster boards next to each other for one accepted poster can be arranged if needed.
Submissions should be emailed to the Posters Co-Chair; Hanen Idoudi (Hanen.Idoudi@ensi.rnu.tn), or Esmiralda Moradian (esmirald@dsv.su.se).
Call for Sessions: The 2016 International Conference on Security and Management (SAM'16), Las Vegas, USA, July 25-28, 2016
The 2016 International Conference on Security and Management
Las Vegas, USA, July 25 - 28
WORLDCOMP 2016
Session/ Workshop Organization
The 2016 International Conference on Security and Management (SAM’16) is the 15th annual comprehensive security conference dealing with all aspects of security. This annual Security and Management Conference is a leading international opportunity for computer and network security professionals and users to investigate innovative ideas and outcomes, and to exchange experiences on various aspects of information security.
There are nine tracks in this conference; Cryptographic Technologies, Security Applications, Information Assurance, Network Security, Hardware Security, Computer Security, Security management, Security Education, and Biometrics and Forensics. For details of the tracks, please refer to the conference website at http://sam.udmercy.edu/sam16.
You are invited to submit a proposal to organize a session or a workshop. Each technical session will have at least 6 paper presentations from different authors (12 papers in the case of workshop). The session/workshop chairs will be responsible for all aspects of their sessions/workshop; including, soliciting, reviewing, and selecting papers. The names of session/workshop chairs will appear as Associate Editors in the conference proceedings and on the cover of the books. Proposers may submit more than one session/workshop proposal.
Proposals to organize technical sessions/workshops should include the following information:
Name, address, E-mail of proposer in addition to his/her biography.
Title of session/workshop.
A 100-word description of the session/workshop.
A short description of the process for reviewing and selecting papers.
A short description on how the session/workshop will be advertised (in most cases, session/workshop proposers solicit papers from colleagues and researchers whose work is known to the session proposer).
Email your session/workshop proposal to the Sessions/Workshops Co-chairs, Flaminia Luccio (luccio@unive.it) or Shadi Banitaan (banitash@udmercy.edu). The deadline for proposals is February 5, 2016. We would like to receive the session/workshop proposals as soon as possible.
Las Vegas, USA, July 25 - 28
WORLDCOMP 2016
Session/ Workshop Organization
The 2016 International Conference on Security and Management (SAM’16) is the 15th annual comprehensive security conference dealing with all aspects of security. This annual Security and Management Conference is a leading international opportunity for computer and network security professionals and users to investigate innovative ideas and outcomes, and to exchange experiences on various aspects of information security.
There are nine tracks in this conference; Cryptographic Technologies, Security Applications, Information Assurance, Network Security, Hardware Security, Computer Security, Security management, Security Education, and Biometrics and Forensics. For details of the tracks, please refer to the conference website at http://sam.udmercy.edu/sam16.
You are invited to submit a proposal to organize a session or a workshop. Each technical session will have at least 6 paper presentations from different authors (12 papers in the case of workshop). The session/workshop chairs will be responsible for all aspects of their sessions/workshop; including, soliciting, reviewing, and selecting papers. The names of session/workshop chairs will appear as Associate Editors in the conference proceedings and on the cover of the books. Proposers may submit more than one session/workshop proposal.
Proposals to organize technical sessions/workshops should include the following information:
Name, address, E-mail of proposer in addition to his/her biography.
Title of session/workshop.
A 100-word description of the session/workshop.
A short description of the process for reviewing and selecting papers.
A short description on how the session/workshop will be advertised (in most cases, session/workshop proposers solicit papers from colleagues and researchers whose work is known to the session proposer).
Email your session/workshop proposal to the Sessions/Workshops Co-chairs, Flaminia Luccio (luccio@unive.it) or Shadi Banitaan (banitash@udmercy.edu). The deadline for proposals is February 5, 2016. We would like to receive the session/workshop proposals as soon as possible.
Friday, May 8, 2015
Call for Late Breaking Papers, Position Papers, Abstracts, Posters: The 2015 International Conference on Security and Management (SAM’15), U.S.A., July 27-30, 2015, Submission Deadline: May 31, 2015
Call for Late Breaking Papers, Position
Papers, Abstracts, Posters:
The 2015 International Conference on
Security and Management (SAM’15), U.S.A., July 27-30, 2015,
Submission Deadline: May 31, 2015
This announcement is ONLY for
those who MISSED the opportunity to submit their papers in response to earlier
"Call for Papers". Therefore, authors who have ALREADY submitted
papers in response to earlier "Call for Papers" should IGNORE this
announcement. (Those who have been notified that their papers have been
accepted, MUST still follow the instructions that were emailed to them;
including meeting the deadlines mentioned in the notifications that were sent
to them).
INVITATION:
You are invited to submit a
"LATE BREAKING PAPER", "POSITION PAPER", or
"ABSTRACT/POSTER PAPER" for consideration. All accepted papers will
be published in printed conference books/proceedings (ISBN) and will also be
made available online. In addition, like prior years, extended versions of
selected papers (about 35%) of the conference will appear in journals and
edited research books (publishers include: Springer, Elsevier, BMC, and
others); some of these books and journal special issues have already received
the top 25% downloads in their respective fields. See the link below for a very
small subset of the books published mostly based on extended versions of the
accepted papers of this congress:
http://www.worldacademyofscience.org/worldcomp15/ws/publications.
The titles of proceedings of the federated congress have been indexed into the
ACM Digital Library ( http://dl.acm.org/ )
which includes bibliographic citations from major publishers in computing.
SAM’15 is part the 2015 World Congress in Computer Science, Computer
Engineering, and Applied Computing. The Congress is composed of a
number of tracks (federated/joint conferences, tutorials, sessions, workshops,
poster and panel discussions); all will be held simultaneously, same location
and dates: July 27-30, 2015. For the complete list of joint conferences, see
below. To get a feeling about the conferences' atmosphere, see some delegates’
photos available at:
SUBMISSION OF LATE BREAKING
PAPERS, POSITION PAPERS, ABSTRACTS/POSTERS:
In response to this
announcement, authors are given the opportunity to submit their papers for
evaluation in one of the following three paper categories:
1.
LATE BREAKING PAPERS: describe
late-breaking/recent developments in
the field. The maximum number of pages is 7. Please write the following
on the first page of your submission "name of conference: LATE BREAKING
PAPER". If accepted, the length of the final/Camera-Ready paper will be
limited to 7 (two-column IEEE style) pages and the author will be given the
opportunity to present the paper in a formal session.
2.
POSITION PAPERS: enable discussions on emerging
topics without the experimentation normally present in an academic paper.
Commonly, such papers will substantiate the opinions or positions put forward
with evidence from an extensive objective discussion of the topic. The maximum
number of pages is 5. Please write the following on the first page of your
submission "name of conference: POSITION PAPER". If accepted, the length of the
final/Camera-Ready paper will be limited to 4 (two-column IEEE style) pages and
the author will be given the opportunity to present the paper in a formal
session.
3.
ABSTRACT/POSTER PAPERS: describe research
roadmaps (similar to PhD plan or PhD prospectus). The maximum number of pages
is 2. Please write the following on the first page of your submission
"name of conference: ABSTRACT/POSTER PAPER". If accepted, The length
of the final/Camera-Ready paper will be limited to 2 (two-column IEEE style)
pages and the author will be given the opportunity to present the paper in a discussion/poster
session.
Important Dates
Submission Deadline: May
31, 2015
Contact Information
Dr.
Kevin Daimi, Conference Chair
Computer
Science and Software Engineering
University
of Detroit Mercy,
Detroit,
MI, 48221-3038, USA
Email: daimikj@udmercy.edu
Sunday, March 22, 2015
The 2015 International Conference on Security and Management
Las Vegas, USA, July 27-30
WORLDCOMP 2015
Call for Papers
The 2015 International Conference on Security and Management (SAM’15) is the 14th annual comprehensive security
conference dealing with all aspects of security. This annual Security and Management Conference is a leading
international opportunity for computer and network security professionals and users to investigate innovative ideas and
outcomes, and to exchange experiences on various aspects of information security.
You are invited to submit a full paper for consideration. Novel research in all practical areas of computer and network
security is sought. Submissions from academia, government, and industry are encouraged. All accepted papers will be
published in the SAM’15 conference proceedings (in printed book form; later, the proceedings will also be accessible
online). Papers should demonstrate significant contribution to the construction, evaluation, application, or operation of
secure systems.
There are nine tracks in this conference; Cryptographic Technologies, Security Applications, Information Assurance,
Network Security, Hardware Security, Computer Security, Security management, Security Education, and Biometrics and
Forensics. For details of the tracks, please refer to the conference website at http://sam.udmercy.edu/sam15 and click on
“Call for Papers.”
Prospective authors are invited to submit their papers by uploading them to the evaluation website at:
https://www.easychair.org/conferences/?conf=sam15
If you have not used EasyChair before, please create your new account first. To upload your paper, please click on “New
Submission.” The first page of the draft paper should include: title of the paper, name, affiliation, postal address, and
email address for each author. The first page should also identify the name of the Contact Author and a maximum of 5
topical keywords that would best represent the content of the paper. Please ensure that the first page also includes the
TRACK(s) that you regard as the most appropriate one for your paper review.
Important Dates
March 31, 2015 Submission of full papers (about 7 pages)
April 24, 2015 Notification of acceptance (+/- two days)
May 15, 2015 Final papers + Copyright + Registration
July 27-30, 2015 The 2015 International Conference on Security and Management
Contact Information
Dr. Kevin Daimi, Conference Chair
Computer Science and Software Engineering
University of Detroit Mercy,
Detroit, MI, 48221-3038, USA
Email: daimikj@udmercy.edu
Las Vegas, USA, July 27-30
WORLDCOMP 2015
Call for Papers
The 2015 International Conference on Security and Management (SAM’15) is the 14th annual comprehensive security
conference dealing with all aspects of security. This annual Security and Management Conference is a leading
international opportunity for computer and network security professionals and users to investigate innovative ideas and
outcomes, and to exchange experiences on various aspects of information security.
You are invited to submit a full paper for consideration. Novel research in all practical areas of computer and network
security is sought. Submissions from academia, government, and industry are encouraged. All accepted papers will be
published in the SAM’15 conference proceedings (in printed book form; later, the proceedings will also be accessible
online). Papers should demonstrate significant contribution to the construction, evaluation, application, or operation of
secure systems.
There are nine tracks in this conference; Cryptographic Technologies, Security Applications, Information Assurance,
Network Security, Hardware Security, Computer Security, Security management, Security Education, and Biometrics and
Forensics. For details of the tracks, please refer to the conference website at http://sam.udmercy.edu/sam15 and click on
“Call for Papers.”
Prospective authors are invited to submit their papers by uploading them to the evaluation website at:
https://www.easychair.org/conferences/?conf=sam15
If you have not used EasyChair before, please create your new account first. To upload your paper, please click on “New
Submission.” The first page of the draft paper should include: title of the paper, name, affiliation, postal address, and
email address for each author. The first page should also identify the name of the Contact Author and a maximum of 5
topical keywords that would best represent the content of the paper. Please ensure that the first page also includes the
TRACK(s) that you regard as the most appropriate one for your paper review.
Important Dates
March 31, 2015 Submission of full papers (about 7 pages)
April 24, 2015 Notification of acceptance (+/- two days)
May 15, 2015 Final papers + Copyright + Registration
July 27-30, 2015 The 2015 International Conference on Security and Management
Contact Information
Dr. Kevin Daimi, Conference Chair
Computer Science and Software Engineering
University of Detroit Mercy,
Detroit, MI, 48221-3038, USA
Email: daimikj@udmercy.edu
CALL FOR PAPERS
and
CALL FOR WORKSHOP/SESSION PROPOSALS
Paper Submission Deadline: March 31, 2015
SAM'15
The 2015 International Conference on Security and Management
July 27-30, 2015, Las Vegas, USA
http://sam.udmercy.edu/sam15
You are invited to submit a paper for consideration. All accepted papers
will be published in printed conference books/proceedings (ISBN) and will
also be made available online. The proceedings will be indexed in science
citation databases that track citation frequency/data. In addition, like
prior years, extended versions of selected papers (about 35%) of the
conference will appear in journals and edited research books (publishers
include: Springer, Elsevier, BMC, and others; a list that includes a
small subset of such books and journal special issues appear in this
document); some of these books and journal special issues have already
received the top 25% downloads in their respective fields.
SAM'15 is composed of a number of tracks, including: tutorials, sessions,
workshops, posters, and panel discussions.
SCOPE: Topics of interest include, but are not limited to, the following:
O NETWORK SECURITY:
- Security Algorithms
- Mobile Network Security
- Security in CDN (Contents Distribution Networks)
- Virtual Private Network (VPN)
- Tracing Techniques in Internet
- Active Networks
- Security in Grid
- Web Monitoring
- Control Systems/SCADA Security
- Network Security Engineering
- Transport-Level Security
- Wireless Network Security
- IP Security
- Electronic Mail security
O CRYPTOGRAPHIC TECHNOLOGIES:
- Security Protocols
- Key Management Techniques
- Cryptographic Technologies
- Applications of Block and Stream Ciphers
- Applications of Public Key Cryptology
- Message Authentication and Hash Functions
- Anonymity
- Digital Signature Schemes
- Secret Sharing
- Cryptanalysis
O SECURITY MANAGEMENT:
- Surveillance Technologies
- Security Policies
- Security for Protocol Management
- Location Management
- QoS Management
- Resource Management
- Channel Management
- Mobility Management
- Digital Contents Copyright Protection
- System Security Management
- Network Security Management
- Management in Network Equipment
- Storage Area Networks (SAN) Management
- Information Security Management
- Government Security Policy
- Web Penetration Testing
- Security Operations
- Vulnerabilities Management
O SECURITY EDUCATION:
- Computer Security Education
- Network Security Education
- Cyber Security Education
- Cyber Security Body of Knowledge
- Information Assurance Education
O INFORMATION ASSURANCE:
- Mission Assurance
- Risk Assessment and Risk Management
- Continuity of Operations and Business Impact Analysis
- Cyber Security Compliance
- Security Auditing
- Security-Savvy Software Development
- Disaster Recovery
- Business Continuity Analysis
- Access Control
- Secure Use of Software
- Secure Performance
O BIOMETRICS AND FORENSICS:
- Novel Biometric Methods
- Forensics
- Biological Security Technologies
- Face Recognition Systems
- Signature Recognition Systems
- Cyber Forensics
- Forensic Analysis
- Biometric Technologies for Security
- Feature Extraction and Matching Algorithms
O HARDWARE SECURITY:
- Embedded Systems Security
- Cryptographic Processors and Co-Processors
- Security Architectures
- True and Pseudorandom Number Generators
- Side Channel Attacks
- Fault Attacks
- Hardware Tamper Resistance
- Smart Card Processors
- Secure Storage Devices
O SECURITY APPLICATIONS:
- Security in E-Commerce and M-Commerce
- Secure OS
- Watermarking
- High-Tech Systems at Airports
- Emerging Technologies and Applications
- Cloud Computing Security
- Database Security
- Data Mining Security
- Cyber Security Automation
O COMPUTER SECURITY:
- Firewall Systems
- Hacking Techniques and Related Issues
- Intrusion Detection System (IDS)
- Honeypot
- Virus Issues (Detection, Prevention ...)
- Trusted Computing
- Alert Correlation
- Attack Graphs
- Incident Responding
- Malware Analysis
- Incident Responding
IMPORTANT DATES:
March 31,2015: Submission of full papers (about 7 pages)
April 24, 2015: Notification of acceptance (+/- two days)
May 15, 2015: Final papers + Copyright + Registration
July 27-30, 2015: The 2015 International Conference on Security and
Management (SAM'15)
SUBMISSION OF REGULAR PAPERS:
Prospective authors are invited to submit their papers by uploading
them to the evaluation web site at:
https://www.easychair.org/conferences/?conf=sam15
Submissions must be uploaded by March 31, 2015 and must be in either
pdf format (about 7 pages including all figures, tables, and
references - single space, font size of 10 to 12). All reasonable
typesetting formats are acceptable (later, the authors of accepted
papers will be asked to follow a particular typesetting format to
prepare their final papers for publication.) Papers must not have been
previously published or currently submitted for publication elsewhere.
The first page of the paper should include: title of the paper, name,
affiliation, postal address, and email address for each author. The
first page should also identify the name of the Contact Author and a
maximum of 5 topical keywords that would best represent the content
of the paper. The track title must also be stated on the first page of
the paper as well as a 100 to 150-word abstract. The length of the
final/Camera-Ready papers (if accepted) will be limited to 7 (two-column
IEEE style) pages.
Each paper will be peer-reviewed by two experts in the field for
originality, significance, clarity, impact, and soundness. In cases of
contradictory recommendations, a member of the conference program
committee would be charged to make the final decision (accept/reject);
often, this would involve seeking help from additional referees. Papers
whose authors include a member of the conference program committee will
be evaluated using the double-blinded review process. (Essay/philosophical
papers will not be refereed but may be considered for discussion/panels).
The proceedings will be published in printed conference books (ISBN) and
will also be made available online. The printed proceedings/books will
be available for distribution on site at the conference. The proceedings
will be indexed in science citation databases that track citation
frequency/data. The proceedings/books of SAM annual conferences have
been evaluated and approved for inclusion into major science citation
index databases for indexing, integrating, and inclusion into relevant
systems. The proceedings have also been approved for inclusion into
EBSCO (www.ebsco.com), one of the largest subject index systems. The
titles of proceedings of SAM have been indexed into the ACM Digital
Library ( http://dl.acm.org/ ) which includes bibliographic citations
from major publishers in computing.
In addition to the above, we have arranged two new book series (multiple
books in each series); one with Elsevier publishers (Emerging Trends in
Computer Science and Applied Computing) and another with Springer
publishers (Transactions of Computational Science and Computational
Intelligence). After the conference (the process may take 12 to 18
months), a significant number of authors of accepted papers of our
congress, will be given the opportunity to submit the extended version
of their papers for publication consideration in these books. We
anticipate having between 10 and 20 books a year in each of these
book series projects. Each book in each series will be subject to
Elsevier and Springer science indexing products (which includes:
Scopus, www.info.scopus.com; SCI Compendex, Engineering Village,
www.ei.org; EMBASE, www.info.embase.com; and others). For a recent and
a very small subset of the books (and journal special issues) that have
been published based on the extended versions of our congress papers,
see below:
http://www.worldacademyofscience.org/worldcomp15/ws/books_journals
SUBMISSION OF POSTER PAPERS:
Poster papers can be 2 pages long. Authors are to follow the same
instructions that appear above (see, SUBMISSION OF REGULAR PAPERS) except
for poster submission is limited to 2 pages. On the first page, the author
should state that "This paper is being submitted as a poster". Poster
papers (if accepted) will be published if and only the author of the
accepted paper wishes to do so. Please email your poster papers to the
poster co-chairs:
Hanen Idoudi ( Hanen.Idoudi@ensi.rnu.tn ), or
Esmiralda Moradian ( esmirald@dsv.su.se ).
PROPOSAL FOR ORGANIZING WORKSHOPS/SESSIONS:
Each conference is composed of a number of tracks. A track can be a session,
a workshop, or a symposium. A session will have at least 6 papers; a
workshop at least 12 papers; and a symposium at least 18 papers. Track
chairs will be responsible for all aspects of their tracks, including:
soliciting papers, reviewing, selecting, ... The names of track chairs
will appear as Associate Editors in the conference proceedings and on the
cover of the printed books (and indexed in science databases as such).
Proposals to organize tracks (sessions, workshops, or symposiums) should
include the following information: name and address (+ email) of proposer,
his/her biography, title of track, a 100-word description of the topic of
the track, and a short description on how the track will be advertised
(in most cases, track proposers solicit papers from colleagues and
researchers whose work is known to the track proposer). E-mail your track
proposal to the Workshops/Sessions co-chairs:
Flaminia Luccio ( luccio@unive.it ) or Shadi Banitaan ( banitash@udmercy.edu ).
We would like to receive the track proposals as soon as possible but by no
later than February 15, 2015.
CONTACT:
Inquiries should be sent to: daimikj@udmercy.edu
and
CALL FOR WORKSHOP/SESSION PROPOSALS
Paper Submission Deadline: March 31, 2015
SAM'15
The 2015 International Conference on Security and Management
July 27-30, 2015, Las Vegas, USA
http://sam.udmercy.edu/sam15
You are invited to submit a paper for consideration. All accepted papers
will be published in printed conference books/proceedings (ISBN) and will
also be made available online. The proceedings will be indexed in science
citation databases that track citation frequency/data. In addition, like
prior years, extended versions of selected papers (about 35%) of the
conference will appear in journals and edited research books (publishers
include: Springer, Elsevier, BMC, and others; a list that includes a
small subset of such books and journal special issues appear in this
document); some of these books and journal special issues have already
received the top 25% downloads in their respective fields.
SAM'15 is composed of a number of tracks, including: tutorials, sessions,
workshops, posters, and panel discussions.
SCOPE: Topics of interest include, but are not limited to, the following:
O NETWORK SECURITY:
- Security Algorithms
- Mobile Network Security
- Security in CDN (Contents Distribution Networks)
- Virtual Private Network (VPN)
- Tracing Techniques in Internet
- Active Networks
- Security in Grid
- Web Monitoring
- Control Systems/SCADA Security
- Network Security Engineering
- Transport-Level Security
- Wireless Network Security
- IP Security
- Electronic Mail security
O CRYPTOGRAPHIC TECHNOLOGIES:
- Security Protocols
- Key Management Techniques
- Cryptographic Technologies
- Applications of Block and Stream Ciphers
- Applications of Public Key Cryptology
- Message Authentication and Hash Functions
- Anonymity
- Digital Signature Schemes
- Secret Sharing
- Cryptanalysis
O SECURITY MANAGEMENT:
- Surveillance Technologies
- Security Policies
- Security for Protocol Management
- Location Management
- QoS Management
- Resource Management
- Channel Management
- Mobility Management
- Digital Contents Copyright Protection
- System Security Management
- Network Security Management
- Management in Network Equipment
- Storage Area Networks (SAN) Management
- Information Security Management
- Government Security Policy
- Web Penetration Testing
- Security Operations
- Vulnerabilities Management
O SECURITY EDUCATION:
- Computer Security Education
- Network Security Education
- Cyber Security Education
- Cyber Security Body of Knowledge
- Information Assurance Education
O INFORMATION ASSURANCE:
- Mission Assurance
- Risk Assessment and Risk Management
- Continuity of Operations and Business Impact Analysis
- Cyber Security Compliance
- Security Auditing
- Security-Savvy Software Development
- Disaster Recovery
- Business Continuity Analysis
- Access Control
- Secure Use of Software
- Secure Performance
O BIOMETRICS AND FORENSICS:
- Novel Biometric Methods
- Forensics
- Biological Security Technologies
- Face Recognition Systems
- Signature Recognition Systems
- Cyber Forensics
- Forensic Analysis
- Biometric Technologies for Security
- Feature Extraction and Matching Algorithms
O HARDWARE SECURITY:
- Embedded Systems Security
- Cryptographic Processors and Co-Processors
- Security Architectures
- True and Pseudorandom Number Generators
- Side Channel Attacks
- Fault Attacks
- Hardware Tamper Resistance
- Smart Card Processors
- Secure Storage Devices
O SECURITY APPLICATIONS:
- Security in E-Commerce and M-Commerce
- Secure OS
- Watermarking
- High-Tech Systems at Airports
- Emerging Technologies and Applications
- Cloud Computing Security
- Database Security
- Data Mining Security
- Cyber Security Automation
O COMPUTER SECURITY:
- Firewall Systems
- Hacking Techniques and Related Issues
- Intrusion Detection System (IDS)
- Honeypot
- Virus Issues (Detection, Prevention ...)
- Trusted Computing
- Alert Correlation
- Attack Graphs
- Incident Responding
- Malware Analysis
- Incident Responding
IMPORTANT DATES:
March 31,2015: Submission of full papers (about 7 pages)
April 24, 2015: Notification of acceptance (+/- two days)
May 15, 2015: Final papers + Copyright + Registration
July 27-30, 2015: The 2015 International Conference on Security and
Management (SAM'15)
SUBMISSION OF REGULAR PAPERS:
Prospective authors are invited to submit their papers by uploading
them to the evaluation web site at:
https://www.easychair.org/conferences/?conf=sam15
Submissions must be uploaded by March 31, 2015 and must be in either
pdf format (about 7 pages including all figures, tables, and
references - single space, font size of 10 to 12). All reasonable
typesetting formats are acceptable (later, the authors of accepted
papers will be asked to follow a particular typesetting format to
prepare their final papers for publication.) Papers must not have been
previously published or currently submitted for publication elsewhere.
The first page of the paper should include: title of the paper, name,
affiliation, postal address, and email address for each author. The
first page should also identify the name of the Contact Author and a
maximum of 5 topical keywords that would best represent the content
of the paper. The track title must also be stated on the first page of
the paper as well as a 100 to 150-word abstract. The length of the
final/Camera-Ready papers (if accepted) will be limited to 7 (two-column
IEEE style) pages.
Each paper will be peer-reviewed by two experts in the field for
originality, significance, clarity, impact, and soundness. In cases of
contradictory recommendations, a member of the conference program
committee would be charged to make the final decision (accept/reject);
often, this would involve seeking help from additional referees. Papers
whose authors include a member of the conference program committee will
be evaluated using the double-blinded review process. (Essay/philosophical
papers will not be refereed but may be considered for discussion/panels).
The proceedings will be published in printed conference books (ISBN) and
will also be made available online. The printed proceedings/books will
be available for distribution on site at the conference. The proceedings
will be indexed in science citation databases that track citation
frequency/data. The proceedings/books of SAM annual conferences have
been evaluated and approved for inclusion into major science citation
index databases for indexing, integrating, and inclusion into relevant
systems. The proceedings have also been approved for inclusion into
EBSCO (www.ebsco.com), one of the largest subject index systems. The
titles of proceedings of SAM have been indexed into the ACM Digital
Library ( http://dl.acm.org/ ) which includes bibliographic citations
from major publishers in computing.
In addition to the above, we have arranged two new book series (multiple
books in each series); one with Elsevier publishers (Emerging Trends in
Computer Science and Applied Computing) and another with Springer
publishers (Transactions of Computational Science and Computational
Intelligence). After the conference (the process may take 12 to 18
months), a significant number of authors of accepted papers of our
congress, will be given the opportunity to submit the extended version
of their papers for publication consideration in these books. We
anticipate having between 10 and 20 books a year in each of these
book series projects. Each book in each series will be subject to
Elsevier and Springer science indexing products (which includes:
Scopus, www.info.scopus.com; SCI Compendex, Engineering Village,
www.ei.org; EMBASE, www.info.embase.com; and others). For a recent and
a very small subset of the books (and journal special issues) that have
been published based on the extended versions of our congress papers,
see below:
http://www.worldacademyofscience.org/worldcomp15/ws/books_journals
SUBMISSION OF POSTER PAPERS:
Poster papers can be 2 pages long. Authors are to follow the same
instructions that appear above (see, SUBMISSION OF REGULAR PAPERS) except
for poster submission is limited to 2 pages. On the first page, the author
should state that "This paper is being submitted as a poster". Poster
papers (if accepted) will be published if and only the author of the
accepted paper wishes to do so. Please email your poster papers to the
poster co-chairs:
Hanen Idoudi ( Hanen.Idoudi@ensi.rnu.tn ), or
Esmiralda Moradian ( esmirald@dsv.su.se ).
PROPOSAL FOR ORGANIZING WORKSHOPS/SESSIONS:
Each conference is composed of a number of tracks. A track can be a session,
a workshop, or a symposium. A session will have at least 6 papers; a
workshop at least 12 papers; and a symposium at least 18 papers. Track
chairs will be responsible for all aspects of their tracks, including:
soliciting papers, reviewing, selecting, ... The names of track chairs
will appear as Associate Editors in the conference proceedings and on the
cover of the printed books (and indexed in science databases as such).
Proposals to organize tracks (sessions, workshops, or symposiums) should
include the following information: name and address (+ email) of proposer,
his/her biography, title of track, a 100-word description of the topic of
the track, and a short description on how the track will be advertised
(in most cases, track proposers solicit papers from colleagues and
researchers whose work is known to the track proposer). E-mail your track
proposal to the Workshops/Sessions co-chairs:
Flaminia Luccio ( luccio@unive.it ) or Shadi Banitaan ( banitash@udmercy.edu ).
We would like to receive the track proposals as soon as possible but by no
later than February 15, 2015.
CONTACT:
Inquiries should be sent to: daimikj@udmercy.edu
Saturday, February 14, 2015
Call for Papers and Sessions: International Conference on Security and Management (SAM'15), July 27-30, 2015, U.S.A.
CALL FOR
PAPERS
and
CALL FOR WORKSHOP/SESSION
PROPOSALS
Paper Submission Deadline: March
31, 2015
SAM'15
The 2015 International Conference on
Security and Management
July 27-30, 2015, Las Vegas,
USA
You are invited
to submit a paper for consideration. All accepted papers
will be
published in printed conference books/proceedings (ISBN) and will
also be made
available online. The proceedings will be indexed in science
citation
databases that track citation frequency/data. In addition, like
prior years,
extended versions of selected papers (about 35%) of the
conference will
appear in journals and edited research books (publishers
include:
Springer, Elsevier, BMC, and others; a list that includes a
small subset of
such books and journal special issues appear in this
document); some
of these books and journal special issues have already
received the top
25% downloads in their respective fields.
SAM'15 is
composed of a number of tracks, including: tutorials, sessions,
workshops,
posters, and panel discussions.
SCOPE: Topics of
interest include, but are not limited to, the following:
O NETWORK SECURITY:
- Security Algorithms
- Mobile Network Security
- Security in CDN (Contents Distribution
Networks)
- Virtual Private Network (VPN)
- Tracing Techniques in Internet
- Active Networks
- Security in Grid
- Web Monitoring
- Control Systems/SCADA Security
- Network Security Engineering
- Transport-Level Security
- Wireless Network Security
- IP Security
- Electronic Mail security
O CRYPTOGRAPHIC TECHNOLOGIES:
- Security Protocols
- Key Management Techniques
- Cryptographic Technologies
- Applications of Block and Stream Ciphers
- Applications of Public Key Cryptology
- Message Authentication and Hash Functions
- Anonymity
- Digital Signature Schemes
- Secret Sharing
- Cryptanalysis
O SECURITY MANAGEMENT:
- Surveillance Technologies
- Security Policies
- Security for Protocol Management
- Location Management
- QoS Management
- Resource Management
- Channel Management
- Mobility Management
- Digital Contents Copyright Protection
- System Security Management
- Network Security Management
- Management in Network Equipment
- Storage Area Networks (SAN) Management
- Information Security Management
- Government Security Policy
- Web Penetration Testing
- Security Operations
- Vulnerabilities Management
O SECURITY EDUCATION:
- Computer Security Education
- Network Security Education
- Cyber Security Education
- Cyber Security Body of Knowledge
- Information Assurance Education
O INFORMATION ASSURANCE:
- Mission Assurance
- Risk Assessment and Risk Management
- Continuity of Operations and Business
Impact Analysis
- Cyber Security Compliance
- Security Auditing
- Security-Savvy Software Development
- Disaster Recovery
- Business Continuity Analysis
- Access Control
- Secure Use of Software
- Secure Performance
O BIOMETRICS AND FORENSICS:
- Novel Biometric Methods
- Forensics
- Biological Security Technologies
- Face Recognition Systems
- Signature Recognition Systems
- Cyber Forensics
- Forensic Analysis
- Biometric Technologies for Security
- Feature Extraction and Matching Algorithms
O HARDWARE SECURITY:
- Embedded Systems Security
- Cryptographic Processors and Co-Processors
- Security Architectures
- True and Pseudorandom Number Generators
- Side Channel Attacks
- Fault Attacks
- Hardware Tamper Resistance
- Smart Card Processors
- Secure Storage Devices
O SECURITY APPLICATIONS:
- Security in E-Commerce and M-Commerce
- Secure OS
- Watermarking
- High-Tech Systems at Airports
- Emerging Technologies and Applications
- Cloud Computing Security
- Database Security
- Data Mining Security
- Cyber Security Automation
O COMPUTER SECURITY:
- Firewall Systems
- Hacking Techniques and Related Issues
- Intrusion Detection System (IDS)
- Honeypot
- Virus Issues (Detection, Prevention ...)
- Trusted Computing
- Alert Correlation
- Attack Graphs
- Incident Responding
- Malware Analysis
- Incident Responding
IMPORTANT DATES:
March
31,2015: Submission of full papers
(about 7 pages)
April 24,
2015: Notification of acceptance (+/-
two days)
May 15,
2015: Final papers + Copyright +
Registration
July 27-30,
2015: The 2015 International Conference on Security and
Management (SAM'15)
SUBMISSION OF
REGULAR PAPERS:
Prospective
authors are invited to submit their papers by uploading
them to the
evaluation web site at:
Submissions must
be uploaded by March 31, 2015 and must be in either
pdf format
(about 7 pages including all figures, tables, and
references -
single space, font size of 10 to 12). All reasonable
typesetting
formats are acceptable (later, the authors of accepted
papers will be
asked to follow a particular typesetting format to
prepare their
final papers for publication.) Papers must not have been
previously
published or currently submitted for publication elsewhere.
The first page
of the paper should include: title of the paper, name,
affiliation,
postal address, and email address for each author. The
first page
should also identify the name of the Contact Author and a
maximum of 5
topical keywords that would best represent the content
of the paper.
The track title must also be stated on the first page of
the paper as
well as a 100 to 150-word abstract. The length of the
final/Camera-Ready
papers (if accepted) will be limited to 7 (two-column
IEEE style)
pages.
Each paper will
be peer-reviewed by two experts in the field for
originality,
significance, clarity, impact, and soundness. In cases of
contradictory
recommendations, a member of the conference program
committee would
be charged to make the final decision (accept/reject);
often, this
would involve seeking help from additional referees. Papers
whose authors
include a member of the conference program committee will
be evaluated
using the double-blinded review process. (Essay/philosophical
papers will not
be refereed but may be considered for discussion/panels).
The proceedings
will be published in printed conference books (ISBN) and
will also be
made available online. The printed proceedings/books will
be available for
distribution on site at the conference. The proceedings
will be indexed
in science citation databases that track citation
frequency/data.
The proceedings/books of SAM annual conferences have
been evaluated
and approved for inclusion into major science citation
index databases
for indexing, integrating, and inclusion into relevant
systems. The
proceedings have also been approved for inclusion into
EBSCO (www.ebsco.com), one of the largest subject index systems.
The
titles of
proceedings of SAM have been indexed into the ACM Digital
Library ( http://dl.acm.org/ ) which includes bibliographic citations
from major
publishers in computing.
In addition to
the above, we have arranged two new book series (multiple
books in each
series); one with Elsevier publishers (Emerging Trends in
Computer Science
and Applied Computing) and another with Springer
publishers
(Transactions of Computational Science and Computational
Intelligence).
After the conference (the process may take 12 to 18
months), a
significant number of authors of accepted papers of our
congress, will
be given the opportunity to submit the extended version
of their papers
for publication consideration in these books. We
anticipate
having between 10 and 20 books a year in each of these
book series
projects. Each book in each series will be subject to
Elsevier and
Springer science indexing products (which includes:
Scopus, www.info.scopus.com; SCI Compendex, Engineering Village,
a very small
subset of the books (and journal special issues) that have
been published
based on the extended versions of our congress papers,
see below:
SUBMISSION OF
POSTER PAPERS:
Poster papers
can be 2 pages long. Authors are to follow the same
instructions
that appear above (see, SUBMISSION OF REGULAR PAPERS) except
for poster
submission is limited to 2 pages. On the first page, the author
should state
that "This paper is being submitted as a poster". Poster
papers (if accepted)
will be published if and only the author of the
accepted paper
wishes to do so. Please email your poster papers to the
poster
co-chairs:
Hanen Idoudi ( Hanen.Idoudi@ensi.rnu.tn ), or
Esmiralda
Moradian ( esmirald@dsv.su.se
).
PROPOSAL FOR
ORGANIZING WORKSHOPS/SESSIONS:
Each conference
is composed of a number of tracks. A track can be a session,
a workshop, or a
symposium. A session will have at least 6 papers; a
workshop at
least 12 papers; and a symposium at least 18 papers. Track
chairs will be
responsible for all aspects of their tracks, including:
soliciting
papers, reviewing, selecting, ... The names of track chairs
will appear as
Associate Editors in the conference proceedings and on the
cover of the
printed books (and indexed in science databases as such).
Proposals to
organize tracks (sessions, workshops, or symposiums) should
include the
following information: name and address (+ email) of proposer,
his/her
biography, title of track, a 100-word description of the topic of
the track, and a
short description on how the track will be advertised
(in most cases,
track proposers solicit papers from colleagues and
researchers
whose work is known to the track proposer). E-mail your track
proposal to the
Workshops/Sessions co-chairs:
We would like to
receive the track proposals as soon as possible but by no
later than
February 15, 2015.
CONTACT:
Inquiries should
be sent to: daimikj@udmercy.edu
Saturday, July 12, 2014
Call For Participation: The 2014 World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP'14), Las Vegas, U.S.A., July 21-24, 2014
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Call For Participation
The 2014 World Congress in Computer
Science,
Computer Engineering, and Applied
Computing
July 21-24, 2014, Las Vegas,
USA
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
This is an
invitation to attend The 2014 World Congress in Computer
Science,
Computer Engineering, and Applied Computing. The congress
is composed of
20 major tracks (15 tutorials, 145 sessions and workshops,
and 19
keynotes/invited lectures/panel discussions, ...); all will be
held
simultaneously, same location and dates: July 21-24, 2014.
Attendees will
have full access to all conferences' sessions, tracks,
and tutorials.
Registration is required to attend. As of now, 62% of
registrants are
from academia, 23% from industry; 14% from government
and funding
agencies; and 1% unknown (correct as of July 1). About
half of the
attendees are from outside USA; from 76 nations.
See below for:
A. General
Information
B. Topical Scope
C. Registration
Information (Deadline: July 18, 2014)
D. Congress
Schedules/Programs
E. Location of
congress
F. Planned
Tutorials and Featured Keynotes
G. Partial list
of organized sessions
H. Misc
Information
We look forward
to seeing you during the 3rd week of July.
-----------------------------cut
here-----------------------------
A. GENERAL
INFORMATION:
B. TOPICAL
SCOPE:
Advances in Big Data Analytics (ABDA);
Bioinformatics & Computational
Biology (BIOCOMP); Scientific Computing
(CSC); Data Mining (DMIN);
e-Learning, e-Business, Enterprise
Information Systems, and
e-Government (EEE); Reconfigurable Systems
(RSA); Embedded Systems
and Applications (ESA); Foundations of
Computer Science (FCS); Frontiers
in Computer Science and Computer Engineering
Education (FECS); Grid &
Cloud Computing and Applications (GCA);
Genetic & Evolutionary Methods
(GEM); Artificial Intelligence (ICAI);
Internet Computing and Big Data
(ICOMP); Wireless Networks (ICWN);
Information & Knowledge Engineering
(IKE); Image Processing, Computer Vision,
& Pattern Recognition (IPCV);
Modeling, Simulation and Visualization
Methods (MSV); Parallel and
Distributed Processing Techniques and
Applications (PDPTA); Security
and Management (SAM); Software Engineering
Research and Practice (SERP);
and Semantic Web and Web Services (SWWS).
C. REGISTRATION
INFORMATION: (Deadline: July 18, 2014)
D. CONGRESS
SCHEDULES/PROGRAMS:
E. LOCATION OF
CONGRESS:
F. PLANNED
TUTORIALS AND FEATURED KEYNOTES: (partial list)
Tutorials are free to conference registrants
- Tutorial titles include:
(most tutorials are 3 hours long):
-> Accreditation Board of Engineering and
Technology (ABET) accreditation
of Computer Science Program
-> Natural Language in Information
Security and Privacy
-> Energy-Aware Resource Management for
Computing Systems
-> Cryptography and Network Security
-> Multidimensional Detective - the
Blessings of Dimensionality
-> Agents at High Seas
-> First Programming Language in CS
Education - The Argument For Scala
-> The Use of ICT to Mitigate Income
Inequality
-> Using Weka to Mine Temporal Work
Patterns of Programming Students
-> Recommendation Systems for Big Data
-> Fault Tolerance and Beyond
-> Actor Parallelism and Akka/Scala
-> Hacking with Kali Linux
-> Cloud Computing for Big Data
Challenges (Cloud Architectures and
Big Data Tools)
-> Smartphone Sensor Mining Applications:
Ubiquitous Possibilities
Partial list of Keynotes/Invited Talks:
-> Smart Data for you and me:
Personalized and Actionable Physical
Cyber Social Big Data
Prof. Amit Sheth
Fellow, IEEE; LexisNexis Eminent Scholar;
Founder/Executive Director,
Ohio Center of Excellence in
Knowledge-enabled Computing (Kno.e.sis),
and Professor of Computer Science, Wright
State University, Ohio, USA
-> Visualization and Data Mining for High
Dimensional Datasets
Prof. Alfred Inselberg
Tel Aviv University, Israel; Senior
Fellow, San Diego Supercomputing
Center; Inventor of the multidimensional
system of Parallel
Coordinates and author of textbook
"Parallel Coordinates: VISUAL
Multidimensional Geometry", (praised
by Stephen Hawking among others.)
-> Big Data Analytics Cognitive
Algorithms
Dr. Leonid I. Perlovsky
Harvard University, Massachusetts, USA;
The US Air Force Research
Lab., USA; CEO, LP Information
Technology, USA; Chair, IEEE Task Force
on The Mind and Brain; Recipient of John
McLucas Award (the highest US
Air Force Award for basic research).
-> Panel Discussion: Thoughts, Language,
and Memories for Humans vs.
Artificially Intelligent Entities
Panel Chair: Dr. James A. Crowder; Chief
Engineer, Raytheon
Intelligence, USA
Panelists:
Prof. Victor Raskin; Distinguished
Professor & Associate Director &
Charter Fellow, CERIAS; Purdue
University, USA
Dr. Julia M. Taylor; Fellow, CERIAS;
Purdue University, USA
Shelli Friess; Relevant Counseling,
Colorado, USA
Dr. John Carbone; Raytheon Intelligence,
Colorado, USA
-> A Primitive Artificial Prefrontal
Cortex for Cognitive Self-Regulation
in Artificial Life Forms
Dr. James A. Crowder
Chief Engineer, Raytheon Intelligence,
Colorado, USA; Chief Mentor
Scientist of the Automation, Robotics and
Artificial Intelligence
Research Lab., Alexandria School of
Innovation, Colorado, USA
->
Big Data Issues for Mining Knowledge in Maintenance Information
Systems
Prof. Diego Galar
Division of Operation and Maintenance
Engineering,
Lulea University of Technology, Lulea,
Sweden; Former Pro-Vice-
Chancellor, Aragon Institute for
Engineering Research (I3A), Spain
-> Data Science Emergence
Dr. Peter Geczy
National Institute of Advanced Industrial
Science and Technology
(AIST), Japan; Institute of Physical
& Chemical Research (RIKEN)
-> Integrative Systems Biology Approaches
to Identify Disrupted Pathways
in Disease Development
Dr. Mary Qu Yang
Director, Joint Bioinformatics Ph.D.
Program of University of
Arkansas Little Rock College of
Engineering & Information Technology,
University of Arkansas for Medical
Sciences, Arkansas, USA
G. PARTIAL LIST
OF ORGANIZED SESSIONS (multiple speakers per session):
Some of these sessions are further divided
into more focused sessions
and many have topics that overlap the topics
of other sessions (correct
as of July 1, 2014)
-> Algorithms for Big Data
-> Cloud Computing + System
Infrastructures & Enhanced Cache Methods
-> Cloud Computing & GRID
-> Security & Privacy in the Era of
Big Data & Risk Analysis
-> Applications of Big Data &
Software Tools
-> Communication Systems & Topologies
-> Social Networks
-> Pervasive Computing
-> Big Data Management & Frameworks +
Big Data Programming
-> Big Data Search & Mining Methods
-> BIG DATA, STORAGE, & Privacy
-> Mobile Computing + Big Data & Data
Management & Storage
-> Graph Algorithms, Ontology Methods
-> BIG Data Architectures
-> Education Infrastructures
-> Gene Expression & Representation,
Microarray, Sequencing, Alignment
-> Computational Biology & Medical
Applications
-> Health Informatics, Data mining
-> Protein Folding
-> Health Care & Medical Applications
-> Protein Classification & Structure
Prediction, Folding
-> Computational Structural Biology +
Drug Design
-> Medical Science, Visualization, HPC
-> Bioinformatics
-> Web, Text, Multimedia Mining
-> Regression, Classification,
Clustering, Association
-> Real-World Data Mining Applications,
Challenges & Perspectives
-> Evolving systems
-> Embedded Systems + HPC + Sensory
Devices
-> Network On Chip Systems
-> Computational Science, Object Oriented
Methods
-> Finite Element Methods and Analysis
-> Simulation, Numerical Methods & APPLICATIONS
-> Visualization, Graphics, Tools &
Techniques
-> Automated Testing + Scheduling Systems
-> Formal Modeling + Analysis &
Optimization
-> Micro-Controller Design
-> ODE + Kalman Filter + Elasticity
Theory
-> Micro-Controllers, Micro-Processors
-> State Machine Language &
Optimization Methods
-> Modeling and Applications
-> Computational Science, Systems, HPC,
Scientific &
Engineering Algorithms
-> Simulation Methods and Computational
Modeling
-> Accreditation & Academic Reviews +
Evaluation
-> Teaching Programming + Software
Engineering
-> Performance Enhancement Methods +
Integrated Learning
-> Class Management Systems, Learning
Models + Distance Learning,
Social Networks
-> Programming Languages, Studies and
Related Issues
-> Learning Models, Methodologies, Tools
and Case Studies
-> Agile Methodologies + Pair Programming
and Team Teaching Methods
-> Semantic Web
-> Web Services and Applications
-> Recruitment, Retention & Mentoring
+ Enrollment Studies & Management
-> Teaching Support Systems and Tools
-> Artificial Intelligence, Algorithms
-> Computational Intelligence
-> Intelligent Linguistic Technologies
-> Machine Learning, Agent Technologies,
Swarm Optimization, HMM
-> Knowledge Discovery and Learning
-> Natural Language Processing, Topic
Detection, Human-Machine Interaction
-> Robotics and Applications, BCI
-> Pattern Recognition and Dimensionality
Reduction Methods
-> Computational Intelligence, Data
Fusion, AI, Novel Applications
-> Fuzzy Logic & Systems and
Applications + ANN Information Retrieval
& Search Methods
-> Decision Support Systems + Medical
Applications, Assistive Living
and Healthcare
-> Knowledge Representation and Knowledge
Based Systems
-> AI, Algorithms & Applications
-> Neural Networks + Data Mining +
Machine Learning
-> Evolutionary Strategies, Genetic
Algorithms and Novel Applications
-> Applications of Advanced AI Techniques
to Information Management
-> Ad-Hoc Networks, VANET, Protocols and
Related Technologies
-> Wireless Networks and Security Issues
-> Internet of Things + Broadcasting and
Tele-Control Systems
-> Computer and Hardware Security
-> Internet of Things and SCADA
Cybersecurity Education
-> Energy Efficiency Issues
-> Security Management
-> Optimization Methods
-> Context Aware Networking
-> Data & Information Mining +
Forecasting Methods
-> Crowd-Sourcing and Mining
-> Stochastic Methods & Visualization
-> Genetic Algorithms & Applications
-> Genetic Programming
-> Simulated Annealing, Swarm
Optimization Algorithms
-> Agent-Based Algorithms
-> Feature Extraction and Artificial
Intelligence
-> Computer Vision and Applications
-> Biometrics + Face Recognition,
Expression Detection, Human Detection
-> Vision, Pattern Matching
-> Noise Reduction
-> Imaging Science and Medical
Applications
-> Image and Signal Processing
Applications & Novel Algorithms
-> Pattern Recognition
-> Image Retrieval Methods, Image Feature
Extraction
-> Image Segmentation
-> Image Quality Assessment
-> Stereo, 3D Imaging, Depth Algorithms
-> Video Processing, Analysis and
Applications
-> Object Detection, Recognition &
Classification
-> Compression Methods & Technologies
-> Mathematical Modeling and Problem
Solving
-> Energy Efficient Networking Systems
-> Parallel Computing and Algorithms +
Multi-Core and Energy-Aware
Computing
-> Parallel Programming + Novel
Frameworks
-> Big Data and Data Analytics + Related
Technologies and Methods
-> High-Performance Computing +
Distributed Algorithms & Applications
-> Systems Software + Parallel
Programming Models + Petri Nets
-> Cache Coherence + Multi-Core and
Applications
-> Scientific Computing, FFT, Matrix
Problems, Linear Systems, Finite
Element Methods
-> Complex Systems, Theory and
Applications
-> Parallel Architectures and Systems
-> Communication Systems & Input
Output Systems + Interconnection
Networks & Topologies
-> Routing Methods
-> Security Education
-> Wireless Networks Security + Modeling
of Information Security
-> Information Assurance
-> Biometrics & Forensics
-> Cryptographic Technologies
-> Software Engineering &
Applications + Education & Training
-> E-Government & Issues of Interest
to Government, and
Public Administration
-> Software Engineering & Web Based
Systems + Open Source Software
-> Enterprise Architectures
-> Game Design + GUI
-> Energy Efficient Software Design,
Requirements Engineering,
Cost Estimation
-> Software Engineering & Safety,
Software Quality, Error Checking
-> Software Development Strategies, Agile
Technology, Business
Models, Reuse
-> Learning & Teaching Methods,
E-Learning + Educational Tools
-> E-Business, E-Commerce, E-Banking,
Enterprise Information Systems
-> Diversity Issues
-> Software Architecture & Design
Patterns + Specification Methods
-> Process Mining + Autonomic Computing
H. MISC
INFORMATION:
To get a feeling about the conferences'
atmosphere, see the 2013
delegates photos available at: There are
over 1,000 photos (click
on any photo for the album to pop up.)
and earlier year's: http://worldcomp.phanfare.com/
Publication: Measurable Scientific Impact of
Congress:
As of December 14, 2013, papers published in
the conference proceedings
that have been held as part of the federated
Congress, have received
over 27,500 citations (includes about 3,300
self-citations). Citation
data obtained from http://academic.research.microsoft.com/ . The
citation data does not even include more
than 15,000 other citations
to papers in tracks whose first offerings
were initiated by the joint
congress.
CONTACT:
Inquiries should
be sent to: sc@world-comp.org
Tuesday, May 27, 2014
Call for Late Breaking Papers with Deadline of June 5, 2014: The 2014 World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP'14), USA, July 21-24, 2014
CALL FOR
PAPERS
CALL FOR LATE BREAKING PAPERS, POSITION
PAPERS, ABSTRACTS, POSTERS
Submission Deadline: June 5,
2014
The 2014 World Congress in Computer Science,
Computer Engineering,
and Applied Computing
July 21-24, 2014, Las Vegas,
USA
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
IMPORTANT NOTE:
This
announcement is ONLY for those who MISSED the opportunity to submit their
papers in
response to earlier "Call For Papers". Therefore, authors who have
already
submitted papers in response to earlier "Call For Papers" should
IGNORE this
announcement. (Those who have been notified that their papers have
been accepted,
MUST still follow the instructions that were emailed to them;
including
meeting the deadlines mentioned in the notifications that were sent
to them).
INVITATION:
You are invited
to submit a "Late Breaking Paper", "Position Paper", or
"Abstract/Poster
Paper" for consideration. All accepted papers will be published
in printed
conference books/proceedings (ISBN) and will also be made available
online. Like
prior years, extended versions of selected papers (about 35%) will
appear in
journals and edited research books (publishers include: Springer,
Elsevier, BMC,
and others). In addition to the above, we have arranged two new
book series; one
with Elsevier publishers (Emerging Trends in Computer Science
and Applied
Computing) and another with Springer publishers (Transactions of
Computational
Science and Computational Intelligence). After the conference, a
significant
number of authors of accepted papers of our congress, will be given
the opportunity
to submit the extended version of their papers for publication
consideration in
these books. Each book in each series will be subject to
Elsevier and
Springer science indexing products (which includes: Scopus,
Ei village, SCI,
...). See the following links for a small subset of the
publications
based on the Congress: (some of these books and special issues
have already
received the top 25% downloads in their respective fields - we
also have a
number of Elsevier and Springer books in the pipeline based on the
offerings of the
congress):
The Congress is
composed of a number of tracks (joint-conferences, tutorials,
sessions,
workshops, poster and panel discussions); all will be held
simultaneously,
same location and dates: July 21-24, 2014. For the complete
list of joint
conferences, see below. To get a feeling about the conferences'
atmosphere, see
some delegates photos available at:
SUBMISSION OF
LATE BREAKING PAPERS, POSITION PAPERS, ABSTRACTS/POSTERS:
In response to
this announcement, authors are given the opportunity to submit
their papers for
evaluation in one of the following three categories:
1. Late Breaking Papers: describe
late-breaking/recent developments in
the field. The maximum number of pages is
7. Please write the following
on the first page of your submission
"name of conference: LATE BREAKING
PAPER". If accepted, The length of
the final/Camera-Ready paper will be
limited to 7 (two-column IEEE style)
pages and the author will be given
the opportunity to present the paper in a
formal session.
2. Position Papers: enable discussions on
emerging topics without the
experimentation normally present in an
academic paper. Commonly,
such papers will substantiate the
opinions or positions put forward
with evidence from an extensive objective
discussion of the topic.
The maximum number of pages is 4. Please
write the following on the
first page of your submission "name
of conference: POSITION PAPER".
If accepted, The length of the
final/Camera-Ready paper will be limited
to 4 (two-column IEEE style) pages and
the author will be given the
opportunity to present the paper in a
discussion/poster session.
3. Abstract/Poster Papers: describe research
roadmaps (similar to PhD
plan or PhD prospectus). The maximum
number of pages is 2. Please
write the following on the first page of
your submission "name of
conference: ABSTRACT/POSTER PAPER".
If accepted, The length of the
final/Camera-Ready paper will be limited
to 2 (two-column IEEE style)
pages and the author will be given the
opportunity to present the paper
in a discussion/poster session.
Prospective
authors are invited to submit their papers (see above for paper
categories) by
uploading them to the evaluation web site at:
Submissions must
be uploaded by June 5, 2014 and must be in either MS doc or
pdf formats. All
reasonable typesetting formats are acceptable (later, the
authors of
accepted papers will be asked to follow a particular typesetting
format to
prepare their final papers for publication.) Papers must not have
been previously
published or currently submitted for publication elsewhere.
The first page
of the paper should include: title of the paper, name,
affiliation,
postal address, and email address for each author. The first
page should also
identify the name of the Contact Author and a maximum of 5
topical keywords
that would best represent the content of the paper.
Each paper will
be peer-reviewed by two experts in the field for originality,
significance,
clarity, impact, and soundness. In cases of contradictory
recommendations,
a member of the conference program committee would be
charged to make
the final decision (accept/reject); often, this would involve
seeking help
from additional referees. Papers whose authors include a member
of the
conference program committee will be evaluated using the double-blinded
review process.
(Papers deemed to be philosophical, essay type, or about
controversial
topics/applications will not be refereed but may be considered
for
discussion/panels/presentation).
The proceedings
will be published in printed conference books (ISBN) and
will also be
made available online. The proceedings will be indexed in
science citation
databases that track citation frequency/data for each
published paper.
Science citation databases include: Inspec / IET / The
Institute for
Engineering & Technology; The French National Center for
Scientific
Research, CNRS, INIST databases, PASCAL (accessable from INIST,
Datastar,
Dialog, EBSCO, OVID, Questel.Orbit, Qwam, & STN International);
and others. The
proceedings/books of this congress have been evaluated for
inclusion into
major science citation index databases. We are happy to
report that so
far, the evaluation board of science citation index
databases have
approved the indexing, integrating, and inclusion of the
following
conference tracks into relevant indexing databases (indexing
databases
include, among others: Scopus, www.info.scopus.com; SCI Compendex,
BIOCOMP, DMIN,
GCA, ICAI, ICOMP, ICWN, IKE, IPCV, PDPTA, and SAM; please
see below for
the full name of each of these conferences.
Note that
authors who submit papers in response to this announcement, will
have their
papers evaluated for publication consideration in the Final Edition
of the
conference proceedings which will go to press soon after the conference
(the conference
would then make the necessary arrangements to ship the printed
proceedings/books
to such authors). The Final Edition of the conference
proceedings will
be identical to earlier edition except for a number of
sections/chapters
appended to the proceedings/book.
LIST OF
CONFERENCES (alphabetical order based on conference acronym)
o ABDA'14:
The 1st International Conference on Advances
in Big Data Analytics
o BIOCOMP'14:
The 15th International Conference on
Bioinformatics & Computational Biology
o CSC'14:
The 12th International Conference on
Scientific Computing
o DMIN'14:
The 10th International Conference on Data
Mining
o EEE'14:
The 13th International Conference on
e-Learning, e-Business, Enterprise
Information Systems, and e-Government
o ESA'14:
The 12th International Conference on Embedded
Systems and Applications
o FCS'14:
The 10th International Conference on
Foundations of Computer Science
o FECS'14:
The 10th International Conference on
Frontiers in Education: Computer
Science and Computer Engineering
o GCA'14:
The 10th International Conference on Grid
& Cloud Computing and
Applications
o GEM'14:
The 11th International Conference on Genetic
& Evolutionary Methods
o ICAI'14:
The 16th International Conference on
Artificial Intelligence
o ICOMP'14:
The 15th International Conference on Internet
Computing and Big Data
o ICWN'14:
The 13th International Conference on Wireless
Networks
o IKE'14:
The 13th International Conference on
Information & Knowledge Engineering
o IPCV'14:
The 18th International Conference on Image
Processing, Computer Vision,
& Pattern Recognition
o MSV'14:
The 11th International Conference on
Modeling, Simulation and
Visualization Methods
o PDPTA'14:
The 20th International Conference on Parallel
and Distributed Processing
Techniques and Applications
o SAM'14:
The 13th International Conference on Security
and Management
o SERP'14:
The 12th International Conference on Software
Engineering Research and
Practice
o SWWS'14:
The 12th International Conference on Semantic
Web and Web Services
July 21-24,
2014, Monte Carlo Resort, Las Vegas, USA.
All conferences
listed above will be held simultaneously; i.e., same location
and dates.
IMPORTANT DATES:
June 5,
2014: Submission of papers for
evaluation (the sooner, a submission
is received, the earlier,
the notification will be sent out.)
June 14,
2014: The notification of acceptance
will be sent out typically 10
days after the paper has
been submitted.
June 26,
2014: Registration
July 21-24,
2014: The 2014 World Congress in
Computer Science, Computer Engineering,
and Applied Computing
(including all affiliated and federated
conferences, tutorials, and
workshops).
August 20,
2014: Camera-Ready Papers Due for
publication
(Papers submitted and
accepted in response to this announcement
will be published in the
Final Edition of the proceedings which
will go to press soon after
the conference; they will also be
indexed in science citation
index databases.)
GENERAL
INFORMATION:
The 2014 World
Congress in Computer Science, Computer Engineering, and
Applied
Computing serves researchers, scholars, professionals, students,
and academicians
who are looking to both foster working relationships
and gain access
to the latest research results. The Congress is among
the top five
largest annual gathering of researchers in computer science,
computer
engineering and applied computing. We anticipate to have
attendees from
about 85 countries/territories.
The 2014
Congress will be composed of research presentations, keynote lectures,
invited
presentations, tutorials, panel discussions, and poster presentations.
In recent past,
keynote/tutorial/panel speakers have included:
Prof. David A.
Patterson (pioneer, architecture, U. of California,
Berkeley), Dr.
K. Eric Drexler (known as Father of Nanotechnology),
Prof. John H. Holland
(known as Father of Genetic Algorithms; U. of
Michigan), Prof.
Ian Foster (known as Father of Grid Computing; U. of
Chicago &
ANL), Prof. Ruzena Bajcsy (pioneer, VR, U. of California,
Berkeley), Prof.
Barry Vercoe (Founding member of MIT Media Lab, MIT),
Dr. Jim Gettys
(known as X-man, developer of X Window System, xhost;
OLPC), Prof.
John Koza (known as Father of Genetic Programming, Stanford
U.), Prof. Brian
D. Athey (NIH Program Director, U. of Michigan),
Prof. Viktor K.
Prasanna (pioneer, U. of Southern California), Dr. Jose
L. Munoz (NSF
Program Director and Consultant), Prof. Jun Liu (pioneer,
Broad Institute
of MIT & Harvard U.), Prof. Lotfi A. Zadeh (Father of
Fuzzy Logic),
Dr. Firouz Naderi (Head, NASA Mars Exploration Program/
2000-2005 and
Associate Director, Project Formulation & Strategy, Jet
Propulsion Lab,
CalTech/NASA; Director, NASA's JPL Solar System
Exploration),
Prof. David Lorge Parnas (Fellow of IEEE, ACM, RSC, CAE, GI;
Dr.h.c.: ETH
Zurich, Prof. Emeritus, McMaster U. and U. of Limerick),
Prof. Eugene H.
Spafford (Executive Director, CERIAS and Professor, Purdue
University), Dr.
Sandeep Chatterjee (Vice President & Chief Technology
Officer,
SourceTrace Systems, Inc.), Prof. Haym Hirsh (Dean, Cornell
University -
formerly at Rutgers University, New Jersey, USA and former
director of
Division of Information and Intelligent Systems, National
Science
Foundation, USA), Dr. Flavio Villanustre (Vice-President, HPCC
Systems), Prof.
Victor Raskin (Distinguished Professor, Purdue University,
USA); Prof.
Alfred Inselberg (School of Mathematical Sciences, Tel Aviv
University,
Israel; Senior Fellow, San Diego Supercomputing Center;
Inventor of the
multidimensional system of Parallel Coordinates and
author of
textbook); Prof. H. J. Siegel (Abell Endowed Chair Distinguished
Professor of ECE
and Professor of CS; Director, CSU Information Science
and Technology
Center (ISTeC), Colorado State University, Colorado, USA);
and many other
distinguished speakers. To get a feeling about the
conferences'
atmosphere, see some delegates photos available at:
An important
mission of The Congress is "Providing a unique platform for
a diverse
community of constituents composed of scholars, researchers,
developers,
educators, and practitioners. The Congress makes concerted
effort to reach
out to participants affiliated with diverse entities
(such as:
universities, institutions, corporations, government agencies,
and research
centers/labs) from all over the world. The congress also
attempts to
connect participants from institutions that have teaching as
their main mission
with those who are affiliated with institutions that
have research as
their main mission. The congress uses a quota system to
achieve its
institution and geography diversity objectives."
One main goal of
the congress is to assemble a spectrum of affiliated
research
conferences, workshops, and symposiums into a coordinated
research meeting
held in a common place at a common time. This model
facilitates
communication among researchers in different fields of computer
science,
computer engineering, and applied computing. The Congress also
encourages
multi-disciplinary and inter-disciplinary research initiatives;
ie, facilitating
increased opportunities for cross-fertilization across
sub-disciplines.
TUTORIALS:
All tutorials
are free to conference registrants, the list of tutorials
that have been
approved so far can be found at:
We plan to offer
more tutorials (in addition to what is already posted on
the web). As of
the writing of this announcement, the following tutorials
have been
approved and they will be presented by distinguished speakers:
O. Accreditation
Board of Engineering and Technology (ABET)
accreditation of Computer Science Program
O. Natural
Language in Information Security and Privacy
O.
Recommendation Systems for Big Data
O. Energy-Aware
Resource Management for Computing Systems
O. Hacking with
Kali Linux
O. Cryptography
and Network Security
O. First
Programming Language in CS Education - The Argument For Scala
O. Fault
Tolerance and Beyond
O. Agents at
High Seas
O. Actor
Parallelism and Akka/Scala
O. Cloud
Computing for Big Data Challenges
(Cloud Architectures and Big Data Tools)
O. The Use of
ICT to Mitigate Income Inequality
Currently, we
are evaluating 6 other proposals and they are in the areas of
Big Data and
Data Analytics (3 proposals); Entrepreneurial Spirits;
Visualization
and Datamining; and Computational Biology.
USEFUL LINKS:
Conference web
site:
Partial list of
tutorials:
Partial list of
keynotes:
Location of the
conference:
MEASURABLE
SCIENTIFIC IMPACT OF CONGRESS:
As of December
14, 2013, papers published in the congress proceedings
have received
over 27,500 citations (includes about 3,300 self-citations).
Citation data
obtained from Microsoft Academic Search. This citation
data does not
even include more than 15,000 other citations to papers
in tracks whose
first offerings were initiated by the congress.
Based on
citation record and other relevant metrics, Microsoft Academic
has listed many
of the joint conferences that are part of this congress
in its list of
Top Conferences (e.g., go to
http://academic.research.microsoft.com/ ; select the tab "Conferences"
and then type
"PDPTA", or "FECS", or "IC-AI", or "ICOMP",
...)
MISCELLANEOUS:
The information
that appears in this announcement is correct as of May 19,
2014.
CONTACT:
Inquiries should
be sent to: sc@world-comp.org
Subscribe to:
Posts (Atom)