Showing posts with label SAM. Show all posts
Showing posts with label SAM. Show all posts

Sunday, January 24, 2016

Call for Papers: The 2016 International Conference on Security and Management (SAM'16), Las Vegas, USA, July 25-28, 2016

The 2016 International Conference on Security and Management
Las Vegas, USA, July 25-28

WORLDCOMP 2016

Call for Papers

The 2016 International Conference on Security and Management (SAM’16) is the 15th annual comprehensive security conference dealing with all aspects of security. This annual Security and Management Conference is a leading international opportunity for computer and network security professionals and users to investigate innovative ideas and outcomes, and to exchange experiences on various aspects of information security.

You are invited to submit a full paper for consideration. Novel research in all practical areas of computer and network security is sought. Submissions from academia, government, and industry are encouraged. All accepted papers will be published in the SAM’16 conference proceedings (in printed book form; later, the proceedings will also be accessible online). Papers should demonstrate significant contribution to the construction, evaluation, application, or operation of secure systems.

There are nine tracks in this conference; Cryptographic Technologies, Security Applications, Information Assurance, Network Security, Hardware Security, Computer Security, Security management, Security Education, and Biometrics and Forensics. For details of the tracks, please refer to the conference website at http://sam.udmercy.edu/sam16 and click on “Call for Papers.”

Prospective authors are invited to submit their papers by uploading them to the evaluation website at:

https://easychair.org/conferences/?conf=sam160

If you have not used EasyChair before, please create your new account first. To upload your paper, please click on “New Submission.” The first page of the draft paper should include: title of the paper, name, affiliation, postal address, and email address for each author. The first page should also identify the name of the Contact Author and a maximum of 5 topical keywords that would best represent the content of the paper. Please ensure that the first page also includes the TRACK(s) that you regard as the most appropriate one for your paper review.

Important Dates

March 22, 2016
Submission of full papers (about 7 pages)
April 17, 2016
Notification of acceptance (+/- two days)
May 10, 2016
Final papers + Copyright + Registration
July 25-28, 2016 The 2016 International Conference on Security and Management

Contact Information

Dr. Kevin Daimi, Conference Chair
Computer Science and Software Engineering
University of Detroit Mercy,
Detroit, MI, 48221-3038, USA
Email: daimikj@udmercy.edu

Call for Posters: The 2016 International Conference on Security and Management (SAM'16), Las Vegas, USA, July 25-28, 2016

The 2016 International Conference on Security and Management
Las Vegas, USA, July 25 - 28

WORLDCOMP 2016

Call for Posters

The 2016 International Conference on Security and Management (SAM’16) is the 15th annual comprehensive security conference dealing with all aspects of security. This annual Security and Management Conference is a leading international opportunity for computer and network security professionals and users to investigate innovative ideas and outcomes, and to exchange experiences on various aspects of information security.

There are nine tracks in this conference; Cryptographic Technologies, Security Applications, Information Assurance, Network Security, Hardware Security, Computer Security, Security management, Security Education, and Biometrics and Forensics. For details of the tracks, please refer to the conference website at http://sam.udmercy.edu/sam16.

The 2016 International Conference on Security and Management (SAM’16) encourages the submission of posters to provide an environment for demonstrating and discussing work in progress, and industry presentations of new applications, techniques, technologies, or approaches in the field of computer and network security. Interested authors are invited to submit a short proposal illustrating the main contributions of their posters. Proposals should contain an abstract stressing the motivation and rationale for their contribution. Poster may reflect initial results of the work.

Posters will be evaluated mainly on their ability to promote discussion, inspire the exchange of ideas, and foster collaborations among conference participants. Poster proposals must conform to IEEE writing style guidelines with 3 pages maximum including title, authors’ affiliation, abstract, content, figures, and references.

Accepted posters will be published as an extended abstract. The maximum number of pages for the extended abstract is 2.

Poster boards will be provided on site at the conference. The poster boards will be large enough to accommodate 8 US standard size stationaries to be pinned on them using 4 rows with 2 pages per row, or 2 rows with 4 pages per row. The poster board sizes are 45 inches x 22 inches. The boards can be flipped if desired. Two poster boards next to each other for one accepted poster can be arranged if needed.

Submissions should be emailed to the Posters Co-Chair; Hanen Idoudi (Hanen.Idoudi@ensi.rnu.tn), or Esmiralda Moradian (esmirald@dsv.su.se).

Call for Sessions: The 2016 International Conference on Security and Management (SAM'16), Las Vegas, USA, July 25-28, 2016

The 2016 International Conference on Security and Management
Las Vegas, USA, July 25 - 28

WORLDCOMP 2016

Session/ Workshop Organization

The 2016 International Conference on Security and Management (SAM’16) is the 15th annual comprehensive security conference dealing with all aspects of security. This annual Security and Management Conference is a leading international opportunity for computer and network security professionals and users to investigate innovative ideas and outcomes, and to exchange experiences on various aspects of information security.

There are nine tracks in this conference; Cryptographic Technologies, Security Applications, Information Assurance, Network Security, Hardware Security, Computer Security, Security management, Security Education, and Biometrics and Forensics. For details of the tracks, please refer to the conference website at http://sam.udmercy.edu/sam16.

You are invited to submit a proposal to organize a session or a workshop. Each technical session will have at least 6 paper presentations from different authors (12 papers in the case of workshop). The session/workshop chairs will be responsible for all aspects of their sessions/workshop; including, soliciting, reviewing, and selecting papers. The names of session/workshop chairs will appear as Associate Editors in the conference proceedings and on the cover of the books. Proposers may submit more than one session/workshop proposal.

Proposals to organize technical sessions/workshops should include the following information:

 Name, address, E-mail of proposer in addition to his/her biography.
 Title of session/workshop.
 A 100-word description of the session/workshop.
 A short description of the process for reviewing and selecting papers.
 A short description on how the session/workshop will be advertised (in most cases, session/workshop proposers solicit papers from colleagues and researchers whose work is known to the session proposer).

Email your session/workshop proposal to the Sessions/Workshops Co-chairs, Flaminia Luccio (luccio@unive.it) or Shadi Banitaan (banitash@udmercy.edu). The deadline for proposals is February 5, 2016. We would like to receive the session/workshop proposals as soon as possible.

Friday, May 8, 2015

Call for Late Breaking Papers, Position Papers, Abstracts, Posters: The 2015 International Conference on Security and Management (SAM’15), U.S.A., July 27-30, 2015, Submission Deadline: May 31, 2015


Call for Late Breaking Papers, Position Papers, Abstracts, Posters: 
The 2015 International Conference on Security and Management (SAM’15), U.S.A., July 27-30, 2015,
Submission Deadline:  May 31, 2015

This announcement is ONLY for those who MISSED the opportunity to submit their papers in response to earlier "Call for Papers". Therefore, authors who have ALREADY submitted papers in response to earlier "Call for Papers" should IGNORE this announcement. (Those who have been notified that their papers have been accepted, MUST still follow the instructions that were emailed to them; including meeting the deadlines mentioned in the notifications that were sent to them).

INVITATION:

You are invited to submit a "LATE BREAKING PAPER", "POSITION PAPER", or "ABSTRACT/POSTER PAPER" for consideration. All accepted papers will be published in printed conference books/proceedings (ISBN) and will also be made available online. In addition, like prior years, extended versions of selected papers (about 35%) of the conference will appear in journals and edited research books (publishers include: Springer, Elsevier, BMC, and others); some of these books and journal special issues have already received the top 25% downloads in their respective fields. See the link below for a very small subset of the books published mostly based on extended versions of the accepted papers of this congress:
http://www.worldacademyofscience.org/worldcomp15/ws/publications. The titles of proceedings of the federated congress have been indexed into the ACM Digital Library ( http://dl.acm.org/ ) which includes bibliographic citations from major publishers in computing.

SAM’15 is part the 2015 World Congress in Computer Science, Computer Engineering, and Applied Computing. The Congress is composed of a number of tracks (federated/joint conferences, tutorials, sessions, workshops, poster and panel discussions); all will be held simultaneously, same location and dates: July 27-30, 2015. For the complete list of joint conferences, see below. To get a feeling about the conferences' atmosphere, see some delegates’ photos available at:


SUBMISSION OF LATE BREAKING PAPERS, POSITION PAPERS, ABSTRACTS/POSTERS:

In response to this announcement, authors are given the opportunity to submit their papers for evaluation in one of the following three paper categories:

1.     LATE BREAKING PAPERS: describe late-breaking/recent developments in    the field. The maximum number of pages is 7. Please write the following on the first page of your submission "name of conference: LATE BREAKING PAPER". If accepted, the length of the final/Camera-Ready paper will be limited to 7 (two-column IEEE style) pages and the author will be given the opportunity to present the paper in a formal session.

2.     POSITION PAPERS: enable discussions on emerging topics without the experimentation normally present in an academic paper. Commonly, such papers will substantiate the opinions or positions put forward with evidence from an extensive objective discussion of the topic. The maximum number of pages is 5. Please write the following on the first page of your submission "name of conference: POSITION PAPER".  If accepted, the length of the final/Camera-Ready paper will be limited to 4 (two-column IEEE style) pages and the author will be given the opportunity to present the paper in a formal session.

3.     ABSTRACT/POSTER PAPERS: describe research roadmaps (similar to PhD plan or PhD prospectus). The maximum number of pages is 2. Please write the following on the first page of your submission "name of conference: ABSTRACT/POSTER PAPER". If accepted, The length of the final/Camera-Ready paper will be limited to 2 (two-column IEEE style) pages and the author will be given the opportunity to present the paper in a discussion/poster session.

Important Dates

Submission Deadline:                        May 31, 2015

Contact Information

Dr. Kevin Daimi, Conference Chair
Computer Science and Software Engineering
University of Detroit Mercy,
Detroit, MI, 48221-3038, USA


Sunday, March 22, 2015

The 2015 International Conference on Security and Management
Las Vegas, USA, July 27-30
WORLDCOMP 2015

Call for Papers

The 2015 International Conference on Security and Management (SAM’15) is the 14th annual comprehensive security
conference dealing with all aspects of security. This annual Security and Management Conference is a leading
international opportunity for computer and network security professionals and users to investigate innovative ideas and
outcomes, and to exchange experiences on various aspects of information security.

You are invited to submit a full paper for consideration. Novel research in all practical areas of computer and network
security is sought. Submissions from academia, government, and industry are encouraged. All accepted papers will be
published in the SAM’15 conference proceedings (in printed book form; later, the proceedings will also be accessible
online). Papers should demonstrate significant contribution to the construction, evaluation, application, or operation of
secure systems.

There are nine tracks in this conference; Cryptographic Technologies, Security Applications, Information Assurance,
Network Security, Hardware Security, Computer Security, Security management, Security Education, and Biometrics and
Forensics. For details of the tracks, please refer to the conference website at http://sam.udmercy.edu/sam15 and click on
“Call for Papers.”

Prospective authors are invited to submit their papers by uploading them to the evaluation website at:
https://www.easychair.org/conferences/?conf=sam15

If you have not used EasyChair before, please create your new account first. To upload your paper, please click on “New
Submission.” The first page of the draft paper should include: title of the paper, name, affiliation, postal address, and
email address for each author. The first page should also identify the name of the Contact Author and a maximum of 5
topical keywords that would best represent the content of the paper. Please ensure that the first page also includes the
TRACK(s) that you regard as the most appropriate one for your paper review.

Important Dates

March 31, 2015 Submission of full papers (about 7 pages)
April 24, 2015 Notification of acceptance (+/- two days)
May 15, 2015 Final papers + Copyright + Registration
July 27-30, 2015 The 2015 International Conference on Security and Management

Contact Information

Dr. Kevin Daimi, Conference Chair
Computer Science and Software Engineering
University of Detroit Mercy,
Detroit, MI, 48221-3038, USA
Email: daimikj@udmercy.edu

                                   CALL  FOR  PAPERS
                                                and
                CALL FOR WORKSHOP/SESSION PROPOSALS

             Paper Submission Deadline: March 31, 2015

                             SAM'15
   The 2015 International Conference on Security and Management
                 July 27-30, 2015, Las Vegas, USA
                   http://sam.udmercy.edu/sam15

You are invited to submit a paper for consideration. All accepted papers
will be published in printed conference books/proceedings (ISBN) and will
also be made available online. The proceedings will be indexed in science
citation databases that track citation frequency/data. In addition, like
prior years, extended versions of selected papers (about 35%) of the
conference will appear in journals and edited research books (publishers
include: Springer, Elsevier, BMC, and others; a list that includes a
small subset of such books and journal special issues appear in this
document); some of these books and journal special issues have already
received the top 25% downloads in their respective fields.

SAM'15 is composed of a number of tracks, including: tutorials, sessions,
workshops, posters, and panel discussions.

SCOPE: Topics of interest include, but are not limited to, the following:

O  NETWORK SECURITY:
   - Security Algorithms
   - Mobile Network Security
   - Security in CDN (Contents Distribution Networks)
   - Virtual Private Network (VPN)
   - Tracing Techniques in Internet
   - Active Networks
   - Security in Grid
   - Web Monitoring
   - Control Systems/SCADA Security
   - Network Security Engineering
   - Transport-Level Security
   - Wireless Network Security
   - IP Security
   - Electronic Mail security

O  CRYPTOGRAPHIC TECHNOLOGIES:
   - Security Protocols
   - Key Management Techniques
   - Cryptographic Technologies
   - Applications of Block and Stream Ciphers
   - Applications of Public Key Cryptology
   - Message Authentication and Hash Functions
   - Anonymity
   - Digital Signature Schemes
   - Secret Sharing
   - Cryptanalysis

O  SECURITY MANAGEMENT:
   - Surveillance Technologies
   - Security Policies
   - Security for Protocol Management
   - Location Management
   - QoS Management
   - Resource Management
   - Channel Management
   - Mobility Management
   - Digital Contents Copyright Protection
   - System Security Management
   - Network Security Management
   - Management in Network Equipment
   - Storage Area Networks (SAN) Management
   - Information Security Management
   - Government Security Policy
   - Web Penetration Testing
   - Security Operations
   - Vulnerabilities Management

O  SECURITY EDUCATION:
   - Computer Security Education
   - Network Security Education
   - Cyber Security Education
   - Cyber Security Body of Knowledge
   - Information Assurance Education

O  INFORMATION ASSURANCE:
   - Mission Assurance
   - Risk Assessment and Risk Management
   - Continuity of Operations and Business Impact Analysis
   - Cyber Security Compliance
   - Security Auditing
   - Security-Savvy Software Development
   - Disaster Recovery
   - Business Continuity Analysis
   - Access Control
   - Secure Use of Software
   - Secure Performance

O  BIOMETRICS AND FORENSICS:
   - Novel Biometric Methods
   - Forensics
   - Biological Security Technologies
   - Face Recognition Systems
   - Signature Recognition Systems
   - Cyber Forensics
   - Forensic Analysis
   - Biometric Technologies for Security
   - Feature Extraction and Matching Algorithms

O  HARDWARE SECURITY:
   - Embedded Systems Security
   - Cryptographic Processors and Co-Processors
   - Security Architectures
   - True and Pseudorandom Number Generators
   - Side Channel Attacks
   - Fault Attacks
   - Hardware Tamper Resistance
   - Smart Card Processors
   - Secure Storage Devices

O  SECURITY APPLICATIONS:
   - Security in E-Commerce and M-Commerce
   - Secure OS
   - Watermarking
   - High-Tech Systems at Airports
   - Emerging Technologies and Applications
   - Cloud Computing Security
   - Database Security
   - Data Mining Security
   - Cyber Security Automation

O  COMPUTER SECURITY:
   - Firewall Systems
   - Hacking Techniques and Related Issues
   - Intrusion Detection System (IDS)
   - Honeypot
   - Virus Issues (Detection, Prevention ...)
   - Trusted Computing
   - Alert Correlation
   - Attack Graphs
   - Incident Responding
   - Malware Analysis
   - Incident Responding


IMPORTANT DATES:

March 31,2015:    Submission of full papers (about 7 pages)
April 24, 2015:   Notification of acceptance (+/- two days)
May 15, 2015:     Final papers + Copyright + Registration
July 27-30, 2015: The 2015 International Conference on Security and
                  Management (SAM'15)


SUBMISSION OF REGULAR PAPERS:

Prospective authors are invited to submit their papers by uploading
them to the evaluation web site at:

https://www.easychair.org/conferences/?conf=sam15

Submissions must be uploaded by March 31, 2015 and must be in either
pdf format (about 7 pages including all figures, tables, and
references - single space, font size of 10 to 12). All reasonable
typesetting formats are acceptable (later, the authors of accepted
papers will be asked to follow a particular typesetting format to
prepare their final papers for publication.) Papers must not have been
previously published or currently submitted for publication elsewhere.
The first page of the paper should include: title of the paper, name,
affiliation, postal address, and email address for each author. The
first page should also identify the name of the Contact Author and a
maximum of 5 topical keywords that would best represent the content
of the paper. The track title must also be stated on the first page of
the paper as well as a 100 to 150-word abstract. The length of the
final/Camera-Ready papers (if accepted) will be limited to 7 (two-column
IEEE style) pages.

Each paper will be peer-reviewed by two experts in the field for
originality, significance, clarity, impact, and soundness. In cases of
contradictory recommendations, a member of the conference program
committee would be charged to make the final decision (accept/reject);
often, this would involve seeking help from additional referees. Papers
whose authors include a member of the conference program committee will
be evaluated using the double-blinded review process. (Essay/philosophical
papers will not be refereed but may be considered for discussion/panels).

The proceedings will be published in printed conference books (ISBN) and
will also be made available online. The printed proceedings/books will
be available for distribution on site at the conference. The proceedings
will be indexed in science citation databases that track citation
frequency/data. The proceedings/books of SAM annual conferences have
been evaluated and approved for inclusion into major science citation
index databases for indexing, integrating, and inclusion into relevant
systems. The proceedings have also been approved for inclusion into
EBSCO (www.ebsco.com), one of the largest subject index systems. The
titles of proceedings of SAM have been indexed into the ACM Digital
Library ( http://dl.acm.org/ ) which includes bibliographic citations
from major publishers in computing.

In addition to the above, we have arranged two new book series (multiple
books in each series); one with Elsevier publishers (Emerging Trends in
Computer Science and Applied Computing) and another with Springer
publishers (Transactions of Computational Science and Computational
Intelligence). After the conference (the process may take 12 to 18
months), a significant number of authors of accepted papers of our
congress, will be given the opportunity to submit the extended version
of their papers for publication consideration in these books. We
anticipate having between 10 and 20 books a year in each of these
book series projects. Each book in each series will be subject to
Elsevier and Springer science indexing products (which includes:
Scopus, www.info.scopus.com; SCI Compendex, Engineering Village,
www.ei.org; EMBASE, www.info.embase.com; and others). For a recent and
a very small subset of the books (and journal special issues) that have
been published based on the extended versions of our congress papers,
see below:

http://www.worldacademyofscience.org/worldcomp15/ws/books_journals


SUBMISSION OF POSTER PAPERS:

Poster papers can be 2 pages long. Authors are to follow the same
instructions that appear above (see, SUBMISSION OF REGULAR PAPERS) except
for poster submission is limited to 2 pages. On the first page, the author
should state that "This paper is being submitted as a poster". Poster
papers (if accepted) will be published if and only the author of the
accepted paper wishes to do so. Please email your poster papers to the
poster co-chairs:
Hanen Idoudi ( Hanen.Idoudi@ensi.rnu.tn ), or
Esmiralda Moradian ( esmirald@dsv.su.se ).


PROPOSAL FOR ORGANIZING WORKSHOPS/SESSIONS:

Each conference is composed of a number of tracks. A track can be a session,
a workshop, or a symposium. A session will have at least 6 papers; a
workshop at least 12 papers; and a symposium at least 18 papers. Track
chairs will be responsible for all aspects of their tracks, including:
soliciting papers, reviewing, selecting, ... The names of track chairs
will appear as Associate Editors in the conference proceedings and on the
cover of the printed books (and indexed in science databases as such).

Proposals to organize tracks (sessions, workshops, or symposiums) should
include the following information: name and address (+ email) of proposer,
his/her biography, title of track, a 100-word description of the topic of
the track, and a short description on how the track will be advertised
(in most cases, track proposers solicit papers from colleagues and
researchers whose work is known to the track proposer). E-mail your track
proposal to the Workshops/Sessions co-chairs:
Flaminia Luccio ( luccio@unive.it ) or Shadi Banitaan ( banitash@udmercy.edu ).
We would like to receive the track proposals as soon as possible but by no
later than February 15, 2015.

CONTACT:

Inquiries should be sent to: daimikj@udmercy.edu

Saturday, February 14, 2015

Call for Papers and Sessions: International Conference on Security and Management (SAM'15), July 27-30, 2015, U.S.A.


                        CALL  FOR  PAPERS
                              and
                CALL FOR WORKSHOP/SESSION PROPOSALS

             Paper Submission Deadline: March 31, 2015

                             SAM'15
   The 2015 International Conference on Security and Management
                 July 27-30, 2015, Las Vegas, USA
                   http://sam.udmercy.edu/sam15

You are invited to submit a paper for consideration. All accepted papers
will be published in printed conference books/proceedings (ISBN) and will
also be made available online. The proceedings will be indexed in science
citation databases that track citation frequency/data. In addition, like
prior years, extended versions of selected papers (about 35%) of the
conference will appear in journals and edited research books (publishers
include: Springer, Elsevier, BMC, and others; a list that includes a
small subset of such books and journal special issues appear in this
document); some of these books and journal special issues have already
received the top 25% downloads in their respective fields.

SAM'15 is composed of a number of tracks, including: tutorials, sessions,
workshops, posters, and panel discussions.

SCOPE: Topics of interest include, but are not limited to, the following:

O  NETWORK SECURITY:
   - Security Algorithms
   - Mobile Network Security
   - Security in CDN (Contents Distribution Networks)
   - Virtual Private Network (VPN)
   - Tracing Techniques in Internet
   - Active Networks
   - Security in Grid
   - Web Monitoring
   - Control Systems/SCADA Security
   - Network Security Engineering
   - Transport-Level Security
   - Wireless Network Security
   - IP Security
   - Electronic Mail security

O  CRYPTOGRAPHIC TECHNOLOGIES:
   - Security Protocols
   - Key Management Techniques
   - Cryptographic Technologies
   - Applications of Block and Stream Ciphers
   - Applications of Public Key Cryptology
   - Message Authentication and Hash Functions
   - Anonymity
   - Digital Signature Schemes
   - Secret Sharing
   - Cryptanalysis

O  SECURITY MANAGEMENT:
   - Surveillance Technologies
   - Security Policies
   - Security for Protocol Management
   - Location Management
   - QoS Management
   - Resource Management
   - Channel Management
   - Mobility Management
   - Digital Contents Copyright Protection
   - System Security Management
   - Network Security Management
   - Management in Network Equipment
   - Storage Area Networks (SAN) Management
   - Information Security Management
   - Government Security Policy
   - Web Penetration Testing
   - Security Operations
   - Vulnerabilities Management

O  SECURITY EDUCATION:
   - Computer Security Education
   - Network Security Education
   - Cyber Security Education
   - Cyber Security Body of Knowledge
   - Information Assurance Education

O  INFORMATION ASSURANCE:
   - Mission Assurance
   - Risk Assessment and Risk Management
   - Continuity of Operations and Business Impact Analysis
   - Cyber Security Compliance
   - Security Auditing
   - Security-Savvy Software Development
   - Disaster Recovery
   - Business Continuity Analysis
   - Access Control
   - Secure Use of Software
   - Secure Performance

O  BIOMETRICS AND FORENSICS:
   - Novel Biometric Methods
   - Forensics
   - Biological Security Technologies
   - Face Recognition Systems
   - Signature Recognition Systems
   - Cyber Forensics
   - Forensic Analysis
   - Biometric Technologies for Security
   - Feature Extraction and Matching Algorithms

O  HARDWARE SECURITY:
   - Embedded Systems Security
   - Cryptographic Processors and Co-Processors
   - Security Architectures
   - True and Pseudorandom Number Generators
   - Side Channel Attacks
   - Fault Attacks
   - Hardware Tamper Resistance
   - Smart Card Processors
   - Secure Storage Devices

O  SECURITY APPLICATIONS:
   - Security in E-Commerce and M-Commerce
   - Secure OS
   - Watermarking
   - High-Tech Systems at Airports
   - Emerging Technologies and Applications
   - Cloud Computing Security
   - Database Security
   - Data Mining Security
   - Cyber Security Automation

O  COMPUTER SECURITY:
   - Firewall Systems
   - Hacking Techniques and Related Issues
   - Intrusion Detection System (IDS)
   - Honeypot
   - Virus Issues (Detection, Prevention ...)
   - Trusted Computing
   - Alert Correlation
   - Attack Graphs
   - Incident Responding
   - Malware Analysis
   - Incident Responding


IMPORTANT DATES:

March 31,2015:    Submission of full papers (about 7 pages)
April 24, 2015:   Notification of acceptance (+/- two days)
May 15, 2015:     Final papers + Copyright + Registration
July 27-30, 2015: The 2015 International Conference on Security and
                  Management (SAM'15)


SUBMISSION OF REGULAR PAPERS:

Prospective authors are invited to submit their papers by uploading
them to the evaluation web site at:


Submissions must be uploaded by March 31, 2015 and must be in either
pdf format (about 7 pages including all figures, tables, and
references - single space, font size of 10 to 12). All reasonable
typesetting formats are acceptable (later, the authors of accepted
papers will be asked to follow a particular typesetting format to
prepare their final papers for publication.) Papers must not have been
previously published or currently submitted for publication elsewhere.
The first page of the paper should include: title of the paper, name,
affiliation, postal address, and email address for each author. The
first page should also identify the name of the Contact Author and a
maximum of 5 topical keywords that would best represent the content
of the paper. The track title must also be stated on the first page of
the paper as well as a 100 to 150-word abstract. The length of the
final/Camera-Ready papers (if accepted) will be limited to 7 (two-column
IEEE style) pages.

Each paper will be peer-reviewed by two experts in the field for
originality, significance, clarity, impact, and soundness. In cases of
contradictory recommendations, a member of the conference program
committee would be charged to make the final decision (accept/reject);
often, this would involve seeking help from additional referees. Papers
whose authors include a member of the conference program committee will
be evaluated using the double-blinded review process. (Essay/philosophical
papers will not be refereed but may be considered for discussion/panels).

The proceedings will be published in printed conference books (ISBN) and
will also be made available online. The printed proceedings/books will
be available for distribution on site at the conference. The proceedings
will be indexed in science citation databases that track citation
frequency/data. The proceedings/books of SAM annual conferences have
been evaluated and approved for inclusion into major science citation
index databases for indexing, integrating, and inclusion into relevant
systems. The proceedings have also been approved for inclusion into
EBSCO (www.ebsco.com), one of the largest subject index systems. The
titles of proceedings of SAM have been indexed into the ACM Digital
Library ( http://dl.acm.org/ ) which includes bibliographic citations
from major publishers in computing.

In addition to the above, we have arranged two new book series (multiple
books in each series); one with Elsevier publishers (Emerging Trends in
Computer Science and Applied Computing) and another with Springer
publishers (Transactions of Computational Science and Computational
Intelligence). After the conference (the process may take 12 to 18
months), a significant number of authors of accepted papers of our
congress, will be given the opportunity to submit the extended version
of their papers for publication consideration in these books. We
anticipate having between 10 and 20 books a year in each of these
book series projects. Each book in each series will be subject to
Elsevier and Springer science indexing products (which includes:
Scopus, www.info.scopus.com; SCI Compendex, Engineering Village,
www.ei.org; EMBASE, www.info.embase.com; and others). For a recent and
a very small subset of the books (and journal special issues) that have
been published based on the extended versions of our congress papers,
see below:



SUBMISSION OF POSTER PAPERS:

Poster papers can be 2 pages long. Authors are to follow the same
instructions that appear above (see, SUBMISSION OF REGULAR PAPERS) except
for poster submission is limited to 2 pages. On the first page, the author
should state that "This paper is being submitted as a poster". Poster
papers (if accepted) will be published if and only the author of the
accepted paper wishes to do so. Please email your poster papers to the
poster co-chairs:
Hanen Idoudi ( Hanen.Idoudi@ensi.rnu.tn ), or
Esmiralda Moradian ( esmirald@dsv.su.se ).


PROPOSAL FOR ORGANIZING WORKSHOPS/SESSIONS:

Each conference is composed of a number of tracks. A track can be a session,
a workshop, or a symposium. A session will have at least 6 papers; a
workshop at least 12 papers; and a symposium at least 18 papers. Track
chairs will be responsible for all aspects of their tracks, including:
soliciting papers, reviewing, selecting, ... The names of track chairs
will appear as Associate Editors in the conference proceedings and on the
cover of the printed books (and indexed in science databases as such).

Proposals to organize tracks (sessions, workshops, or symposiums) should
include the following information: name and address (+ email) of proposer,
his/her biography, title of track, a 100-word description of the topic of
the track, and a short description on how the track will be advertised
(in most cases, track proposers solicit papers from colleagues and
researchers whose work is known to the track proposer). E-mail your track
proposal to the Workshops/Sessions co-chairs:
Flaminia Luccio ( luccio@unive.it ) or Shadi Banitaan ( banitash@udmercy.edu ).
We would like to receive the track proposals as soon as possible but by no
later than February 15, 2015.

CONTACT:

Inquiries should be sent to: daimikj@udmercy.edu


Saturday, July 12, 2014

Call For Participation: The 2014 World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP'14), Las Vegas, U.S.A., July 21-24, 2014


++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
                      Call For Participation

            The 2014 World Congress in Computer Science,
            Computer Engineering, and Applied Computing

                July 21-24, 2014, Las Vegas, USA
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

This is an invitation to attend The 2014 World Congress in Computer
Science, Computer Engineering, and Applied Computing. The congress
is composed of 20 major tracks (15 tutorials, 145 sessions and workshops,
and 19 keynotes/invited lectures/panel discussions, ...); all will be
held simultaneously, same location and dates: July 21-24, 2014.
Attendees will have full access to all conferences' sessions, tracks,
and tutorials. Registration is required to attend. As of now, 62% of
registrants are from academia, 23% from industry; 14% from government
and funding agencies; and 1% unknown (correct as of July 1). About
half of the attendees are from outside USA; from 76 nations.

See below for:

A. General Information
B. Topical Scope
C. Registration Information (Deadline: July 18, 2014)
D. Congress Schedules/Programs
E. Location of congress
F. Planned Tutorials and Featured Keynotes
G. Partial list of organized sessions
H. Misc Information

We look forward to seeing you during the 3rd week of July.
-----------------------------cut here-----------------------------


A. GENERAL INFORMATION:


B. TOPICAL SCOPE:

   Advances in Big Data Analytics (ABDA); Bioinformatics & Computational
   Biology (BIOCOMP); Scientific Computing (CSC); Data Mining (DMIN);
   e-Learning, e-Business, Enterprise Information Systems, and
   e-Government (EEE); Reconfigurable Systems (RSA); Embedded Systems
   and Applications (ESA); Foundations of Computer Science (FCS); Frontiers
   in Computer Science and Computer Engineering Education (FECS); Grid &
   Cloud Computing and Applications (GCA); Genetic & Evolutionary Methods
   (GEM); Artificial Intelligence (ICAI); Internet Computing and Big Data
   (ICOMP); Wireless Networks (ICWN); Information & Knowledge Engineering
   (IKE); Image Processing, Computer Vision, & Pattern Recognition (IPCV);
   Modeling, Simulation and Visualization Methods (MSV); Parallel and
   Distributed Processing Techniques and Applications (PDPTA); Security
   and Management (SAM); Software Engineering Research and Practice (SERP);
   and Semantic Web and Web Services (SWWS).


C. REGISTRATION INFORMATION: (Deadline: July 18, 2014)

D. CONGRESS SCHEDULES/PROGRAMS:

E. LOCATION OF CONGRESS:

F. PLANNED TUTORIALS AND FEATURED KEYNOTES: (partial list)

   Tutorials are free to conference registrants - Tutorial titles include:
   (most tutorials are 3 hours long):

   -> Accreditation Board of Engineering and Technology (ABET) accreditation
      of Computer Science Program
   -> Natural Language in Information Security and Privacy
   -> Energy-Aware Resource Management for Computing Systems
   -> Cryptography and Network Security
   -> Multidimensional Detective - the Blessings of Dimensionality
   -> Agents at High Seas
   -> First Programming Language in CS Education - The Argument For Scala
   -> The Use of ICT to Mitigate Income Inequality
   -> Using Weka to Mine Temporal Work Patterns of Programming Students
   -> Recommendation Systems for Big Data
   -> Fault Tolerance and Beyond
   -> Actor Parallelism and Akka/Scala
   -> Hacking with Kali Linux
   -> Cloud Computing for Big Data Challenges (Cloud Architectures and
      Big Data Tools)
   -> Smartphone Sensor Mining Applications: Ubiquitous Possibilities

   Partial list of Keynotes/Invited Talks:

   -> Smart Data for you and me: Personalized and Actionable Physical
      Cyber Social Big Data
      Prof. Amit Sheth
      Fellow, IEEE; LexisNexis Eminent Scholar; Founder/Executive Director,
      Ohio Center of Excellence in Knowledge-enabled Computing (Kno.e.sis),
      and Professor of Computer Science, Wright State University, Ohio, USA

   -> Visualization and Data Mining for High Dimensional Datasets
      Prof. Alfred Inselberg
      Tel Aviv University, Israel; Senior Fellow, San Diego Supercomputing
      Center; Inventor of the multidimensional system of Parallel
      Coordinates and author of textbook "Parallel Coordinates: VISUAL
      Multidimensional Geometry", (praised by Stephen Hawking among others.)

   -> Big Data Analytics Cognitive Algorithms
      Dr. Leonid I. Perlovsky
      Harvard University, Massachusetts, USA; The US Air Force Research
      Lab., USA; CEO, LP Information Technology, USA; Chair, IEEE Task Force
      on The Mind and Brain; Recipient of John McLucas Award (the highest US
      Air Force Award for basic research).

   -> Panel Discussion: Thoughts, Language, and Memories for Humans vs.
      Artificially Intelligent Entities
      Panel Chair: Dr. James A. Crowder; Chief Engineer, Raytheon
      Intelligence, USA
      Panelists:
      Prof. Victor Raskin; Distinguished Professor & Associate Director &
      Charter Fellow, CERIAS; Purdue University, USA
      Dr. Julia M. Taylor; Fellow, CERIAS; Purdue University, USA
      Shelli Friess; Relevant Counseling, Colorado, USA
      Dr. John Carbone; Raytheon Intelligence, Colorado, USA

   -> A Primitive Artificial Prefrontal Cortex for Cognitive Self-Regulation
      in Artificial Life Forms
      Dr. James A. Crowder
      Chief Engineer, Raytheon Intelligence, Colorado, USA; Chief Mentor
      Scientist of the Automation, Robotics and Artificial Intelligence
      Research Lab., Alexandria School of Innovation, Colorado, USA

   -> Big Data Issues for Mining Knowledge in Maintenance Information
      Systems
      Prof. Diego Galar
      Division of Operation and Maintenance Engineering,
      Lulea University of Technology, Lulea, Sweden; Former Pro-Vice-
      Chancellor, Aragon Institute for Engineering Research (I3A), Spain

   -> Data Science Emergence
      Dr. Peter Geczy
      National Institute of Advanced Industrial Science and Technology
      (AIST), Japan; Institute of Physical & Chemical Research (RIKEN)

   -> Integrative Systems Biology Approaches to Identify Disrupted Pathways
      in Disease Development
      Dr. Mary Qu Yang
      Director, Joint Bioinformatics Ph.D. Program of University of
      Arkansas Little Rock College of Engineering & Information Technology,
      University of Arkansas for Medical Sciences, Arkansas, USA


G. PARTIAL LIST OF ORGANIZED SESSIONS (multiple speakers per session):
   Some of these sessions are further divided into more focused sessions
   and many have topics that overlap the topics of other sessions (correct
   as of July 1, 2014)

   -> Algorithms for Big Data
   -> Cloud Computing + System Infrastructures & Enhanced Cache Methods
   -> Cloud Computing & GRID
   -> Security & Privacy in the Era of Big Data & Risk Analysis
   -> Applications of Big Data & Software Tools
   -> Communication Systems & Topologies
   -> Social Networks
   -> Pervasive Computing
   -> Big Data Management & Frameworks + Big Data Programming
   -> Big Data Search & Mining Methods
   -> BIG DATA, STORAGE, & Privacy
   -> Mobile Computing + Big Data & Data Management & Storage
   -> Graph Algorithms, Ontology Methods
   -> BIG Data Architectures
   -> Education Infrastructures
   -> Gene Expression & Representation, Microarray, Sequencing, Alignment
   -> Computational Biology & Medical Applications
   -> Health Informatics, Data mining
   -> Protein Folding
   -> Health Care & Medical Applications
   -> Protein Classification & Structure Prediction, Folding
   -> Computational Structural Biology + Drug Design
   -> Medical Science, Visualization, HPC
   -> Bioinformatics
   -> Web, Text, Multimedia Mining
   -> Regression, Classification, Clustering, Association
   -> Real-World Data Mining Applications, Challenges & Perspectives
   -> Evolving systems
   -> Embedded Systems + HPC + Sensory Devices
   -> Network On Chip Systems
   -> Computational Science, Object Oriented Methods
   -> Finite Element Methods and Analysis
   -> Simulation, Numerical Methods & APPLICATIONS
   -> Visualization, Graphics, Tools & Techniques
   -> Automated Testing + Scheduling Systems
   -> Formal Modeling + Analysis & Optimization
   -> Micro-Controller Design
   -> ODE + Kalman Filter + Elasticity Theory
   -> Micro-Controllers, Micro-Processors
   -> State Machine Language & Optimization Methods
   -> Modeling and Applications
   -> Computational Science, Systems, HPC, Scientific &
      Engineering Algorithms
   -> Simulation Methods and Computational Modeling
   -> Accreditation & Academic Reviews + Evaluation
   -> Teaching Programming + Software Engineering
   -> Performance Enhancement Methods + Integrated Learning
   -> Class Management Systems, Learning Models + Distance Learning,
      Social Networks
   -> Programming Languages, Studies and Related Issues
   -> Learning Models, Methodologies, Tools and Case Studies
   -> Agile Methodologies + Pair Programming and Team Teaching Methods
   -> Semantic Web
   -> Web Services and Applications
   -> Recruitment, Retention & Mentoring + Enrollment Studies & Management
   -> Teaching Support Systems and Tools
   -> Artificial Intelligence, Algorithms
   -> Computational Intelligence
   -> Intelligent Linguistic Technologies
   -> Machine Learning, Agent Technologies, Swarm Optimization, HMM
   -> Knowledge Discovery and Learning
   -> Natural Language Processing, Topic Detection, Human-Machine Interaction
   -> Robotics and Applications, BCI
   -> Pattern Recognition and Dimensionality Reduction Methods
   -> Computational Intelligence, Data Fusion, AI, Novel Applications
   -> Fuzzy Logic & Systems and Applications + ANN Information Retrieval
      & Search Methods
   -> Decision Support Systems + Medical Applications, Assistive Living
      and Healthcare
   -> Knowledge Representation and Knowledge Based Systems
   -> AI, Algorithms & Applications
   -> Neural Networks + Data Mining + Machine Learning
   -> Evolutionary Strategies, Genetic Algorithms and Novel Applications
   -> Applications of Advanced AI Techniques to Information Management
   -> Ad-Hoc Networks, VANET, Protocols and Related Technologies
   -> Wireless Networks and Security Issues
   -> Internet of Things + Broadcasting and Tele-Control Systems
   -> Computer and Hardware Security
   -> Internet of Things and SCADA Cybersecurity Education
   -> Energy Efficiency Issues
   -> Security Management
   -> Optimization Methods
   -> Context Aware Networking
   -> Data & Information Mining + Forecasting Methods
   -> Crowd-Sourcing and Mining
   -> Stochastic Methods & Visualization
   -> Genetic Algorithms & Applications
   -> Genetic Programming
   -> Simulated Annealing, Swarm Optimization Algorithms
   -> Agent-Based Algorithms
   -> Feature Extraction and Artificial Intelligence
   -> Computer Vision and Applications
   -> Biometrics + Face Recognition, Expression Detection, Human Detection
   -> Vision, Pattern Matching
   -> Noise Reduction
   -> Imaging Science and Medical Applications
   -> Image and Signal Processing Applications & Novel Algorithms
   -> Pattern Recognition
   -> Image Retrieval Methods, Image Feature Extraction
   -> Image Segmentation
   -> Image Quality Assessment
   -> Stereo, 3D Imaging, Depth Algorithms
   -> Video Processing, Analysis and Applications
   -> Object Detection, Recognition & Classification
   -> Compression Methods & Technologies
   -> Mathematical Modeling and Problem Solving
   -> Energy Efficient Networking Systems
   -> Parallel Computing and Algorithms + Multi-Core and Energy-Aware
      Computing
   -> Parallel Programming + Novel Frameworks
   -> Big Data and Data Analytics + Related Technologies and Methods
   -> High-Performance Computing + Distributed Algorithms & Applications
   -> Systems Software + Parallel Programming Models + Petri Nets
   -> Cache Coherence + Multi-Core and Applications
   -> Scientific Computing, FFT, Matrix Problems, Linear Systems, Finite
      Element Methods
   -> Complex Systems, Theory and Applications
   -> Parallel Architectures and Systems
   -> Communication Systems & Input Output Systems + Interconnection
      Networks & Topologies
   -> Routing Methods
   -> Security Education
   -> Wireless Networks Security + Modeling of Information Security
   -> Information Assurance
   -> Biometrics & Forensics
   -> Cryptographic Technologies
   -> Software Engineering & Applications + Education & Training
   -> E-Government & Issues of Interest to Government, and
      Public Administration
   -> Software Engineering & Web Based Systems + Open Source Software
   -> Enterprise Architectures
   -> Game Design + GUI
   -> Energy Efficient Software Design, Requirements Engineering,
      Cost Estimation
   -> Software Engineering & Safety, Software Quality, Error Checking
   -> Software Development Strategies, Agile Technology, Business
      Models, Reuse
   -> Learning & Teaching Methods, E-Learning + Educational Tools
   -> E-Business, E-Commerce, E-Banking, Enterprise Information Systems
   -> Diversity Issues
   -> Software Architecture & Design Patterns + Specification Methods
   -> Process Mining + Autonomic Computing

H. MISC INFORMATION:
   To get a feeling about the conferences' atmosphere, see the 2013
   delegates photos available at: There are over 1,000 photos (click
   on any photo for the album to pop up.)
  
   and earlier year's: http://worldcomp.phanfare.com/

   Publication: Measurable Scientific Impact of Congress:

   As of December 14, 2013, papers published in the conference proceedings
   that have been held as part of the federated Congress, have received
   over 27,500 citations (includes about 3,300 self-citations). Citation
   data obtained from http://academic.research.microsoft.com/ . The
   citation data does not even include more than 15,000 other citations
   to papers in tracks whose first offerings were initiated by the joint
   congress.


CONTACT:
Inquiries should be sent to: sc@world-comp.org


Tuesday, May 27, 2014

Call for Late Breaking Papers with Deadline of June 5, 2014: The 2014 World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP'14), USA, July 21-24, 2014


                         CALL  FOR  PAPERS
  CALL FOR LATE BREAKING PAPERS, POSITION PAPERS, ABSTRACTS, POSTERS

                 Submission Deadline: June 5, 2014

  The 2014 World Congress in Computer Science, Computer Engineering,
                      and Applied Computing
                  July 21-24, 2014, Las Vegas, USA
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


IMPORTANT NOTE:
This announcement is ONLY for those who MISSED the opportunity to submit their
papers in response to earlier "Call For Papers". Therefore, authors who have
already submitted papers in response to earlier "Call For Papers" should
IGNORE this announcement. (Those who have been notified that their papers have
been accepted, MUST still follow the instructions that were emailed to them;
including meeting the deadlines mentioned in the notifications that were sent
to them).


INVITATION:
You are invited to submit a "Late Breaking Paper", "Position Paper", or
"Abstract/Poster Paper" for consideration. All accepted papers will be published
in printed conference books/proceedings (ISBN) and will also be made available
online. Like prior years, extended versions of selected papers (about 35%) will
appear in journals and edited research books (publishers include: Springer,
Elsevier, BMC, and others). In addition to the above, we have arranged two new
book series; one with Elsevier publishers (Emerging Trends in Computer Science
and Applied Computing) and another with Springer publishers (Transactions of
Computational Science and Computational Intelligence). After the conference, a
significant number of authors of accepted papers of our congress, will be given
the opportunity to submit the extended version of their papers for publication
consideration in these books. Each book in each series will be subject to
Elsevier and Springer science indexing products (which includes: Scopus,
Ei village, SCI, ...). See the following links for a small subset of the
publications based on the Congress: (some of these books and special issues
have already received the top 25% downloads in their respective fields - we
also have a number of Elsevier and Springer books in the pipeline based on the
offerings of the congress):


The Congress is composed of a number of tracks (joint-conferences, tutorials,
sessions, workshops, poster and panel discussions); all will be held
simultaneously, same location and dates: July 21-24, 2014. For the complete
list of joint conferences, see below. To get a feeling about the conferences'
atmosphere, see some delegates photos available at:


SUBMISSION OF LATE BREAKING PAPERS, POSITION PAPERS, ABSTRACTS/POSTERS:

In response to this announcement, authors are given the opportunity to submit
their papers for evaluation in one of the following three categories:

   1. Late Breaking Papers: describe late-breaking/recent developments in
      the field. The maximum number of pages is 7. Please write the following
      on the first page of your submission "name of conference: LATE BREAKING
      PAPER". If accepted, The length of the final/Camera-Ready paper will be
      limited to 7 (two-column IEEE style) pages and the author will be given
      the opportunity to present the paper in a formal session.

   2. Position Papers: enable discussions on emerging topics without the
      experimentation normally present in an academic paper. Commonly,
      such papers will substantiate the opinions or positions put forward
      with evidence from an extensive objective discussion of the topic.
      The maximum number of pages is 4. Please write the following on the
      first page of your submission "name of conference: POSITION PAPER".
      If accepted, The length of the final/Camera-Ready paper will be limited
      to 4 (two-column IEEE style) pages and the author will be given the
      opportunity to present the paper in a discussion/poster session.

   3. Abstract/Poster Papers: describe research roadmaps (similar to PhD
      plan or PhD prospectus). The maximum number of pages is 2. Please
      write the following on the first page of your submission "name of
      conference: ABSTRACT/POSTER PAPER". If accepted, The length of the
      final/Camera-Ready paper will be limited to 2 (two-column IEEE style)
      pages and the author will be given the opportunity to present the paper
      in a discussion/poster session.

Prospective authors are invited to submit their papers (see above for paper
categories) by uploading them to the evaluation web site at:
Submissions must be uploaded by June 5, 2014 and must be in either MS doc or
pdf formats. All reasonable typesetting formats are acceptable (later, the
authors of accepted papers will be asked to follow a particular typesetting
format to prepare their final papers for publication.) Papers must not have
been previously published or currently submitted for publication elsewhere.
The first page of the paper should include: title of the paper, name,
affiliation, postal address, and email address for each author. The first
page should also identify the name of the Contact Author and a maximum of 5
topical keywords that would best represent the content of the paper.

Each paper will be peer-reviewed by two experts in the field for originality,
significance, clarity, impact, and soundness. In cases of contradictory
recommendations, a member of the conference program committee would be
charged to make the final decision (accept/reject); often, this would involve
seeking help from additional referees. Papers whose authors include a member
of the conference program committee will be evaluated using the double-blinded
review process. (Papers deemed to be philosophical, essay type, or about
controversial topics/applications will not be refereed but may be considered
for discussion/panels/presentation).

The proceedings will be published in printed conference books (ISBN) and
will also be made available online. The proceedings will be indexed in
science citation databases that track citation frequency/data for each
published paper. Science citation databases include: Inspec / IET / The
Institute for Engineering & Technology; The French National Center for
Scientific Research, CNRS, INIST databases, PASCAL (accessable from INIST,
Datastar, Dialog, EBSCO, OVID, Questel.Orbit, Qwam, & STN International);
and others. The proceedings/books of this congress have been evaluated for
inclusion into major science citation index databases. We are happy to
report that so far, the evaluation board of science citation index
databases have approved the indexing, integrating, and inclusion of the
following conference tracks into relevant indexing databases (indexing
databases include, among others: Scopus, www.info.scopus.com; SCI Compendex,
Engineering Village, www.ei.org; EMBASE, www.info.embase.com; and others):
BIOCOMP, DMIN, GCA, ICAI, ICOMP, ICWN, IKE, IPCV, PDPTA, and SAM; please
see below for the full name of each of these conferences.

Note that authors who submit papers in response to this announcement, will
have their papers evaluated for publication consideration in the Final Edition
of the conference proceedings which will go to press soon after the conference
(the conference would then make the necessary arrangements to ship the printed
proceedings/books to such authors). The Final Edition of the conference
proceedings will be identical to earlier edition except for a number of
sections/chapters appended to the proceedings/book.


LIST OF CONFERENCES (alphabetical order based on conference acronym)

o ABDA'14:
  The 1st International Conference on Advances in Big Data Analytics
o BIOCOMP'14:
  The 15th International Conference on Bioinformatics & Computational Biology
o CSC'14:
  The 12th International Conference on Scientific Computing
o DMIN'14:
  The 10th International Conference on Data Mining
o EEE'14:
  The 13th International Conference on e-Learning, e-Business, Enterprise
  Information Systems, and e-Government
o ESA'14:
  The 12th International Conference on Embedded Systems and Applications
o FCS'14:
  The 10th International Conference on Foundations of Computer Science
o FECS'14:
  The 10th International Conference on Frontiers in Education: Computer
  Science and Computer Engineering
o GCA'14:
  The 10th International Conference on Grid & Cloud Computing and
  Applications
o GEM'14:
  The 11th International Conference on Genetic & Evolutionary Methods
o ICAI'14:
  The 16th International Conference on Artificial Intelligence
o ICOMP'14:
  The 15th International Conference on Internet Computing and Big Data
o ICWN'14:
  The 13th International Conference on Wireless Networks
o IKE'14:
  The 13th International Conference on Information & Knowledge Engineering
o IPCV'14:
  The 18th International Conference on Image Processing, Computer Vision,
  & Pattern Recognition
o MSV'14:
  The 11th International Conference on Modeling, Simulation and
  Visualization Methods
o PDPTA'14:
  The 20th International Conference on Parallel and Distributed Processing
  Techniques and Applications
o SAM'14:
  The 13th International Conference on Security and Management
o SERP'14:
  The 12th International Conference on Software Engineering Research and
  Practice
o SWWS'14:
  The 12th International Conference on Semantic Web and Web Services

July 21-24, 2014, Monte Carlo Resort, Las Vegas, USA.

All conferences listed above will be held simultaneously; i.e., same location
and dates.

IMPORTANT DATES:

June 5, 2014:       Submission of papers for evaluation (the sooner, a submission
                    is received, the earlier, the notification will be sent out.)
June 14, 2014:      The notification of acceptance will be sent out typically 10
                    days after the paper has been submitted.
June 26, 2014:      Registration
July 21-24, 2014:   The 2014 World Congress in Computer Science, Computer Engineering,
                    and Applied Computing (including all affiliated and federated
                    conferences, tutorials, and workshops).
                    http://www.world-academy-of-science.org/
August 20, 2014:    Camera-Ready Papers Due for publication
                    (Papers submitted and accepted in response to this announcement
                    will be published in the Final Edition of the proceedings which
                    will go to press soon after the conference; they will also be
                    indexed in science citation index databases.)


GENERAL INFORMATION:

The 2014 World Congress in Computer Science, Computer Engineering, and
Applied Computing serves researchers, scholars, professionals, students,
and academicians who are looking to both foster working relationships
and gain access to the latest research results. The Congress is among
the top five largest annual gathering of researchers in computer science,
computer engineering and applied computing. We anticipate to have
attendees from about 85 countries/territories.

The 2014 Congress will be composed of research presentations, keynote lectures,
invited presentations, tutorials, panel discussions, and poster presentations.
In recent past, keynote/tutorial/panel speakers have included:
Prof. David A. Patterson (pioneer, architecture, U. of California,
Berkeley), Dr. K. Eric Drexler (known as Father of Nanotechnology),
Prof. John H. Holland (known as Father of Genetic Algorithms; U. of
Michigan), Prof. Ian Foster (known as Father of Grid Computing; U. of
Chicago & ANL), Prof. Ruzena Bajcsy (pioneer, VR, U. of California,
Berkeley), Prof. Barry Vercoe (Founding member of MIT Media Lab, MIT),
Dr. Jim Gettys (known as X-man, developer of X Window System, xhost;
OLPC), Prof. John Koza (known as Father of Genetic Programming, Stanford
U.), Prof. Brian D. Athey (NIH Program Director, U. of Michigan),
Prof. Viktor K. Prasanna (pioneer, U. of Southern California), Dr. Jose
L. Munoz (NSF Program Director and Consultant), Prof. Jun Liu (pioneer,
Broad Institute of MIT & Harvard U.), Prof. Lotfi A. Zadeh (Father of
Fuzzy Logic), Dr. Firouz Naderi (Head, NASA Mars Exploration Program/
2000-2005 and Associate Director, Project Formulation & Strategy, Jet
Propulsion Lab, CalTech/NASA; Director, NASA's JPL Solar System
Exploration), Prof. David Lorge Parnas (Fellow of IEEE, ACM, RSC, CAE, GI;
Dr.h.c.: ETH Zurich, Prof. Emeritus, McMaster U. and U. of Limerick),
Prof. Eugene H. Spafford (Executive Director, CERIAS and Professor, Purdue
University), Dr. Sandeep Chatterjee (Vice President & Chief Technology
Officer, SourceTrace Systems, Inc.), Prof. Haym Hirsh (Dean, Cornell
University - formerly at Rutgers University, New Jersey, USA and former
director of Division of Information and Intelligent Systems, National
Science Foundation, USA), Dr. Flavio Villanustre (Vice-President, HPCC
Systems), Prof. Victor Raskin (Distinguished Professor, Purdue University,
USA); Prof. Alfred Inselberg (School of Mathematical Sciences, Tel Aviv
University, Israel; Senior Fellow, San Diego Supercomputing Center;
Inventor of the multidimensional system of Parallel Coordinates and
author of textbook); Prof. H. J. Siegel (Abell Endowed Chair Distinguished
Professor of ECE and Professor of CS; Director, CSU Information Science
and Technology Center (ISTeC), Colorado State University, Colorado, USA);
and many other distinguished speakers. To get a feeling about the
conferences' atmosphere, see some delegates photos available at:

An important mission of The Congress is "Providing a unique platform for
a diverse community of constituents composed of scholars, researchers,
developers, educators, and practitioners. The Congress makes concerted
effort to reach out to participants affiliated with diverse entities
(such as: universities, institutions, corporations, government agencies,
and research centers/labs) from all over the world. The congress also
attempts to connect participants from institutions that have teaching as
their main mission with those who are affiliated with institutions that
have research as their main mission. The congress uses a quota system to
achieve its institution and geography diversity objectives."

One main goal of the congress is to assemble a spectrum of affiliated
research conferences, workshops, and symposiums into a coordinated
research meeting held in a common place at a common time. This model
facilitates communication among researchers in different fields of computer
science, computer engineering, and applied computing. The Congress also
encourages multi-disciplinary and inter-disciplinary research initiatives;
ie, facilitating increased opportunities for cross-fertilization across
sub-disciplines.


TUTORIALS:

All tutorials are free to conference registrants, the list of tutorials
that have been approved so far can be found at:
We plan to offer more tutorials (in addition to what is already posted on
the web). As of the writing of this announcement, the following tutorials
have been approved and they will be presented by distinguished speakers:

O. Accreditation Board of Engineering and Technology (ABET)
   accreditation of Computer Science Program
O. Natural Language in Information Security and Privacy
O. Recommendation Systems for Big Data
O. Energy-Aware Resource Management for Computing Systems
O. Hacking with Kali Linux
O. Cryptography and Network Security
O. First Programming Language in CS Education - The Argument For Scala
O. Fault Tolerance and Beyond
O. Agents at High Seas
O. Actor Parallelism and Akka/Scala
O. Cloud Computing for Big Data Challenges
   (Cloud Architectures and Big Data Tools)
O. The Use of ICT to Mitigate Income Inequality

Currently, we are evaluating 6 other proposals and they are in the areas of
Big Data and Data Analytics (3 proposals); Entrepreneurial Spirits;
Visualization and Datamining; and Computational Biology.


USEFUL LINKS:

Conference web site:

Partial list of tutorials:

Partial list of keynotes:

Location of the conference:


MEASURABLE SCIENTIFIC IMPACT OF CONGRESS:

As of December 14, 2013, papers published in the congress proceedings
have received over 27,500 citations (includes about 3,300 self-citations).
Citation data obtained from Microsoft Academic Search. This citation
data does not even include more than 15,000 other citations to papers
in tracks whose first offerings were initiated by the congress.

Based on citation record and other relevant metrics, Microsoft Academic
has listed many of the joint conferences that are part of this congress
in its list of Top Conferences (e.g., go to
http://academic.research.microsoft.com/ ; select the tab "Conferences"
and then type "PDPTA", or "FECS", or "IC-AI", or "ICOMP", ...)

MISCELLANEOUS:
The information that appears in this announcement is correct as of May 19,
2014.

CONTACT:
Inquiries should be sent to: sc@world-comp.org