The 2016 International Conference on Security and Management
Las Vegas, USA, July 25-28
WORLDCOMP 2016
Call for Papers
The 2016 International Conference on Security and Management (SAM’16) is the 15th annual comprehensive security conference dealing with all aspects of security. This annual Security and Management Conference is a leading international opportunity for computer and network security professionals and users to investigate innovative ideas and outcomes, and to exchange experiences on various aspects of information security.
You are invited to submit a full paper for consideration. Novel research in all practical areas of computer and network security is sought. Submissions from academia, government, and industry are encouraged. All accepted papers will be published in the SAM’16 conference proceedings (in printed book form; later, the proceedings will also be accessible online). Papers should demonstrate significant contribution to the construction, evaluation, application, or operation of secure systems.
There are nine tracks in this conference; Cryptographic Technologies, Security Applications, Information Assurance, Network Security, Hardware Security, Computer Security, Security management, Security Education, and Biometrics and Forensics. For details of the tracks, please refer to the conference website at http://sam.udmercy.edu/sam16 and click on “Call for Papers.”
Prospective authors are invited to submit their papers by uploading them to the evaluation website at:
https://easychair.org/conferences/?conf=sam160
If you have not used EasyChair before, please create your new account first. To upload your paper, please click on “New Submission.” The first page of the draft paper should include: title of the paper, name, affiliation, postal address, and email address for each author. The first page should also identify the name of the Contact Author and a maximum of 5 topical keywords that would best represent the content of the paper. Please ensure that the first page also includes the TRACK(s) that you regard as the most appropriate one for your paper review.
Important Dates
March 22, 2016
Submission of full papers (about 7 pages)
April 17, 2016
Notification of acceptance (+/- two days)
May 10, 2016
Final papers + Copyright + Registration
July 25-28, 2016 The 2016 International Conference on Security and Management
Contact Information
Dr. Kevin Daimi, Conference Chair
Computer Science and Software Engineering
University of Detroit Mercy,
Detroit, MI, 48221-3038, USA
Email: daimikj@udmercy.edu
This site is for announcements for The International Conference on Security and Management (SAM) at The World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP). See http://www.world-academy-of-science.org for the WORLDCOMP Web site. SAM'15 URL: http://sam.udmercy.edu/sam15/
Sunday, January 24, 2016
Call for Posters: The 2016 International Conference on Security and Management (SAM'16), Las Vegas, USA, July 25-28, 2016
The 2016 International Conference on Security and Management
Las Vegas, USA, July 25 - 28
WORLDCOMP 2016
Call for Posters
The 2016 International Conference on Security and Management (SAM’16) is the 15th annual comprehensive security conference dealing with all aspects of security. This annual Security and Management Conference is a leading international opportunity for computer and network security professionals and users to investigate innovative ideas and outcomes, and to exchange experiences on various aspects of information security.
There are nine tracks in this conference; Cryptographic Technologies, Security Applications, Information Assurance, Network Security, Hardware Security, Computer Security, Security management, Security Education, and Biometrics and Forensics. For details of the tracks, please refer to the conference website at http://sam.udmercy.edu/sam16.
The 2016 International Conference on Security and Management (SAM’16) encourages the submission of posters to provide an environment for demonstrating and discussing work in progress, and industry presentations of new applications, techniques, technologies, or approaches in the field of computer and network security. Interested authors are invited to submit a short proposal illustrating the main contributions of their posters. Proposals should contain an abstract stressing the motivation and rationale for their contribution. Poster may reflect initial results of the work.
Posters will be evaluated mainly on their ability to promote discussion, inspire the exchange of ideas, and foster collaborations among conference participants. Poster proposals must conform to IEEE writing style guidelines with 3 pages maximum including title, authors’ affiliation, abstract, content, figures, and references.
Accepted posters will be published as an extended abstract. The maximum number of pages for the extended abstract is 2.
Poster boards will be provided on site at the conference. The poster boards will be large enough to accommodate 8 US standard size stationaries to be pinned on them using 4 rows with 2 pages per row, or 2 rows with 4 pages per row. The poster board sizes are 45 inches x 22 inches. The boards can be flipped if desired. Two poster boards next to each other for one accepted poster can be arranged if needed.
Submissions should be emailed to the Posters Co-Chair; Hanen Idoudi (Hanen.Idoudi@ensi.rnu.tn), or Esmiralda Moradian (esmirald@dsv.su.se).
Las Vegas, USA, July 25 - 28
WORLDCOMP 2016
Call for Posters
The 2016 International Conference on Security and Management (SAM’16) is the 15th annual comprehensive security conference dealing with all aspects of security. This annual Security and Management Conference is a leading international opportunity for computer and network security professionals and users to investigate innovative ideas and outcomes, and to exchange experiences on various aspects of information security.
There are nine tracks in this conference; Cryptographic Technologies, Security Applications, Information Assurance, Network Security, Hardware Security, Computer Security, Security management, Security Education, and Biometrics and Forensics. For details of the tracks, please refer to the conference website at http://sam.udmercy.edu/sam16.
The 2016 International Conference on Security and Management (SAM’16) encourages the submission of posters to provide an environment for demonstrating and discussing work in progress, and industry presentations of new applications, techniques, technologies, or approaches in the field of computer and network security. Interested authors are invited to submit a short proposal illustrating the main contributions of their posters. Proposals should contain an abstract stressing the motivation and rationale for their contribution. Poster may reflect initial results of the work.
Posters will be evaluated mainly on their ability to promote discussion, inspire the exchange of ideas, and foster collaborations among conference participants. Poster proposals must conform to IEEE writing style guidelines with 3 pages maximum including title, authors’ affiliation, abstract, content, figures, and references.
Accepted posters will be published as an extended abstract. The maximum number of pages for the extended abstract is 2.
Poster boards will be provided on site at the conference. The poster boards will be large enough to accommodate 8 US standard size stationaries to be pinned on them using 4 rows with 2 pages per row, or 2 rows with 4 pages per row. The poster board sizes are 45 inches x 22 inches. The boards can be flipped if desired. Two poster boards next to each other for one accepted poster can be arranged if needed.
Submissions should be emailed to the Posters Co-Chair; Hanen Idoudi (Hanen.Idoudi@ensi.rnu.tn), or Esmiralda Moradian (esmirald@dsv.su.se).
Call for Sessions: The 2016 International Conference on Security and Management (SAM'16), Las Vegas, USA, July 25-28, 2016
The 2016 International Conference on Security and Management
Las Vegas, USA, July 25 - 28
WORLDCOMP 2016
Session/ Workshop Organization
The 2016 International Conference on Security and Management (SAM’16) is the 15th annual comprehensive security conference dealing with all aspects of security. This annual Security and Management Conference is a leading international opportunity for computer and network security professionals and users to investigate innovative ideas and outcomes, and to exchange experiences on various aspects of information security.
There are nine tracks in this conference; Cryptographic Technologies, Security Applications, Information Assurance, Network Security, Hardware Security, Computer Security, Security management, Security Education, and Biometrics and Forensics. For details of the tracks, please refer to the conference website at http://sam.udmercy.edu/sam16.
You are invited to submit a proposal to organize a session or a workshop. Each technical session will have at least 6 paper presentations from different authors (12 papers in the case of workshop). The session/workshop chairs will be responsible for all aspects of their sessions/workshop; including, soliciting, reviewing, and selecting papers. The names of session/workshop chairs will appear as Associate Editors in the conference proceedings and on the cover of the books. Proposers may submit more than one session/workshop proposal.
Proposals to organize technical sessions/workshops should include the following information:
Name, address, E-mail of proposer in addition to his/her biography.
Title of session/workshop.
A 100-word description of the session/workshop.
A short description of the process for reviewing and selecting papers.
A short description on how the session/workshop will be advertised (in most cases, session/workshop proposers solicit papers from colleagues and researchers whose work is known to the session proposer).
Email your session/workshop proposal to the Sessions/Workshops Co-chairs, Flaminia Luccio (luccio@unive.it) or Shadi Banitaan (banitash@udmercy.edu). The deadline for proposals is February 5, 2016. We would like to receive the session/workshop proposals as soon as possible.
Las Vegas, USA, July 25 - 28
WORLDCOMP 2016
Session/ Workshop Organization
The 2016 International Conference on Security and Management (SAM’16) is the 15th annual comprehensive security conference dealing with all aspects of security. This annual Security and Management Conference is a leading international opportunity for computer and network security professionals and users to investigate innovative ideas and outcomes, and to exchange experiences on various aspects of information security.
There are nine tracks in this conference; Cryptographic Technologies, Security Applications, Information Assurance, Network Security, Hardware Security, Computer Security, Security management, Security Education, and Biometrics and Forensics. For details of the tracks, please refer to the conference website at http://sam.udmercy.edu/sam16.
You are invited to submit a proposal to organize a session or a workshop. Each technical session will have at least 6 paper presentations from different authors (12 papers in the case of workshop). The session/workshop chairs will be responsible for all aspects of their sessions/workshop; including, soliciting, reviewing, and selecting papers. The names of session/workshop chairs will appear as Associate Editors in the conference proceedings and on the cover of the books. Proposers may submit more than one session/workshop proposal.
Proposals to organize technical sessions/workshops should include the following information:
Name, address, E-mail of proposer in addition to his/her biography.
Title of session/workshop.
A 100-word description of the session/workshop.
A short description of the process for reviewing and selecting papers.
A short description on how the session/workshop will be advertised (in most cases, session/workshop proposers solicit papers from colleagues and researchers whose work is known to the session proposer).
Email your session/workshop proposal to the Sessions/Workshops Co-chairs, Flaminia Luccio (luccio@unive.it) or Shadi Banitaan (banitash@udmercy.edu). The deadline for proposals is February 5, 2016. We would like to receive the session/workshop proposals as soon as possible.
Friday, January 22, 2016
Call For Papers and Sessions: The 2016 World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, July 25-28, 2016, Paper Submission Deadline: March 22, 2016
CALL FOR PAPERS
+
CALL FOR WORKSHOPS/SESSIONS
Paper
Submission Deadline: March 22, 2016
The
2016 World Congress in Computer Science,
Computer Engineering, and Applied Computing
July
25-28, 2016, Monte Carlo Resort, Las Vegas, USA
http://worldcomp.org/events/2016
You are invited to submit a paper for consideration. All
accepted papers
will be published in printed conference books/proceedings
(each with a
unique international ISBN number) and will also be made
available online.
The proceedings will be indexed in science citation
databases that track
citation frequency/data. In addition, like prior years,
extended versions
of selected papers (about 40%) will appear in journals
and edited
research books; publishers include, Springer, Elsevier,
BMC, and others).
See the web link below for a small subset of such
publications:
(some of these books and journal special issues have
already received
the top 25% downloads in their respective fields and/or
identified as
"Highly Accessed" by publishers and/or science
citation index trackers.)
http://worldcomp.org/events/2016/worldcomp-books-journal-special-issues
Last year, the Congress had attracted
speakers/authors/participants
affiliated with over 178 different universities
(including many from the
top 50 ranked institutions), many major IT corporations
(including,
Microsoft, Google, SAP, Oracle, Amazon, Yahoo, Samsung,
IBM, Ebay, GE,
Siemens, HSBC, GlaxoSmithKline, Philips, Ericsson, BAE
Systems, Airbus,
Boeing, Hyundai, Hitachi, NTT, ...), government research
agencies (NSF,
NIH, DoE, AirForce, ...), national laboratories
(including, NASA, ANL,
LLNL, Sandia, ORNL, Lawrence Berkeley National Lab, Los
Alamos National
Lab, ...), and a number of Venture Capitalists as well as
speakers
discussing Intellectual Property issues.
The Congress is composed of a number of tracks
(joint-conferences,
tutorials, sessions, workshops, poster and panel
discussions); all will
be held simultaneously, same location and dates: July
25-28, 2016. For
the complete list of joint conferences, see below.
IMPORTANT DATES:
February 5, 2016:
Workshop / Session Proposals
March 22, 2016: Submission
of full papers (max 7 pages)
April 17, 2016:
Notification of acceptance (+/- two days)
May 10, 2016:
Final papers + Copyright + Registration
July 25-28, 2016:
The 2016 World Congress in Computer Science,
Computer Engineering, and Applied Computing
(including all affiliated federated conferences).
SUBMISSION OF PAPERS FOR EVALUATION: (
http://world-comp.org )
Prospective authors are invited to submit their papers by
uploading them
to the evaluation web site at: http://world-comp.org . Submissions must
be uploaded by the due date (see IMPORTANT DATES) and
must be in either
MS doc or pdf formats (7 pages for Regular Research
Papers; 4 pages for
Short Research Papers; 2 pages for Extended
Abstract/Poster Papers - the
number of pages include all figures, tables, and
references). All
reasonable typesetting formats are acceptable (later, the
authors of
accepted papers will be asked to follow a particular
typesetting format
to prepare their final papers for publication; these
formatting
instructions appear at the submission web site and they
conform to the
two-column IEEE style format). Papers must not have been
previously
published or currently submitted for publication
elsewhere.
The first page of the paper should include the
followings:
- Title of the
paper
- Name,
affiliation, postal address, and email address of each author
(identify the
name of the Contact Author)
- Abstract
(between 100 and 120 words)
- A maximum of 5
topical keywords that would best represent the work
described in
the paper
- Write the type
of the submission as "Regular Research Paper",
"Short
Research Paper", or "Extended Abstract/Poster Paper".
- The actual
text of the paper can start from the first page (space
permitting).
Submissions are
to be uploaded to the submission/evaluation web site
portal.
Type of Submissions/Papers:
- Full/Regular
Research Papers (maximum of 7 pages):
Regular
Research Papers should provide detail original research
contributions.
They must report new research results that represent
a contribution
to the field; sufficient details and support for
the results and
conclusions should also be provided. The work
presented in
regular papers are expected to be at a stage of maturity
that with some
additional work can be published as journal papers.
- Short Research
Papers (maximum of 4 pages):
Short Research
Papers report on ongoing research projects. They
should provide
overall research methodologies with some results.
The work
presented in short papers are expected to be at a stage
of maturity
that with some additional work can be published as
regular papers.
- Extended
Abstract/Poster Papers (maximum of 2 pages):
Poster papers
report on ongoing research projects that are still in
their infancy
(i.e., at very early stages). Such papers tend to
provide
research methodologies without yet concrete results.
Each paper will be peer-reviewed by two experts in the
field for
originality, significance, clarity, impact, and
soundness. In cases of
contradictory recommendations, a member of the conference
program
committee would be charged to make the final decision
(accept/reject);
often, this would involve seeking help from additional
referees. Papers
whose authors include a member of the conference program
committee will
be evaluated using the double-blinded review process.
(Essay/philosophical
papers will not be refereed but may be considered for
discussion/panels).
The proceedings will be published in printed conference
books (ISBN) and
will also be made available online. The printed
proceedings/books will
be available for distribution on site at the conference.
The proceedings
will be indexed in science citation databases that track
citation
frequency/data for each published paper. The
proceedings/books of this
congress have been evaluated and approved for inclusion
into major
science citation index databases. In addition, all
proceedings are
approved for inclusion into EBSCO, one of the largest
subject index
systems. ACM Digital Library is also including the titles
into its
database as well as ProQuest indexing database and
others.
In addition to the above, we have arranged two new book
series (multiple
books in each series); one with Elsevier publishers
(Emerging Trends in
Computer Science and Applied Computing) and another with
Springer
publishers (Transactions of Computational Science and Computational
Intelligence).
After the conference (the process may take 12 to 18
months), a significant number of authors of accepted
papers of our
congress, will be given the opportunity to submit the
extended version
of their papers for publication consideration in these
books. We
anticipate having between 10 and 15 books a year in each
of these book
series projects. Each book in each series will be subject
to Elsevier
and Springer science indexing products (which includes:
Scopus, SCI
Compendex, Engineering Village, EMBASE, and others). For
a recent and
a very small subset of the books (and journal special
issues) that
have been published mostly based on the extended versions
of this
congress papers, see the link and titles below:
http://worldcomp.org/events/2016/worldcomp-books-journal-special-issues
Some of these books and journal special issues have
already received
the top 25% downloads in their respective fields and/or
identified as
"Highly Accessed" by publishers and/or science
citation index trackers.
Some titles appear below (a small subset):
o. Elsevier/MK:
Emerging Trends in Image Processing, Computer
Vision and
Pattern Recognition. (about 650 pages)
o. Springer:
Software Tools and Algorithms for Biological Systems;
Series:
Advances in Experimental Medicine and Biology, Vol 696.
780 pages
(Awarded the top 25% downloads in the field.)
o. Springer:
Advances in Computational Biology; Series: Advances
in
Experimental Medicine and Biology, Vol 680. 700+ pages.
(Awarded the
top 25% downloads in the field.)
o. Journal of BMC
Systems Biology: Special Journal Issue
"Bioinformatics and Computational Biology", (Vol. 5, Supp. 3);
Impact Factor:
2.44. 200+ pages.
(Many articles
of this issue is marked as "Highly accessed".)
o. Elsevier/MK:
Emerging Trends in ICT Security (Information and
Communications
Technology). 660 pages.
(One of the
most highly accessed books in the field.)
o. Journal of BMC
Medical Genomics: Special Journal Issue
"Bioinformatics and Computational Biology", (Vol. 6, Supp. 1);
Impact Factor:
2.87. 240+ pages.
(Some articles
of this issue is marked as "Highly accessed".)
o. Springer:
Transactions on Computational Science and
Computational
Intelligence (multiple volumes).
o. Journal of BMC
Genomics: Special Journal Issue "Bioinformatics
and
Computational Biology", (Vol. 9, Supp. 1); Impact
Factor: 3.99.
250+ pages.
(Some articles
of this issue is marked as "Highly accessed".)
o. Elsevier/MK:
Emerging Trends in Computer Science and Applied
Computing
(multiple volumes.)
o. Journal of BMC
Genomics: Special Journal Issue "Advances in
Big Data
Analytics", (Vol. 15, Supp. 11); Impact Factor: 3.99.
100+ pages.
(Some articles
of this issue is marked as "Highly accessed".)
o. Elsevier/MK:
Emerging Trends in Computational Biology,
Bioinformatics, and Systems Biology - Algorithms and Software
Tools. 600+
pages.
o. Elsevier/MK:
Emerging Trends in Computational Biology,
Bioinformatics, and Systems Biology - Systems and Applications.
(In Press).
600+ pages.
o. Springer:
Resilient Computer System Design.
300+ pages.
o. Journal of BMC
Bioinformatics: Special Journal Issue (Vol 15,
Supp. 17);
Impact Factor: 2.58. 140+ pages.
(Some articles
of this issue is marked as "Highly accessed".)
o. Springer: The
Journal of Supercomputing (multiple journal
issues);
o. Springer:
Special Issue in Annals of Information Systems;
Data Mining;
Vol. 8; 400 pages.
o. Springer: Real
World Data Mining Applications; in Annals of
Information
Systems; Vol. 17; 420 pages.
PROPOSAL FOR ORGANIZING WORKSHOPS/SESSIONS:
Each conference (see below for the list) is composed of a
number of tracks.
A track can be a session, a workshop, or a symposium. A
session will have
at least 6 papers; a workshop at least 12 papers; and a
symposium at least
18 papers. Track chairs will be responsible for all
aspects of their tracks,
including: soliciting papers, reviewing, selecting, ...
The names of track
chairs will appear as Associate Editors in the conference
proceedings and
on the cover of the printed books (and indexed in science
databases as such).
Track chairs who attract a sufficient number of solid
papers can propose
to edit books with a major publisher based on the
extended versions of the
papers accepted in their tracks (the congress will
facilitate and help such
track chairs to get the publisher's approval).
Proposals to organize tracks (sessions, workshops, or
symposiums) should
include the following information: name and address (+
email) of proposer,
his/her biography, title of track, a 100-word description
of the topic of
the track, the name of the conference the track is
submitted for
consideration (i.e., PDPTA, IPCV, ...), and a short
description on how
the track will be advertised (in most cases, track
proposers solicit papers
from colleagues and researchers whose work is known to
the track proposer).
E-mail your track proposal to editor@world-comp.org . We
would like to
receive the track proposals as soon as possible (see
IMPORTANT DATES).
LIST OF CONFERENCES (in no particular order):
o ABDA'16:
The 3rd
International Conference on Advances in Big Data Analytics
o BIOCOMP'16:
The 17th
International Conference on Bioinformatics & Computational
Biology
o BIOENG'16:
The 2nd
International Conference on Biomedical Engineering and Sciences
o CSC'16:
The 14th
International Conference on Scientific Computing
o DMIN'16:
The 12th
International Conference on Data Mining
o EEE'16:
The 15th
International Conference on e-Learning, e-Business,
Enterprise
Information Systems, and e-Government
o ESCS'16:
The 14th
International Conference on Embedded Systems, Cyber-physical
Systems, and
Applications
o FCS'16:
The 12th
International Conference on Foundations of Computer Science
o FECS'16:
The 12th
International Conference on Frontiers in Education: Computer
Science and
Computer Engineering
o GCC'16:
The 12th
International Conference on Grid, Cloud, and Cluster
Computing
o HIMS'16:
The 2nd
International Conference on Health Informatics and
Medical Systems
o ICAI'16:
The 18th
International Conference on Artificial Intelligence
o ICOMP'16:
The 17th
International Conference on Internet Computing and
Internet of
Things
o ICWN'16:
The 15th
International Conference on Wireless Networks
o IKE'16:
The 15th International
Conference on Information & Knowledge
Engineering
o IPCV'16:
The 20th
International Conference on Image Processing, Computer
Vision, &
Pattern Recognition
o MSV'16:
The 13th
International Conference on Modeling, Simulation and
Visualization
Methods
o PDPTA'16:
The 22nd
International Conference on Parallel and Distributed
Processing
Techniques and Applications
o SAM'16:
The 15th
International Conference on Security and Management
o SERP'16:
The 14th
International Conference on Software Engineering Research
and Practice
July 25-28, 2016, Monte Carlo Resort, Las Vegas, USA.
All conferences listed above will be held simultaneously;
i.e., same location and dates.
MEMBERS OF PROGRAM AND ORGANIZING COMMITTEES:
Currently being finalized. The members of the Steering
Committee of
the last offerings of the congress included: Dr. Selim
Aissi,
(formerly: Chief Strategist - Security, Intel
Corporation, USA) Vice
President, Global Information Security, Visa Inc., USA;
Prof. Abbas
M. Al-Bakry, University President, University of IT and
Communications, Baghdad, Iraq; Prof. Nizar Al-Holou,
Professor and
Department Chair, and Vice Chair of IEEE/SEM Computer
Chapter,
University of Detroit Mercy, Detroit, Michigan, USA; Dr.
Hamid Ali
Abed Alasadi, Head, Department of Computer Science, Basra
University,
Iraq and Member of Optical Society of America (OSA) and
SPIE,
Washington, USA; Prof. Hamid R. Arabnia, University of Georgia,
USA
and Editor-in-Chief, Journal of Supercomputing (Springer)
and Elected
Fellow of Int'l Society of Intelligent Biological
Medicine (ISIBM);
Prof. Michael Panayiotis Bekakos, Director of Laboratory
of Digital
Systems and Head of Parallel Algorithms and architectures
Research
Group, Democritus University of Thrace, Greece; Prof.
Juan Jose
Martinez Castillo, Director, The Acantelys Alan Turing
Nikola Tesla
Research Group and GIPEB, Universidad Nacional Abierta,
Venezuela;
Prof. Kevin Daimi, Director of Computer Science and
Software
Engineering Programs, University of Detroit Mercy,
Detroit, Michigan,
USA; Dr. Lamia Atma Djoudi, Synchrone Technologies,
France; Prof.
Mary Mehrnoosh Eshaghian-Wilner, Professor of Engineering
Practice,
University of Southern California, California, USA and
Adjunct
Professor, EE, University of California Los Angeles
(UCLA),
California, USA; Prof. George A. Gravvanis, Director,
Physics Lab. &
Head of Advanced Scientific Computing, Applied Math &
Applications
Research Group and Professor of Applied Mathematics and
Numerical
Computing and Department of ECE, School of Engineering,
Democritus
University of Thrace, Xanthi, Greece (former President of
the
Technical Commission, European Commission); Prof. Houcine
Hassan,
Universitat Politecnica de Valencia, Spain; Prof. George
Jandieri,
Georgian Technical University, Tbilisi, Georgia and Chief
Scientist,
The Institute of Cybernetics, Georgian Academy of
Science, Georgia;
Prof. Young-Sik Jeong, Editor-in-Chief of Journal of
Information
Processing Systems (JIPS), Dongguk University, Seoul,
South Korea;
Prof. Byung-Gyu Kim, Multimedia Processing Communications
Lab.
(MPCL), Department of CSE, SunMoon University, South
Korea; Prof.
Tai-hoon Kim, School of Information and Computing
Science,
University of Tasmania, Australia; Prof. D. V. Kodavade,
Head of
Computer Science and Engineering, DKTE Institute, India;
Prof. Dr.
Guoming Lai, Computer Science and Technology, Sun Yat-Sen
University, Guangzhou, P. R. China; Prof. Victor
Malyshkin, Head
of Supercomputer Software Department, Russian Academy of
Sciences,
Russia; Prof. George Markowsky, Professor & Associate
Director,
School of Computing and Information Science and Chair of
Int'l
Advisory Board of IEEE IDAACS, University of Maine,
Orono, USA;
Dr. Andrew Marsh, CEO, HoIP Telecom Ltd (Healthcare over
Internet
Protocol), UK and Secretary General of World Academy of
BioMedical
Sciences and Technologies (WABT), a UNESCO NGO, The
United Nations;
Prof. G. N. Pandey, Vice-Chancellor, Arunachal University,
India
and Adjunct Professor of Indian Institute of Information
Technology, Allahabad, India; Prof. James J. (Jong Hyuk)
Park,
Head, Department of Computer Science and Engineering
(DCSE),
SeoulTech, South Korea and President of FTRA, South
Korea; Dr.
Akash Singh, IBM Corporation, Sacramento, California, USA
and
Chartered Scientist, Science Council, UK and Fellow of
British
Computer Society, USA; Ashu M. G. Solo (Publicity Chair),
Fellow
of British Computer Society, Principal/Interdisciplinary
R&D
Engineer and Mathematician, Maverick Technologies America
Inc.;
Prof. Sang C. Suh, Head and Professor of Computer
Science,
Vice President, of Society for Design and Process Science
(SDPS),
Director of Intelligent Cyberspace Engineering (ICEL),
Texas A&M
University, Com., Texas, USA; Prof. Fernando G. Tinetti,
School of
Computer Science, Universidad Nacional de La Plata, La
Plata,
Argentina and Co-editor, Journal of Computer Science and
Technology (JCS&T);
Dr. Predrag Tosic, Microsoft, Washington, USA; Prof.
Vladimir Volkov,
The Bonch-Bruevich State University of
Telecommunications, Saint-Petersburg,
Russia; Prof. Patrick S. P. Wang, Fellow of IAPR, ISIBM,
WASE and
Professor of Computer and Information Science,
Northeastern
University, Boston, Massachusetts, USA and
Otto-von-Guericke
Distinguished Guest Professor, University Magdeburg,
Germany;
Prof. Shiuh-Jeng Wang, Department of Information
Management,
Central Police University, Taiwan and Program Chair, Security
&
Forensics, Taiwan and Director of Information Crypto and
Construction Lab (ICCL) & ICCL-FROG; Prof. Mary Q.
Yang,
Director of Mid-South Bioinformatics Center and Joint
Bioinformatics PhD Program, Medical Sciences and George
W.
Donaghey College of Engineering and Information
Technology,
University of Arkansas, USA; Prof. Jane You, Associate
Head,
Department of Computing, The Hong Kong Polytechnic
University,
Kowloon, Hong Kong.
The 2016 Program Committee for individual conferences are
currently
being compiled. Many who have already joined the
committees are
renowned leaders, scholars, researchers, scientists and
practitioners of the highest ranks; many are directors of
research
labs., fellows of various societies, heads/ chairs of
departments,
program directors of research funding agencies, as well
as deans
and provosts.
Program Committee members are expected to have
established a strong and
documented research track record. Those interested in
joining the Program
Committee should email editor@world-comp.org the following information
for consideration: Name, affiliation and position,
complete mailing
address, email address, a one-page biography that
includes research
expertise & the name of the conference(s) offering to
help with.
GENERAL INFORMATION:
The Congress will be composed of research presentations,
keynote
lectures, invited presentations, tutorials, panel
discussions, and
poster presentations. In recent past,
keynote/tutorial/panel speakers
have included: Prof. David A. Patterson (pioneer,
architecture, U. of
California, Berkeley), Dr. K. Eric Drexler (known as
Father of
Nanotechnology), Prof. John H. Holland (known as Father
of Genetic
Algorithms; U. of Michigan), Prof. Ian Foster (known as
Father of
Grid Computing; U. of Chicago & ANL), Prof. Ruzena
Bajcsy (pioneer,
VR, U. of California, Berkeley), Prof. Barry Vercoe
(Founding member
of MIT Media Lab, MIT), Dr. Jim Gettys (known as X-man,
developer of
X Window System, xhost; OLPC), Prof. John Koza (known as
Father of
Genetic Programming, Stanford U.), Prof. Brian D. Athey
(NIH Program
Director, U. of Michigan), Prof. Viktor K. Prasanna
(pioneer, U. of
Southern California), Dr. Jose L. Munoz (NSF Program
Director and
Consultant), Prof. Jun Liu (pioneer, Broad Institute of
MIT &
Harvard U.), Prof. Lotfi A. Zadeh (Father of Fuzzy
Logic), Dr. Firouz
Naderi (Head, NASA Mars Exploration Program 2000-2005 and
Associate
Director, Project Formulation & Strategy, Jet
Propulsion Lab,
CalTech/NASA; Director, NASA's JPL Solar System Exploration),
Prof.
David Lorge Parnas (Fellow of IEEE, ACM, RSC, CAE, GI;
Dr.h.c.:
ETH Zurich, Prof. Emeritus, McMaster U. and U. of
Limerick),
Prof. Eugene H. Spafford (Executive Director, CERIAS and
Professor,
Purdue University), Dr. Sandeep Chatterjee (Vice
President & Chief
Technology Officer, SourceTrace Systems, Inc.), Prof.
Haym Hirsh
(Dean, Cornell University - formerly at Rutgers
University,
New Jersey, USA and former director of Division of
Information and
Intelligent Systems, National Science Foundation, USA),
Prof. Victor
Raskin (Distinguished Professor, Purdue University, USA);
Prof.
Alfred Inselberg (School of Mathematical Sciences, Tel
Aviv U,
Israel; Senior Fellow, San Diego Supercomputing Center;
Inventor of
the multidimensional system of Parallel Coordinates and
author of
textbook); Prof. H. J. Siegel (Abell Endowed Chair
Distinguished
Professor of ECE and Professor of CS; Director, CSU
Information
Science and Technology Center (ISTeC), Colorado State
University,
Colorado, USA); Prof. Amit Sheth (Fellow of IEEE and
LexisNexis
Eminent Scholar; Founder/Executive Director, Ohio Center
of
Excellence in Knowledge-enabled Computing (Kno.e.sis) and
Professor
of Computer Science, Wright State University, Ohio, USA);
Dr.
Leonid I. Perlovsky (Harvard University, USA and School
of
Engineering and Applied Sciences and Medical School
Athinoula
Martinos Brain Imaging Center; and The US Air Force
Research Lab.,
USA; CEO, LP Information Technology, USA and Chair of IEEE
Task
Force on The Mind and Brain; Recipient of John McLucas
Award,
the highest US Air Force Award for basic research); Dr.
James A.
Crowder (Chief Engineer, Raytheon Intelligence,
Information, and
Services; Aurora, Colorado, USA); Prof. Yaroslav D. Sergeyev
(Distinguished Professor, Head of Numerical Calculus
Laboratory
University of Calabria, Rende, Italy and part-time
Professor of
Lobachevsky State University, Russia); and many other
distinguished
speakers. The Congress is among the top five largest annual
gathering
of researchers in computer science, computer engineering
and applied
computing. We anticipate to have attendees from about 85
countries and
territories. To get a feeling about the conferences'
atmosphere, see
some delegates photos available at:
2015 Congress: http://worldcomp.phanfare.com/6981287
2014 Congress: http://worldcomp.phanfare.com/6626396
Last 10 years: http://worldcomp.phanfare.com/
An important mission of The Congress is "Providing a
unique platform
for a diverse community of constituents composed of
scholars,
researchers, developers, educators, and practitioners.
The Congress
makes concerted effort to reach out to participants
affiliated with
diverse entities (such as: universities, institutions,
corporations,
government agencies, and research centers/labs) from all
over the
world. The congress also attempts to connect participants
from
institutions that have teaching as their main mission
with those who
are affiliated with institutions that have research as
their main
mission. The congress uses a quota system to achieve its
institution
and geography diversity objectives."
MEASURABLE SCIENTIFIC IMPACT OF CONGRESS:
As of January 5, 2016, papers published in the conference
proceedings
that have been held as part of this congress, have
received 28,380
citations (includes 3,346 self-citations). Citation data
is obtained
from Microsoft Academic Search. The citation data does
not even
include more than 17,000 other citations to papers in
conferences
whose first offerings were initiated by this congress
(such as:
FUSION, ICWS, ICMLA, and others).
MISCELLANEOUS:
The information that appears in this announcement is
correct as of
January 5, 2016.
CONTACT:
Inquiries should be sent to: sc@world-comp.org
Wednesday, July 8, 2015
Call For Participation: The 2015 World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, U.S.A., July 27-30, 2015
Call For Participation
The
2015 World Congress in Computer Science,
Computer Engineering, and Applied Computing
July 27-30, 2015, Las Vegas, USA
http://www.world-academy-of-science.org/
This is an invitation to attend The 2015 World Congress
in Computer
Science, Computer Engineering, and Applied Computing. The
congress
is composed of 20 major tracks composed of: 14 tutorials;
720 research
presentations divided into 141 sessions and workshops;
and 16 keynotes,
invited lectures, and panel discussions, ... - all will be
held
simultaneously, same location and dates: July 27-30,
2015. Attendees
will have full access to all conferences' sessions,
tracks, and
tutorials. Registration is required to attend. As of now,
59% of
registrants are from academia, 23% from industry; 17%
from government
and funding agencies; and 1% unknown (correct as of July
6). About
half of the attendees are from outside USA; from 77
nations. The
congress has participants, speakers, authors affiliated
with over 170
different universities (including many from the top 50
ranked
institutions), many major IT corporations (including,
Microsoft, Google,
Apple, SAP, Oracle, Amazon, Yahoo, Samsung, IBM, Ebay,
GE, Siemens, and
others), government research agencies (NSF, NIH, DoE, US
Air Force, a
number of security agencies, and others), and national
laboratories
(including, NASA, ANL, LLNL, Sandia, ORNL, Lawrence
Berkeley National
Lab, Los Alamos National Lab, ...) In addition, we will
also have
speakers discussing Intellectual Property issues as well
as other
related topics.
See below for:
A. General Information
B. Broad Topical Scopes
C. Registration Information (Deadline: July 22, 2015)
D. Congress Schedules/Programs
E. Location of congress (hotel)
F. Partial list of planned Tutorials and Featured
Keynotes
G. Partial list of organized sessions
H. Misc Information
We look forward to seeing you July 27-30, 2015.
-----------------------------cut
here-----------------------------
A. GENERAL INFORMATION:
http://www.world-academy-of-science.org/
B. BROAD TOPICAL SCOPES:
Advances in Big
Data Analytics (ABDA); Parallel and Distributed Processing
Techniques and
Applications (PDPTA); Health Informatics and Medical
Systems (HIMS);
Bioinformatics and Computational Biology (BIOCOMP);
Biomedical
Engineering and Sciences (BIOENG); Image Processing, Computer
Vision, and
Pattern Recognition (IPCV); Artificial Intelligence (ICAI);
Security and
Management (SAM); Software Engineering Research and Practice
(SERP);
e-Learning, e-Business, Enterprise Information Systems, and
e-Government
(EEE); Wireless Networks (ICWN); Data Mining (DMIN); Internet
Computing and
Big Data (ICOMP); Frontiers in Education in Computer Science
and Computer
Engineering (FECS); Scientific Computing (CSC); Modeling,
Simulation and
Visualization Methods (MSV); Embedded Systems and
Applications
(ESA); Grid and Cloud Computing and Applications (GCA);
Foundations of
Computer Science (FCS); and Information & Knowledge
Engineering
(IKE).
C. REGISTRATION INFORMATION: (Deadline: July 22, 2015)
http://www.worldacademyofscience.org/worldcomp15/ws/registration
D. CONGRESS SCHEDULES/PROGRAMS:
The detailed
schedule will be available in mid July (under the tab
"Program") at:
http://www.world-academy-of-science.org/worldcomp15/ws
E. LOCATION OF CONGRESS:
http://www.world-academy-of-science.org/worldcomp15/ws/location
Attendees are to
reserve their hotel rooms as soon as possible. A limited
number of rooms
are available at the reduced negotiated rate -
reservations
will be honored on the first-come first-served basis.
F. PLANNED TUTORIALS AND FEATURED KEYNOTES: (partial
list)
http://www.world-academy-of-science.org/worldcomp15/ws/tutorials
http://www.world-academy-of-science.org/worldcomp15/ws/keynotes
In addition to
the above, there are a number of focused invited talks
and lectures in
individual tracks (these are not listed in the above
links but will
be listed in the individual schedules for each conference
track.)
Tutorials are
free to conference registrants - Tutorial titles include
(partial list):
most tutorials are 3 hours long:
->
Cyberwarfare, Cybercrime and Cybersecurity
->
Energy-Aware Resource Management for Computing Systems
-> Best
Practices for Developing Real-World Mobile Apps, Software as a
Service
(SaaS) and Web Services
-> Building
Dependable Distributed Systems
-> What
Should We Know About Computational Humor
-> Introduction
to Cryptography and Network Security
-> JavaFX
Quickstart - Moving Beyond Swing for Rich User Interfaces
-> Human
Motion Tracking and Recognition with Microsoft Kinect
->
eMaintenance: Knowledge Discovery in Asset Data by the Means of
Data Mining
->
Application of MATLAB in Science and Engineering
-> Analyzing
and Protecting RFID and Card Access Systems
-> Data
Privacy for Emerging Mobile Cloud Apps
->
Integrative Big-Data Analysis for Translational Genomics Research
Partial/featured
list of Keynotes/Invited Talks:
-> Computing
the Context at the End of the Non-Semantic Era
Prof. Victor
Raskin
Distinguished
Professor of English and Linguistics and Professor of
Computer
Science and of Computer and Information Technology (Courtesy);
Co-Founder,
Associate Director, and Charter Fellow of Center for
Education and
Research in Information Assurance and Security (CERIAS);
Purdue
University, Indiana, USA
-> Lessons
from Commercializing Ideas from Colleges Around the World:
What College
Students, Faculty and Researchers Must Do to be Successful
Dr. Sandeep
Chatterjee
EVx Global
(www.evxglobal.com); Named Young Global Leader by the World
Economic
Forum for his professional accomplishments, commitment to
society and
potential to contribute to shaping the future of the world.
-> Artificial
Neurogenesis
Dr. James A.
Crowder
Chief
Engineer, Raytheon Intelligence, Information, and Services;
Aurora, Colorado, USA; Chief Mentor/Scientist
of the Automation,
Robotics and
Artificial Intelligence Research Lab - Alexandria School
of
Innovation, Douglas County, Colorado, USA
-> The
Infinity Computer and Numerical Computations with Infinities and
Infinitesimals
Prof.
Yaroslav D. Sergeyev, Ph.D., D.Sc., D.H.C.
Inventor of
the Infinity Computer; Distinguished Professor, Head of
Numerical
Calculus Laboratory, University of Calabria, Rende, Italy;
and Professor
(part-time), Lobachevsky State University, Nizhni
Novgorod,
Russia
-> Data
Science: The Road Ahead
Dr. Peter
Geczy
National
Institute of Advanced Industrial Science and Technology
(AIST), Japan
-> Evolving
Systems: Theory, Implementation, Application
Prof. Igor
Schagaev
London
Metropolitan University, London, UK; Research Advisor of
ITACS Ltd, UK
-> Funding
Enabling Technologies
Dr. Steve
Richfield
Founder of
Savant AI Holdings, USA
-> Systems
Genomics Approaches for Streamlined Big-Data Integrative
Genomics
Analysis
Dr. Mary Yang
Director of
MidSouth Bioinformatics Center; Director of the Joint
Bioinformatics
Ph.D. Program of University of Arkansas Little Rock
Donaghey
College of Engineering & Information Technology and
University of
Arkansas for Medical Sciences, Arkansas, USA
-> Data
Mining for RUL Estimation of Complex Assets
Prof. Diego
Galar
Division of
Operation and Maintenance Engineering, Lulea University
of
Technology, Lulea, Sweden
-> Panel:
Virtual Intelligence vs. Artificial Intelligence: The Good,
The Bad, and
the Ugly
PANEL
CHAIR/Moderator: Dr. James A. Crowder, Chief Engineer,
Raytheon
Intelligence, Information and Services, Aurora, Colorado, USA;
PANELISTS:
Prof. Victor
Raskin*, Dr. Julia Taylor**, Dr. John N. Carbone***
*Distinguished Professor of English and Linguistics and Professor of
Computer
Science and of Computer and Information Technology (Courtesy);
Co-Founder,
Associate Director, and Charter Fellow of Center for
Education and
Research in Information Assurance and Security (CERIAS);
Purdue
University, Indiana, USA
**Assistant
Professor, Computer and Information Technology; Fellow of
Center for
Education and Research in Information Assurance and
Security
(CERIAS), Purdue University, Indiana, USA
***Engineering
Fellow, Raytheon Intelligence, Information and Services,
Aurora,
Colorado, USA
-> Panel:
Security Challenges
PANEL
CHAIR/Moderator: Prof. George Markowsky
Professor and
Associate Director, School of Computing and Information
Science; Chair Int'l Advisory Board of IEEE
IDAACS; Director 2013
Northeast
Collegiate Cyber Defense Competition; Cooperating Prof. School
of Policy
& Int'l Affairs UMaine; University of Maine, Orono, USA
G. PARTIAL LIST OF ORGANIZED SESSIONS (multiple speakers
per session):
Some of these
sessions are further divided into more focused sessions
and many have
topics that overlap the topics of other sessions (correct
as of July 6,
2015)
-> High Performance
Computing, Distributed and Parallel Processing,
Databases
-> Big Data,
Data Centers and Cloud Computing
-> Big Data
Search, Mining Methods, Clustering, Knowledge Extraction
and
Engineering
->
Applications of Big Data + Software Tools
-> Big Data
Analytics and Related Issues
->
Bioinformatics
-> Protein
Classification and Structure Prediction, and Folding
->
Computational Structural Biology and Drug Design
-> Gene
Expression, Regulatory Networks, and Sequencing
-> Signal Processing and Imaging Science
->
Computational Biology
-> Medical
Devices and Supporting Systems
-> Biomedical
Engineering and Imaging Science
->
Computational Science and Optimization Methods
-> Modeling
and Simulation Frameworks
-> Fuzzy
Logic and Systems + Data Science
-> Semantic
Web and Web Services
-> Simulation
and Computational Modeling Methods
-> Finite
Element Methods and Finite Difference Methods
-> Cellular
Automata
-> Scientific
Computing, Algorithms and Applications
-> Real-World
Data Mining Applications, Challenges, and Perspectives
->
Regression, Classification, Clustering, Association
->
Segmentation, Clustering, Association + Multimedia Mining
-> Management
Issues, Web Tools + Prediction and Forcasting Methods
->
e-Business, e-Commerce, Enterprise Information Systems
-> e-Learning
+ Educational Concepts and Tools, and Academia Related
Issues
-> Embedded
Systems and Novel Application
-> Embedded
Microcontollers + Optimizations
-> HPC +
Virtual Machines + Fault Tolerant Devices
-> Resource
Constrained Devices
-> Power
Aware Computing and Energy Minimization
-> Graph and
Network Based Algorithms + Formal Methods
-> Optimization
Methods + Search and Indexing Algorithms
-> Foundation
of Computer Science + Education
-> Use of
Robots, Gamification, and Other Technologies in Education
-> Teaching
Methodologies, Curriculum and Course Development
-> Adaptive
Learning Systems + Experiential Learning
-> Online and
Massive Open Online Courses
-> Assessment
Strategies + Student Outcomes + and Accreditation
-> Case
Studies, Capstone Projects to Enhance Learning
-> Science,
Technology, Engineering and Mathematics - STEM Education
-> Flipping
the Classroom
-> Recruiting
Students to Computer Science, Retention Methods and
Strategies +
Addressing Diversity Issues
-> Teaching
and Testing Tools and Methods, e-Textbooks
-> Cloud
Computing, Cloud Services and Security + Mobile Computing
-> Scalable
Computing + Data Centers
-> Novel
Methods and Systems to Enhance Diagnosis + Tools for
Hospital
Emergency Rooms
-> Elderly
Care: Systems, Methods, and Novel Practices + Assistive
Technologies
-> Healthcare
and Medical Information Systems, Monitoring Systems
-> Healthcare
and Cloud Infrastructure + Mobile Systems + Wearables
-> Computer
Algorithms and Systems + Surgery Planning + Drug Discovery
and New Frameworks for Prediction and Early
Detection of Diseases
->
Informatics for Education and Research in Health and Medicine
-> Robotics
and Applications - hardware and software
-> Genetic
Algorithms + Evolutionary Strategies
-> Fuzzy Logic
and Sets, Fuzzy Control and Applications
-> Knowledge
Discovery and Machine Learning
-> Knowledge
Base Systems, Representation, Discovery + Information
Engineering
Methods and Related Issues
->
Intelligent Linguistic Technologies
-> Machine
Translation and Natural Language Processing
-> Artificial
Intelligence: Theory, Algorithms and Applications +
Cognitive
Science
-> Pattern
Recognition and Supporting Algorithms
-> Neural
Networks
-> Internet
and Web Computing, Infrastructures + Security and Privacy
-> Mobility:
Mobile Computing and Applications
-> Wireless
Sensor Networks
-> Security,
Privacy, and Related Systems and Algorithms
-> Ad-Hoc
Networks, MANET
-> Green
Networks and Energy Efficient Systems
->
Information and Knowledge Extraction, Representation and Sharing
-> Big Data
Analytics + Data Warehouse Design + Social Media +
Business
Intelligence and Recommender Systems
-> Knowledge
Engineering and Information Fusion + Knowledge Discovery
and Semantic
Web
->
Information Retrieval AND Ontology Based Methods
->
Legislation and Intellectual Property Issues
-> Identity
Management Methods
->
Recognition and Detection Methods: Face, Gesture, Object, Character
-> Image
Segmentation Methods
-> Wavelet
Transformation, Analysis, Applications + Watermarking
Methods,
Security, Privacy, and Encryption Methods
-> Motion
Segmentation, Tracking Algorithms + Video Processing,
Analysis and
Applications
-> Pattern
Recognition and Feature Detection, Extraction and
Classification
-> Imaging
Science Algorithms for 2D and 3D
-> Computer
Vision + Medical Imaging + Assistive Technologies
-> Soft
Computing in Image Processing and Computer Vision
-> Modeling,
Visualization, and Virtual Environments
->
Simulation, Numerical Methods, and Applications
-> Resource
Management, Resource Allocation, Scheduling, and Data
Management
->
Distributed Processing, and Applications
->
Communication Topologies and Interconnection Networks
-> Software
Tools and Systems and Parallelizing Compilers
->
Mathematical Modeling and Problem Solving
-> Parallel
Processing Algorithms, Systems, and Applications
-> Cloud
Computing and Next Generation
-> Mobile
Computing, Ad Hoc Networks, and Wireless Sensor Networks
-> Hardware
and Software Reconfigurability
-> Network on
Chip (NOC) and Embedded Systems
-> HPC for
Complex Systems
-> Biometrics
+ Forensics + Security Education
->
Cybersecurity Education
-> Computer
Security + Security Applications
->
Cryptographic Technologies and Hardware Security
-> Security
Management
-> Network
Security + Cybersecurity Education
-> Embedded
Wearable Security + Covert Communication and Information
Assurance
-> Security
Applications + Cryptology + Biometrics
-> Formal
Methods + Process and Product Line Improvement + Agile
Development +
Workflow Management + Project Management
-> Testing,
Verification, Validation Methods + Security Analysis,
and Software
Quality Issues
-> Software
Engineering and Software Scalability
-> Modeling
Languages, UML + Petri Nets, SOA and Applications +
Portability +
Requirements Engineering and Aspect Oriented
Software
Engineering
-> Software
Architecture and Frameworks + Enterprise Architecture
H. MISC INFORMATION:
To get a feeling
about the conferences' atmosphere, see some
delegates photos
available at:
http://worldcomp.phanfare.com/
http://worldcomp.phanfare.com/6626396 (to see a slide show, click on
"Start
SlideShow" tab at the url above.)
Publication:
Measurable Scientific Impact of Congress:
As of December
14, 2014, papers published in the conference proceedings
that have been
held as part of this congress, have received over
27,914 citations
(includes 3,346 self-citations). Citation data is
obtained from
Microsoft Academic Search. The citation data does not
even include
more than 15,000 other citations to papers in conferences
whose first
offerings were initiated by this congress.
CONTACT:
Inquiries should be sent to: sc@world-comp.org
Friday, May 8, 2015
Call for Late Breaking Papers, Position Papers, Abstracts, Posters: The 2015 International Conference on Security and Management (SAM’15), U.S.A., July 27-30, 2015, Submission Deadline: May 31, 2015
Call for Late Breaking Papers, Position
Papers, Abstracts, Posters:
The 2015 International Conference on
Security and Management (SAM’15), U.S.A., July 27-30, 2015,
Submission Deadline: May 31, 2015
This announcement is ONLY for
those who MISSED the opportunity to submit their papers in response to earlier
"Call for Papers". Therefore, authors who have ALREADY submitted
papers in response to earlier "Call for Papers" should IGNORE this
announcement. (Those who have been notified that their papers have been
accepted, MUST still follow the instructions that were emailed to them;
including meeting the deadlines mentioned in the notifications that were sent
to them).
INVITATION:
You are invited to submit a
"LATE BREAKING PAPER", "POSITION PAPER", or
"ABSTRACT/POSTER PAPER" for consideration. All accepted papers will
be published in printed conference books/proceedings (ISBN) and will also be
made available online. In addition, like prior years, extended versions of
selected papers (about 35%) of the conference will appear in journals and
edited research books (publishers include: Springer, Elsevier, BMC, and
others); some of these books and journal special issues have already received
the top 25% downloads in their respective fields. See the link below for a very
small subset of the books published mostly based on extended versions of the
accepted papers of this congress:
http://www.worldacademyofscience.org/worldcomp15/ws/publications.
The titles of proceedings of the federated congress have been indexed into the
ACM Digital Library ( http://dl.acm.org/ )
which includes bibliographic citations from major publishers in computing.
SAM’15 is part the 2015 World Congress in Computer Science, Computer
Engineering, and Applied Computing. The Congress is composed of a
number of tracks (federated/joint conferences, tutorials, sessions, workshops,
poster and panel discussions); all will be held simultaneously, same location
and dates: July 27-30, 2015. For the complete list of joint conferences, see
below. To get a feeling about the conferences' atmosphere, see some delegates’
photos available at:
SUBMISSION OF LATE BREAKING
PAPERS, POSITION PAPERS, ABSTRACTS/POSTERS:
In response to this
announcement, authors are given the opportunity to submit their papers for
evaluation in one of the following three paper categories:
1.
LATE BREAKING PAPERS: describe
late-breaking/recent developments in
the field. The maximum number of pages is 7. Please write the following
on the first page of your submission "name of conference: LATE BREAKING
PAPER". If accepted, the length of the final/Camera-Ready paper will be
limited to 7 (two-column IEEE style) pages and the author will be given the
opportunity to present the paper in a formal session.
2.
POSITION PAPERS: enable discussions on emerging
topics without the experimentation normally present in an academic paper.
Commonly, such papers will substantiate the opinions or positions put forward
with evidence from an extensive objective discussion of the topic. The maximum
number of pages is 5. Please write the following on the first page of your
submission "name of conference: POSITION PAPER". If accepted, the length of the
final/Camera-Ready paper will be limited to 4 (two-column IEEE style) pages and
the author will be given the opportunity to present the paper in a formal
session.
3.
ABSTRACT/POSTER PAPERS: describe research
roadmaps (similar to PhD plan or PhD prospectus). The maximum number of pages
is 2. Please write the following on the first page of your submission
"name of conference: ABSTRACT/POSTER PAPER". If accepted, The length
of the final/Camera-Ready paper will be limited to 2 (two-column IEEE style)
pages and the author will be given the opportunity to present the paper in a discussion/poster
session.
Important Dates
Submission Deadline: May
31, 2015
Contact Information
Dr.
Kevin Daimi, Conference Chair
Computer
Science and Software Engineering
University
of Detroit Mercy,
Detroit,
MI, 48221-3038, USA
Email: daimikj@udmercy.edu
Subscribe to:
Posts (Atom)