[Om-announce] SYNASC 2017 - Third Call for Papers

2017-05-02 Thread SYNASC 2017
---
Third Call for Papers
--

   SYNASC 2017

  19th International Symposium on
 Symbolic and Numeric Algorithms for Scientific Computing
   September 21-24, 2017, Timisoara, Romania
   http://synasc.ro/2017

   In honor of the anniversaries of
  Stefan Maruster  (80)
  Bruno Buchberger (75)
  Tetsuo Ida (70)
Aim
---

SYNASC aims to stimulate the interaction between the two scientific communities 
of symbolic and numeric computing and to exhibit interesting applications of 
the areas both in theory and in practice. The choice of the topic is motivated 
by the belief of the organizers that the dialogue between the two communities 
is very necessary for accelerating the progress in making the computer a truly 
intelligent aid for mathematicians and engineers.

Important Dates
---
8 May 2017:  Abstract submission
15 May 2017   :  Paper submission
15 July 2017  :  Notification of acceptance
01 September 2017 :  Registration
01 September 2017 :  Revised papers according to the reviews
21-24 September 2017  :  Symposium
30 November 2017  :  Final papers for post-proceedings

Invited Speakers 
  

* Plenary talks

Armin Biere, Johannes Kepler University, Linz, Austria
Bruno Buchberger, Johannes Kepler University, Linz, Austria
Panagiota Fatourou, University of Crete
Tetsuo Ida, University of Tsukuba, Japan
Gheorghe Paun, Romanian Academy, Romania
Klaus-Dieter Schewe, Software Competence Center Hagenberg, Linz, Austria

* Tutorials 

Erika Abraham, RWTH Aachen University, Germany
Wolfgang Windsteiger, Johannes Kepler University, Linz, Austria


Tracks
--

* Symbolic Computation
+ computer algebra
+ symbolic techniques applied to numerics
+ hybrid symbolic and numeric algorithms
+ numerics and symbolics for geometry
+ programming with constraints, narrowing

* Numerical Computing
+ iterative approximation of fixed points
+ solving systems of nonlinear equations
+ numerical and symbolic algorithms for differential equations
+ numerical and symbolic algorithms for optimization
+ parallel algorithms for numerical computing
+ scientific visualization and image processing

* Logic and Programming
+ automatic reasoning
+ formal system verification
+ formal verification and synthesis
+ software quality assessment
+ static analysis
+ timing analysis

* Artificial Intelligence
+ intelligent systems for scientific computing
+ recommender and expert systems for scientific computing
+ scientific knowledge management
+ agent-based complex systems modeling and development
+ uncertain reasoning in scientific computing 
+ computational intelligence
+ soft computing
+ machine learning
+ data mining, text mining and web mining
+ natural language processing
+ computer vision
+ intelligent hybrid systems

* Distributed Computing
+ parallel and distributed algorithms for clouds, GPUs, HPC, P2P 
systems, autonomous systems. Work should focus on scheduling, scaling, load 
balancing, networks, fault-tolerance, gossip algorithms, energy saving
+ applications for parallel and distributed systems, including work on 
cross disciplinary (scientific) applications for grids/clouds, web 
applications, workflow platforms, network measurement tools, programming 
environments
+ architectures for parallel and distributed systems, including 
self-managing and autonomous systems, negotiation protocols, HPC on clouds, GPU 
processing, PaaS for (inter)cloud, brokering platforms, mobile computing
+ modelling of parallel and distributed systems including models on 
resources and networks, semantic representation, negotiation, social networks, 
trace management, simulators
+ any other topic deemed relevant to the field

* Advances in the Theory of Computing
   + Data Structures and algorithms
   + Combinatorial Optimization
   + Formal languages and Combinatorics on Words
   + Graph-theoretic and Combinatorial methods in Computer Science
   + Algorithmic paradigms, including distributed, online,
 approximation, probabilistic, game-theoretic algorithms
   + Computational Complexity Theory, including structural complexity, 
boolean complexity, communication complexity, average-case complexity, 
derandomization and property testing
   + Logical approaches to complexity, including finite model theory
   + Algorithmic and computational learning theory
   + Aspects of computability theory, including computability in
 analysis and algorithmic information theory
   + Proof complexity
   + Computational 

[Om-announce] CFP: Special Issue on "Security and Privacy in Cloud-Assisted Cyber-Physical Systems" in Computer Networks Journal (Elsevier)

2017-05-02 Thread Cristina Alcaraz

*** Apologies for multiple copies ***



C a l l F o r P a p e r s

COMPUTER NETWORKS JOURNAL   -   Elsevier

Special Issue:   Security and Privacy in Cloud-Assisted Cyber-Physical 
Systems




Cloud-assisted Cyber-Physical Systems (CPS) feature a tight coupling 
between embedded computing devices and their physical environment. CPSes 
can be viewed as the bridge between physical components/processes and 
the cyber space. Specifically, the notion of CPSes is to use computing 
(e.g. sensing, analyzing and predicting), communication (e.g. 
interaction, intervene and interface management), and controlling (e.g. 
inter-operation, evolving and evidence-based certification) to make 
intelligent and autonomous systems. Recent years have seen a dramatic 
rise in the development of CPSes services, including ubiquitous health 
care, smart electricity grid, and smart buildings. However, the 
fast-growing data volume is hard to process. The present CPSes cannot 
support ultra-fast computing, and thus it cannot provide real-time and 
reliable services to meet the requirements, which are essential for 
mission-critical systems. Fortunately, cloud infrastructures and 
platforms can provide flexible and on-demand processing power and 
high-capacity storage for data streams, as well as provisioning of a 
variety of services using telecommunication and networking technologies. 
Thus, the large-scale nature of CPSes can be effectively and efficiently 
supported and assisted by cloud systems, which is referred to as 
cloud-assisted CPSes (Cloud-CPS).


The coupling of cloud systems and CPSes, though advantageous, is subject 
to new forms of risks that have not been considered adequately in the 
traditional computing domain. CPSes often collect sensitive and private 
information about the physical environment. A loss of security for a CPS 
can therefore have significant negative impact including loss of 
privacy, potential physical harm, discrimination, and abuse. Though 
numerous security primitives have been developed in the cyber domain to 
address the very same problems, their applicability to the Cloud-CPSes 
domain is still questionable due to the reason that they are usually 
complex to implement and oblivious to cyber-physical interactions.


The goal of this special issue is to unveil and address the security and 
privacy aspects associated to the Cloud-CPeSs.


Suggested topics include, but are not limited to the following.

* Secure data sharing in Cloud-CPSes
* Big data security and privacy in Cloud-CPSes
* Secure computation in Cloud-CPSes
* Location privacy in Cloud-CPSes
* Lightweight block ciphers for low-resource devices in Cloud-CPSes
* Searchable encryption in Cloud-CPSes
* End to end secure communications in Cloud-CPSes
* Access control in Cloud-CPSes
* Key management in Cloud-CPSes

These topics remark the differences between the classical CPSes and 
Cloud-CPSes, and particularly when designing security and privacy 
solutions for specific Cloud-assisted CPSes applied in restricted 
environments with rigorous performance requirements and criticality in 
mind.


-
Important Dates
-
* Submission deadline: June 30, 2017
* Notification of acceptance: August 31, 2017
* Final manuscript due: October 15, 2017

-
Paper Submission Guidelines
-
All submitted papers to this special issue must be well written in 
English, and must be original and not be under review in any other 
journal or conference proceedings. When submitting their papers authors 
must select “Security in Cloud CPS” as the article type.


Submitted papers should be presented according to the journal style. For 
more detailed information regarding the requirements for submission, 
please refer to: 
https://www.elsevier.com/journals/computer-networks/1389-1286/guide-for-authors.


Requests for additional information should be addressed to the guest 
editors.


-
Guest Editors
-
Cristina Alcaraz, University of Malaga, alca...@lcc.uma.es
Xinyi Huang, Fujian Normal University, xyhuan...@gmail.com
Eric Rome, Fraunhofer, erich.r...@iais.fraunhofer.de
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce


[Om-announce] [ICLP 2017] Final Call for Papers

2017-05-02 Thread Tommaso.Urli
Apologies for double-posting.

 DEADLINE FOR ABSTRACT EXTENDED TO April 26  ***
 PAPER SUBMISSION DEADLINE May 2 ***

ICLP 2017 Call for Papers
-

The 33rd International Conference on Logic Programming (ICLP 2017)
will take place in Melbourne, Australia alongside SAT 2017 and CP 2017,
from August 28th to September 1st, 2017 which is the week immediately
following IJCAI 2017.

Full information at http://iclp17.a4lp.org
Call for Papers at http://iclp17.a4lp.org/call_for_papers.html

Conference Scope


Since the first conference held in Marseille in 1982, ICLP has been
the premier international conference for presenting research in logic
programming. Contributions are sought in all areas of logic
programming, including but not restricted to:

 - Theory: Semantic Foundations, Formalisms, Nonmonotonic Reasoning,
   Knowledge Representation.

 - Implementation: Compilation, Virtual Machines, Parallelism,
   Constraint Handling Rules, Tabling.

 - Environments: Program Analysis, Transformation, Validation,
   Verification, Debugging, Profiling, Testing.

 - Language Issues: Concurrency, Objects, Coordination, Mobility,
   Higher Order, Types, Modes, Assertions, Programming Techniques.

 - Related Paradigms: Inductive and Co-inductive Logic Programming,
   Constraint Logic Programming, Answer-Set Programming, SAT-Checking.

 - Applications: Databases, Big Data, Data Integration and Federation,
   Software Engineering, Natural Language Processing, Web and Semantic
   Web, Agents, Artificial Intelligence, Bioinformatics, and
   Education.

In addition to the presentations of accepted papers, the technical
program will include invited talks, advanced tutorials, the doctoral
consortium, and several workshops.


Important Dates
-

- Registration (abstract):  26 April, 2017
- Paper submission:  2 May,   2017
- Notification:  6 June,  2017
- Revision submission (TPLP only):  20 June,  2017
- Final notifications:   4 July,  2017
- Camera-ready copy:18 July, 2017
- Conference:   28 Aug / 1 Sep, 2017


Submission Details
--

All submissions must be made via the EasyChair conference system
(http://www.easychair.org/conferences/?conf=iclp2017). Submissions of
regular papers (RPs) must follow the condensed TPLP format (template
available from ICLP’s web page) and not exceed 14 pages including
bibliography. RPs may be supplemented with appendices for proofs and
details of datasets which do not count towards the page limit and
which will be available as appendices to the published paper. Three
kinds of RPs will be accepted:

 * Technical papers for technically sound, innovative ideas that can
   advance the state of logic programming;

 * Application papers that impact interesting application domains;

 * System and tool papers which emphasize novelty, practicality,
   usability, and availability of the systems and tools described.

Application, system, and tool papers need to be clearly marked in
their title.

All submissions must be written in English and describe original,
previously unpublished research, and must not simultaneously be
submitted for publication elsewhere. These restrictions do not apply
to previously accepted workshop papers with a limited audience and/or
without archival proceedings.

Papers of the highest quality will be selected to be published in the
journal of Theory and Practice of Logic Programming (TPLP), Cambridge
University Press (CUP). In order to ensure the quality of the final
version, papers may be subject to more than one round of refereeing
(within the decision period).

The program committee may recommend some RPs to be published as
Technical Communications (TCs). TCs will be published by Dagstuhl
Publishing in the OpenAccess Series in Informatics (OASIcs). TCs must
follow the OASIcs format (template available from ICLP’s web page) and
not exceed 14 pages excluding the bibliography and a short appendix
(up to 5 more pages). TC’s authors can also elect to convert their
submissions into extended abstracts, of 2 or 3 pages, for inclusion in
the OASIcs proceedings. This should allow authors to submit a long
version elsewhere.

All RPs and TCs will be presented during the conference. Authors of
accepted papers will, by default, be automatically included in the
list of ALP members, who will receive quarterly updates from the Logic
Programming Newsletter at no cost.


Conference Organization
---

General Chairs:
- Maria Garcia de la Banda   Monash University, Australia
- Guido Tack Monash University, Australia

Program Chairs:
- Ricardo Rocha  University of Porto, Portugal
- Tran Cao Son   New Mexico State University, USA

Workshop Chair:
- Enrico PontelliNew Mexico 

[Om-announce] CFP: EAI Mobile Networks and Management, December 15–17, 2017 | Melbourne, Australia

2017-05-02 Thread Shui Yu
 We apology for possible cross posting.

-


The 9th EAI International Conference on Mobile Networks and Management (MNN)

December 15–17, 2017 | Melbourne, Australia



Call for Papers

MNN 2017, the Annual EAI International Conference on Mobile Networks and
Management, is sponsored by the European Alliance for Innovation. It
invites researchers to submit papers addressing issues in the area of
mobile computing, wireless networking and management. Papers reporting
experimental and empirical studies as well as implementation/industry
results (including testbeds and field trials) are also welcome.

Highlights

Proceedings are submitted for inclusion to the leading indexing services:
EI, ISI Thomson's Scientific and Technical Proceedings at Web of Science,
Scopus, CrossRef, Google Scholar, DBLP, as well as EAI's own EU Digital
Library (EUDL).

Authors of outstanding papers will be invited to submit the extended
versions into following journals:

·Journal of Network and Computer Applications (JNCA), Elsevier.
(SCI impact factor  2.33).

·Special issue on Security and Privacy in Mobile Networks, Security
and Communication Networks (SCN), Wiley. (SCI impact factor 0.806).
(Pending approval).

·Other special issues on SCI journals (pending)

Topics

Authors are encouraged to submit full papers to the following topics (but
not limited to):

• Multi-access networks and resource management

• Mobile network management and virtualization

• Future 5G network architecture

• Operation and management of virtualized network functions

• Mechanisms leveraging the interplay between network functions,
virtualization and software defined networking

• Joint management and orchestration of cloud and networking infrastructure

• Future Internet architectures with smart objects

• Opportunistic networks

• Energy efficiency for multi-access networks

• Emerging multimedia services, service enablers and management

• IEEE and 3GPP management standards and enabling technologies

• Design, implementation, and testbed/experimental evaluations

• Service and application management platforms

• Autonomic network monitoring and management

• Architecture and design of new services with smart objects

• Energy-efficient, self-organized access and routing schemes for smart
object

systems

• Security solutions for managed and infrastructureless networks

• Management of wireless cognitive networks

• Traffic models and analysis for future networks

• Big data





Special Session on Trust, Privacy and Security in Internet of Things and
Cloud



Internet of Things (IoT) is becoming pervasive and is a main driver for
smart cities.  Due to the large data generated in the environment of the
IoT, many new research challenges related to trust, privacy and security
are emerging. Although significant research efforts have been made on IoT
and cloud, issues related to the linkage between IoT and Cloud have been
less addressed.  This special session will call for papers dedicated to
Trust, Privacy and Security in IoT and Cloud. Research works on the issues
related to the connection between IoT and Cloud are strongly encouraged.



Paper Submission



We encourage submissions of high-quality technical papers reporting
original research that has not been previously published, and is not
currently submitted for consideration elsewhere. Full Papers should not
exceed 14 pages in the Springer Lecture Notes of ICST (LNICST) format.





LNICST templates are available here: AUTHOR’S KIT



All submitted papers will be peer-reviewed by at least three independent
reviewers, including a TPC member to ensure high quality and relevance to
the topics of the conference. All accepted papers will be published in the
Springer Lecture Notes of LNICST series. The proceedings are submitted for
inclusion to the leading indexing services: DBLP, Google Scholar, Thomson
Scientific ISI Proceedings, EI Elsevier Engineering Index, CrossRef,
Scopus, as well as ICST's own EU Digital Library (EUDL).



*Important Dates*



Submission Deadline (Full Papers): 31 August 2017

Submission Deadline (PhD Forum, Posters / Demos): 31 August 2017

Notification Deadline: 20 October 2017

Camera-Ready Deadline: 28 October 2017



*Honorary Co-Chairs*

·Prof. Albert Zomaya, The University of Sydney, Australia. IEEE
Fellow, EiC of IET Cyber-Physical Systems; Former EiC of IEEE Transactions
on Computers.

·Prof. Mohammed Atiquzzaman, University of Oklahoma, USA. EiC of
Journal of Network and Computer Applications; EiC of the Vehicular
Communications.

·Prof. Hsiao-Hua Chen, National Cheng Kung University, Tainan. IEEE
Fellow, EiC of Security and Communication Networks

·Prof. Ernesto Damiani, Chair of the Information Security Group and
Program, Khalifa University, UAE.



*General Chair*



Prof. Jiankun Hu, UNSW, Australia. Email: j...@adfa.edu.au



*TPC Co-Chairs*



Prof. Zahir Tari, RMIT University, Australia. Email: 

[Om-announce] CFP: CSS 2017, Xi'an, China, October 23-25, 2017

2017-05-02 Thread Conference Contact
CSS 2017 CFP



The CSS-2017 symposium is the 9th International Symposium on Cyberspace
Safety and Security. It provides a leading edge forum to foster interaction
between researchers and developers with the cyberspace safety and security
communities, and to give attendees an opportunity to network with experts
in this area. It focusses on Cyberspace Safety and Security, such as
authentication, access control, availability, integrity, privacy,
confidentiality, dependability and sustainability issues of cyberspace.



*Venue & Time*: Xi’an China, October 23-25, 2017

*Important Dates*: May 27, 2017 (Paper Submission Due), August 15, 2017
(Acceptance Notification)



*Tracks*


· Track 1: Privacy Preserving

· Track 2: Intrusion Detection and Forensics

· Track 3: Cyber Physical System Security

· Track 4: Big Data Security

· Track 5: Mobile Security


*Special issues*


Future Generation Computer Science (SCI, IF=2.786)

Concurrency and Computation: Practice and Experience (SCI, IF=0.94)

Cluster Computing (SCI, IF=1.514)


*Scope*


We invite submissions from academia, government, and industry presenting
novel research on all theoretical and practical aspects of computer and
network security. Areas of interest for CSS 2017 include, but are not
limited to:



Web security [Track 1,2,4]

Database security [Track 4]

Adversary machine learning [Track 4]

Data mining security [Track 4]

Watermarking [Track 2]

Security in social networks [Track 1,2,4]

Access control [Track 2,3,5]

Cyber physical security [Track 3]

Trust computing [Track 2,3,5]

Digital forensics [Track 2]

Intrusion detection [Track 2]

Malware and botnet [Track 2]

Vulnerability and risk assessment [Track 2,3,5]

Denial-of-Service attacks [Track 2,3]

Anonymous communication [Track 2]

Security in wireless communication [Track 2,5]

Security in mobile devices [Track 5]

Privacy preserving [Track 1]

Attacks to privacy [Track 1]

Cloud computing security [Track 1,2,4]

Operation system security [Track 2,5]

Software security [Track 2,5]

Security architecture [Track 2,3]



*Instructions for authors*



The accepted papers from this conference will be submitted for publication
in IEEE Xplore as well as other Abstracting and Indexing (A) databases
(EI Compendex). Distinguished papers, after further revisions, will be
considered for possible publication in several SCI & EI indexed special
issues of prestigious international journals. By submitting a paper to the
conference, authors assure  that if the paper is accepted, at least one
author will attend the conference and present the paper. Papers should be
written in English conforming to the IEEE conference proceedings format
(8.5" x 11", Two-Column). Papers should be submitted through the paper
submission system at the conference website. Full Papers (up to 8 pages, or
12 pages with the over length charge) and Short Papers (up to 4 pages) are
solicited.
___
Om-announce mailing list
Om-announce@openmath.org
http://openmath.org/mailman/listinfo/om-announce