From raoul.strackx at CS.KULEUVEN.BE Tue Sep 2 11:25:18 2014 From: raoul.strackx at CS.KULEUVEN.BE (Raoul Strackx) Date: Tue, 02 Sep 2014 11:25:18 +0200 Subject: [fg-arc] [ESSoS] Final Call for Papers Message-ID: <54058CFE.7060106@cs.kuleuven.be> === Call for Papers === Conference: International Symposium on Engineering Secure Software and Systems (ESSoS) Date: March 4 - 6, 2015 Venue: Milan, Italy Website: https://distrinet.cs.kuleuven.be/events/essos/2015/ Deadlines: Abstract submission (September 8, 2014) Paper submission (September 15, 2014) In cooperation with: (pending) ACM SIGSAC and SIGSOFT and IEEE CS (TCSP). == Context and motivation == Trustworthy, secure software is a core ingredient of the modern world. So is the Internet. Hostile, networked environments, like the Internet, can allow vulnerabilities in software to be exploited from anywhere. To address this, high-quality security building blocks (e.g., cryptographic components) are necessary, but insufficient. Indeed, the construction of secure software is challenging because of the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies and the progress of attack vectors. Clearly, a strong need exists for engineering techniques that scale well and that demonstrably improve the software's security properties. == Goal and setup == The goal of this symposium, which will be the sixth in the series, is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering. Being one of the few conference-level events dedicated to this topic, it explicitly aims to bridge the software engineering and security engineering communities, and promote cross-fertilization. The symposium will feature two days of technical program. In addition to academic papers, the symposium encourages submission of high-quality, informative industrial experience papers about successes and failures in security software engineering and the lessons learned. Furthermore, the symposium also accepts short idea papers that crisply describe a promising direction, approach, or insight. == Topics == Paper submissions are solicited in all areas relating to secure software and secure systems research, including but not limited to: - Cloud security, virtualization for security - Mobile devices security - Automated techniques for vulnerability discovery and analysis - Model checking for security - Binary code analysis, reverse-engineering - Programming paradigms, models, and domain-specific languages for security - Operating system security - Verification techniques for security properties - Malware: detection, analysis, mitigation - Security in critical infrastructures - Security economics - Security by design - Static and dynamic code analysis for security - Web applications security - Program rewriting techniques for security - Security measurements - Empirical secure software engineering - Security-oriented software reconfiguration and evolution - Computer forensics - Processes for the development of secure software and systems - Human-computer interaction for security - Security testing - Embedded software security == Important dates == Abstract submission: September 8, 2014 Paper submission: September 15, 2014 Demo submission: October 24, 2014 Author notification: November 17, 2014 Camera-ready: December 7, 2014 == Submission and format == The proceedings of the symposium are published by Springer-Verlag in the Lecture Notes in Computer Science Series (http://www.springer.com/lncs). Submissions should follow the formatting instructions of Springer LNCS. Submitted papers must present original, non-published work of high quality. For selected papers, there will be an invitation to submit extended versions to a special issue in the International Journal of Information Security. Two types of papers will be accepted: Full papers (max 14 pages without bibliography/appendices) - May describe original technical research with a solid foundation, such as formal analysis or experimental results, with acceptance determined mostly based on novelty and validation. Or, may describe case studies applying existing techniques or analysis methods in industrial settings, with acceptance determined mostly by the general applicability of techniques and the completeness of the technical presentation details. Idea papers (max 8 pages with bibliography) - May crisply describe a novel idea that is both feasible and interesting, where the idea may range from a variant of an existing technique all the way to a vision for the future of security technology. Idea papers allow authors to introduce ideas to the field and get feedback, while allowing for later publication of complete, fully-developed results. Submissions will be judged primarily on novelty, excitement, and exposition, but feasibility is required, and acceptance will be unlikely without some basic, principled validation (e.g., extrapolation from limited experiments or simple formal analysis). In the proceedings, idea papers will clearly identified by means of the "Idea" tag in the title. == Demo Session Submission == This year we are planning to include a demonstration session in the symposium. If you are working on practical solutions to industrial-relevant problems in key areas of ESSOS, consider disseminating about your experience at our demonstration session. To be considered for presentation, a proposal describing the demonstration should be mailed to the Industry Chair, Luca Compagna (luca.compagna at sap.com). The following type of submission will be accepted: Demo presentation (short description, max 4 pages, not published in proceedings) - May shortly describe (i) the overall problem, (ii) the architecture underlying the system demonstrated, and (iii) one or more use case scenarios that present how the audience will gain an understanding of the underlying technology. Submissions will be evaluated based on the motivation of the work behind the use of the system to be demonstrated and its novelty. Demo presentations will not be included in the formal proceeding of ESSOS. == Steering committee == Jorge Cuellar (Siemens AG) Wouter Joosen (Katholieke Universiteit Leuven) - chair Fabio Massacci (Universit? di Trento) Gary McGraw (Cigital) Bashar Nuseibeh (The Open University) Daniel Wallach (Rice University University) == Organizing committee == General chair: Stefano Zanero (Politecnico di Milano, IT) Program co-chairs: Frank Piessens (Katholieke Universiteit Leuven, BE); Juan Caballero (IMDEA Software Institute, ES) Doctoral Symposium co-chairs: Haris Mouratidis (University of Brighton , UK); Federico Maggi (Politecnico di Milano, IT); Christos Kalloniatis (University of the Aegean, Greece) Publication chair: Nataliia Bielova (INRIA Sophia Antipolis-M?diterran?e, FR) Industry chair: Luca Compagna (SAP Product Security Research, FR) Publicity chair: Raoul Strackx (Katholieke Universiteit Leuven, BE) Local arrangements chair: TBA Web chair: Ghita Saevels (Katholieke Universiteit Leuven, BE) == Program committee == Aslan Askarov, Harvard University, US Leyla Bilge, Symantec Research Labs, FR Stefano Calzavara, Universit? Ca' Foscari Venezia, IT Lorenzo Cavallaro, Royal Holloway, University of London, UK Bruno Crispo, University of Trento, IT Werner Dietl, University of Waterloo, CA Michael Franz, University of California, Irvine, US Christian Hammer, Saarland University, DE Marieke Huisman, University of Twente, NL Somesh Jha, University of Wisconsin, US Martin Johns, SAP Research, DE Christian Kreibich, Lastline, US Wenke Lee, Georgia Institute of Technology, US Zhenkai Liang, National University of Singapore, SG Jay Ligatti, University of South Florida, US Nick Nikiforakis, Stony Brook University, US Georgios Portokalidis, Stevens Institute of Technology, US Joachim Posegga, University of Passau, DE Alexander Pretschner, Technische Universit?t M?nchen, DE Tamara Rezk, INRIA, FR Konrad Rieck, University of G?ttingen, DE Andrei Sabelfeld, Chalmers University of Technology, SE Ahmad-Reza Sadeghi, TU Darmstadt, DE Kapil Singh, IBM Research, US Asia Slowinska, Vrije Universiteit Amsterdam, NL Pierre-Yves Strub, IMDEA Software Institute, ES Carmela Troncoso, Gradiant, ES Xiaofeng Wang, Indiana University, US Mohammad Zulkernine, Queen's University, CA Disclaimer: http://www.kuleuven.be/cwis/email_disclaimer.htm From raoul.strackx at CS.KULEUVEN.BE Tue Sep 2 11:22:19 2014 From: raoul.strackx at CS.KULEUVEN.BE (Raoul Strackx) Date: Tue, 2 Sep 2014 11:22:19 +0200 Subject: [fg-arc] [ESSOS] Final Call for Papers Message-ID: <54058C4B.2050202@cs.kuleuven.be> === Call for Papers === Conference: International Symposium on Engineering Secure Software and Systems (ESSoS) Date: March 4 - 6, 2015 Venue: Milan, Italy Website: https://distrinet.cs.kuleuven.be/events/essos/2015/ Deadlines: Abstract submission (September 8, 2014) Paper submission (September 15, 2014) In cooperation with: (pending) ACM SIGSAC and SIGSOFT and IEEE CS (TCSP). == Context and motivation == Trustworthy, secure software is a core ingredient of the modern world. So is the Internet. Hostile, networked environments, like the Internet, can allow vulnerabilities in software to be exploited from anywhere. To address this, high-quality security building blocks (e.g., cryptographic components) are necessary, but insufficient. Indeed, the construction of secure software is challenging because of the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies and the progress of attack vectors. Clearly, a strong need exists for engineering techniques that scale well and that demonstrably improve the software's security properties. == Goal and setup == The goal of this symposium, which will be the sixth in the series, is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering. Being one of the few conference-level events dedicated to this topic, it explicitly aims to bridge the software engineering and security engineering communities, and promote cross-fertilization. The symposium will feature two days of technical program. In addition to academic papers, the symposium encourages submission of high-quality, informative industrial experience papers about successes and failures in security software engineering and the lessons learned. Furthermore, the symposium also accepts short idea papers that crisply describe a promising direction, approach, or insight. == Topics == Paper submissions are solicited in all areas relating to secure software and secure systems research, including but not limited to: - Cloud security, virtualization for security - Mobile devices security - Automated techniques for vulnerability discovery and analysis - Model checking for security - Binary code analysis, reverse-engineering - Programming paradigms, models, and domain-specific languages for security - Operating system security - Verification techniques for security properties - Malware: detection, analysis, mitigation - Security in critical infrastructures - Security economics - Security by design - Static and dynamic code analysis for security - Web applications security - Program rewriting techniques for security - Security measurements - Empirical secure software engineering - Security-oriented software reconfiguration and evolution - Computer forensics - Processes for the development of secure software and systems - Human-computer interaction for security - Security testing - Embedded software security == Important dates == Abstract submission: September 8, 2014 Paper submission: September 15, 2014 Demo submission: October 24, 2014 Author notification: November 17, 2014 Camera-ready: December 7, 2014 == Submission and format == The proceedings of the symposium are published by Springer-Verlag in the Lecture Notes in Computer Science Series (http://www.springer.com/lncs). Submissions should follow the formatting instructions of Springer LNCS. Submitted papers must present original, non-published work of high quality. For selected papers, there will be an invitation to submit extended versions to a special issue in the International Journal of Information Security. Two types of papers will be accepted: Full papers (max 14 pages without bibliography/appendices) - May describe original technical research with a solid foundation, such as formal analysis or experimental results, with acceptance determined mostly based on novelty and validation. Or, may describe case studies applying existing techniques or analysis methods in industrial settings, with acceptance determined mostly by the general applicability of techniques and the completeness of the technical presentation details. Idea papers (max 8 pages with bibliography) - May crisply describe a novel idea that is both feasible and interesting, where the idea may range from a variant of an existing technique all the way to a vision for the future of security technology. Idea papers allow authors to introduce ideas to the field and get feedback, while allowing for later publication of complete, fully-developed results. Submissions will be judged primarily on novelty, excitement, and exposition, but feasibility is required, and acceptance will be unlikely without some basic, principled validation (e.g., extrapolation from limited experiments or simple formal analysis). In the proceedings, idea papers will clearly identified by means of the "Idea" tag in the title. == Demo Session Submission == This year we are planning to include a demonstration session in the symposium. If you are working on practical solutions to industrial-relevant problems in key areas of ESSOS, consider disseminating about your experience at our demonstration session. To be considered for presentation, a proposal describing the demonstration should be mailed to the Industry Chair, Luca Compagna (luca.compagna at sap.com). The following type of submission will be accepted: Demo presentation (short description, max 4 pages, not published in proceedings) - May shortly describe (i) the overall problem, (ii) the architecture underlying the system demonstrated, and (iii) one or more use case scenarios that present how the audience will gain an understanding of the underlying technology. Submissions will be evaluated based on the motivation of the work behind the use of the system to be demonstrated and its novelty. Demo presentations will not be included in the formal proceeding of ESSOS. == Steering committee == Jorge Cuellar (Siemens AG) Wouter Joosen (Katholieke Universiteit Leuven) - chair Fabio Massacci (Universit? di Trento) Gary McGraw (Cigital) Bashar Nuseibeh (The Open University) Daniel Wallach (Rice University University) == Organizing committee == General chair: Stefano Zanero (Politecnico di Milano, IT) Program co-chairs: Frank Piessens (Katholieke Universiteit Leuven, BE); Juan Caballero (IMDEA Software Institute, ES) Doctoral Symposium co-chairs: Haris Mouratidis (University of Brighton , UK); Federico Maggi (Politecnico di Milano, IT); Christos Kalloniatis (University of the Aegean, Greece) Publication chair: Nataliia Bielova (INRIA Sophia Antipolis-M?diterran?e, FR) Industry chair: Luca Compagna (SAP Product Security Research, FR) Publicity chair: Raoul Strackx (Katholieke Universiteit Leuven, BE) Local arrangements chair: TBA Web chair: Ghita Saevels (Katholieke Universiteit Leuven, BE) == Program committee == Aslan Askarov, Harvard University, US Leyla Bilge, Symantec Research Labs, FR Stefano Calzavara, Universit? Ca' Foscari Venezia, IT Lorenzo Cavallaro, Royal Holloway, University of London, UK Bruno Crispo, University of Trento, IT Werner Dietl, University of Waterloo, CA Michael Franz, University of California, Irvine, US Christian Hammer, Saarland University, DE Marieke Huisman, University of Twente, NL Somesh Jha, University of Wisconsin, US Martin Johns, SAP Research, DE Christian Kreibich, Lastline, US Wenke Lee, Georgia Institute of Technology, US Zhenkai Liang, National University of Singapore, SG Jay Ligatti, University of South Florida, US Nick Nikiforakis, Stony Brook University, US Georgios Portokalidis, Stevens Institute of Technology, US Joachim Posegga, University of Passau, DE Alexander Pretschner, Technische Universit?t M?nchen, DE Tamara Rezk, INRIA, FR Konrad Rieck, University of G?ttingen, DE Andrei Sabelfeld, Chalmers University of Technology, SE Ahmad-Reza Sadeghi, TU Darmstadt, DE Kapil Singh, IBM Research, US Asia Slowinska, Vrije Universiteit Amsterdam, NL Pierre-Yves Strub, IMDEA Software Institute, ES Carmela Troncoso, Gradiant, ES Xiaofeng Wang, Indiana University, US Mohammad Zulkernine, Queen's University, CA From aali at ltu.edu Tue Sep 2 20:44:34 2014 From: aali at ltu.edu (Ahad Ali) Date: Tue, 02 Sep 2014 14:44:34 -0400 Subject: [fg-arc] IEOM 2015 Dubai - Submission Deadline Extended to September 15th, 2014 Message-ID: Dear Colleagues: Due to numerous requests, the submission deadline of IEOM 2015 Dubai Conference is extended to September 15, 2014. The event is sponsored by ASQ, IEEE and INFORMS. Emirates Airlines is the Official Airline Partner. The following categories of submission are accepted: Technical Full Paper and/or Abstract Only - Scientific and applied research work can be submitted and presented at the IEOM Dubai conference in the breaded area of IE and OM. All full papers are subject to peer review. Accepted papers will be published in IEEE Xplore and indexed. Research can be presented independently with an abstract. Please submit online: www.xcdsystem.com/ieom2015/. Global Engineering Education - Provide a global view of the opportunities and challenges that are currently available in all aspects of engineering education. One of the main aspects is how to reduce readiness gap around the world for engineering graduates. If you are interested, please send your bio, photo and a summary to conference at iieom.org. Industry Solutions - Provide a review and analysis of a specific industry and the role that the engineering profession can play in addressing the issues and the solution facing a broad spectrum of industry in today's society. If you are interested, please send your bio, photo and a summary to conference at iieom.org. Operations Excellence - Examine the process and operational issues facing both manufacturing and non-manufacturing sectors of the international marketplace. Develop possible to approaches to increase the operational efficiency and productivity. If you are interested, please contact Mr. Paris (ParisJF at xonitek.com). Poster Sessions - Create a poster to communicate how a specific problem was addressed using graphics and a short narrative. All poster presentations are to be reviewed by IEOM members at the event for IEOM Members Choice Awards. Three awards will be given for the first, second and third places. Please submit online: www.xcdsystem.com/ieom2015/. Capstone Student Poster Competitions - Recognizes engineering students who may have an interest in submitting poster based on innovative subject from a capstone project. Please submit to Dr. Shamsuzzaman (mshamsuzzaman at sharjah.ac.ae). Student Paper Competition - Recognizes students who have demonstrated a strong interest in a publishing a paper on a project that may include research that addressed and solved an industrial engineering or operations management problem. Please submit to Dr. Shamsuzzoha (ahm.shamsuzzoha at uwasa.fi). Keynote Speakers . Dr. G. Don Taylor, Charles O. Gordon Professor and Department Head, Grad Department of Industrial and Systems Engineering, Virginia Tech, Blacksburg, VA, USA and Past IIE President (Opening Keynote) . Chris Smith; Vice President & Managing Director of Boeing Saudi Arabia . Dr. Chris Backhouse, Professor of Product Innovation, School of Mechanical and Manufacturing Engineering, Loughborough University, Leicestershire, UK . Dr. Leland Blank, Professor and Dean of Engineering, American University of Sharjah, UAE and Past IIE President Global Engineering Education Panel Session Speakers . Dr. Funso Falade, President, African Engineering Education Association . Dr. Hans-Juergen Hoyer, Secretary General of the International Federation for Engineering Education Societies (IFEES) . Dr. Abu Masud, Interim Dean of Graduate School and Boeing Global Engineering Professor at Wichita State University and . Dr. Hamid Parsaei, Professor of Industrial and Systems Engineering at Texas A&M University (College Station) and Associate Dean for Academic Affairs at Texas A&M University Qatar Please follow IEEE format for full paper submission. All full papers will be published in the IEEE Xplore and indexed. Your participation is highly appreciated. Let us know if you have any question. Thanks Ahad Ali On behalf of the IEOM 2015 Committee IEOM Society www.iieom.org -------------- next part -------------- An HTML attachment was scrubbed... URL: From grlmc at urv.cat Sun Sep 7 11:10:37 2014 From: grlmc at urv.cat (GRLMC) Date: Sun, 7 Sep 2014 11:10:37 +0200 Subject: [fg-arc] BigDat 2015: registration deadline 23 September Message-ID: <7F397D87BAAB40FC8E6AE5F1A85C5E01@Carlos1> *To be removed from our mailing list, please respond to this message with UNSUBSCRIBE in the subject line* ***************************************************** INTERNATIONAL WINTER SCHOOL ON BIG DATA BigDat 2015 Tarragona, Spain January 26-30, 2015 Organized by Rovira i Virgili University http://grammars.grlmc.com/bigdat2015/ ***************************************************** --- 4th registration deadline: September 23, 2014 --- ***************************************************** AIM: BigDat 2015 is a research training event for graduates and postgraduates in the first steps of their academic career. It aims at updating them about the most recent developments in the fast developing area of big data, which covers a large spectrum of current exciting research, development and innovation with an extraordinary potential for a huge impact on scientific discoveries, medicine, engineering, business models, and society itself. Renowned academics and industry pioneers will lecture and share their views with the audience. All big data subareas will be displayed, namely: foundations, infrastructure, management, search and mining, security and privacy, and applications. Main challenges of analytics, management and storage of big data will be identified through 4 keynote lectures and 24 six-hour courses, which will tackle the most lively and promising topics. The organizers believe outstanding speakers will attract the brightest and most motivated students. Interaction will be a main component of the event. ADDRESSED TO: Graduate and postgraduates from around the world. There are no formal pre-requisites in terms of academic degrees. However, since there will be differences in the course levels, specific knowledge background may be required for some of them. BigDat 2015 is also appropriate for more senior people who want to keep themselves updated on recent developments and future trends. They will surely find it fruitful to listen and discuss with major researchers, industry leaders and innovators. REGIME: In addition to keynotes, 3 courses will run in parallel during the whole event. Participants will be able to freely choose the courses they will be willing to attend as well as to move from one to another. VENUE: BigDat 2015 will take place in Tarragona, located 90 kms. to the south of Barcelona. The venue will be: Campus Catalunya Universitat Rovira i Virgili Av. Catalunya, 35 43002 Tarragona KEYNOTE SPEAKERS: Ian Foster (Argonne National Laboratory), tba Geoffrey C. Fox (Indiana University, Bloomington), Mapping Big Data Applications to Clouds and HPC C. Lee Giles (Pennsylvania State University, University Park), Scholarly Big Data: Information Extraction and Data Mining William D. Gropp (University of Illinois, Urbana-Champaign), tba COURSES AND PROFESSORS: Hendrik Blockeel (KU Leuven), [intermediate] Decision Trees for Big Data Analytics Diego Calvanese (Free University of Bozen-Bolzano), [introductory/intermediate] End-User Access to Big Data Using Ontologies Jiannong Cao (Hong Kong Polytechnic University), [introductory/intermediate] Programming with Big Data Edward Y. Chang (HTC Corporation, New Taipei City), [introductory/advanced] >From Design of Distributed and Online Algorithms to Hands-on Code Lab Practice on Real Datasets Ernesto Damiani (University of Milan), [introductory/intermediate] Process Discovery and Predictive Decision Making from Big Data Sets and Streams Gautam Das (University of Texas, Arlington), [intermediate/advanced] Mining Deep Web Repositories Maarten de Rijke (University of Amsterdam), tba Geoffrey C. Fox (Indiana University, Bloomington), [intermediate] Using Software Defined Systems to Address Big Data Problems Minos Garofalakis (Technical University of Crete, Chania) [intermediate/advanced], Querying Continuous Data Streams Vasant G. Honavar (Pennsylvania State University, University Park) [introductory/intermediate], Learning Predictive Models from Big Data Mounia Lalmas (Yahoo! Research Labs, London), [introductory] Measuring User Engagement Tao Li (Florida International University, Miami), [introductory/intermediate] Data Mining Techniques to Understand Textual Data Kwan-Liu Ma (University of California, Davis), [intermediate] Big Data Visualization Christoph Meinel (Hasso Plattner Institute, Potsdam), [introductory/intermediate] New Computing Power by In-Memory and Multicore to Tackle Big Data David Padua (University of Illinois, Urbana-Champaign), [intermediate] Data Parallel Programming Manish Parashar (Rutgers University, Piscataway), [intermediate] Big Data in Simulation-based Science Srinivasan Parthasarathy (Ohio State University, Columbus), [intermediate] Scalable Data Analysis Evaggelia Pitoura (University of Ioannina), [intermediate] Online Social Networks Vijay V. Raghavan (University of Louisiana, Lafayette), [introductory/intermediate] Visual Analytics of Time-evolving Large-scale Graphs Pierangela Samarati (University of Milan), [intermediate], Data Security and Privacy in the Cloud Peter Sanders (Karlsruhe Institute of Technology), [introductory/intermediate] Algorithm Engineering for Large Data Sets Johan Suykens (KU Leuven), [introductory/intermediate] Fixed-size Kernel Models for Big Data Domenico Talia (University of Calabria, Rende), [intermediate] Scalable Data Mining on Parallel, Distributed and Cloud Computing Systems Jieping Ye (Arizona State University, Tempe), [introductory/advanced] Large-Scale Sparse Learning and Low Rank Modeling ORGANIZING COMMITTEE: Adrian Horia Dediu (Tarragona) Carlos Mart?n-Vide (Tarragona, chair) Florentina Lilica Voicu (Tarragona) REGISTRATION: It has to be done at http://grammars.grlmc.com/bigdat2015/registration.php The selection of up to 8 courses requested in the registration template is only tentative and non-binding. For the sake of organization, it will be helpful to have an approximation of the respective demand for each course. Since the capacity of the venue is limited, registration requests will be processed on a first come first served basis. The registration period will be closed and the on-line registration facility disabled when the capacity of the venue will be complete. It is much recommended to register prior to the event. FEES: As far as possible, participants are expected to stay full-time. Fees are a flat rate covering the attendance to all courses during the week. There are several early registration deadlines. Fees depend on the registration deadline. ACCOMMODATION: Suggestions of accommodation will be provided in due time. CERTIFICATE: Participants will be delivered a certificate of attendance. QUESTIONS AND FURTHER INFORMATION: florentinalilica.voicu at urv.cat POSTAL ADDRESS: BigDat 2015 Lilica Voicu Rovira i Virgili University Av. Catalunya, 35 43002 Tarragona, Spain Phone: +34 977 559 543 Fax: +34 977 558 386 ACKNOWLEDGEMENTS: Universitat Rovira i Virgili --- Este mensaje no contiene virus ni malware porque la protecci?n de avast! Antivirus est? activa. http://www.avast.com From uwe at ims.uni-stuttgart.de Mon Sep 8 12:54:00 2014 From: uwe at ims.uni-stuttgart.de (Uwe Reyle) Date: Mon, 8 Sep 2014 12:54:00 +0200 Subject: [fg-arc] INFORMATIK 2014 Message-ID: *** Standard registration fee payable by September 21, 2014 *** INFORMATIK 2014 44. Annual Meeting of the German Informatics Society (GI) September 22-24, 2014, Stuttgart As you know the conference will take place in two weeks and we are looking forward to welcoming you to Stuttgart. There will be more than 300 talks, proceedings with over 2600 pages and at least 1000 colleagues to discuss with. Please register now on www.informatik2014.de As a number of events have restricted availability registration in advance is advised and would assist our scheduling. Information about the programme is available at the above-mentioned web page. -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Informatik_2014_engl.pdf Type: application/pdf Size: 92113 bytes Desc: not available URL: From Gwen.Salaun at inria.fr Mon Sep 8 14:46:46 2014 From: Gwen.Salaun at inria.fr (Gwen.Salaun at inria.fr) Date: Mon, 8 Sep 2014 14:46:46 +0200 (CEST) Subject: [fg-arc] ACM SAC 2015: Software Verification and Testing Track - Extended Deadline Message-ID: <201409081246.s88CkkLr029378@ubac.inrialpes.fr> ================================================== 30th Annual ACM Symposium on Applied Computing Software Verification and Testing Track April 13 - 17, 2015, Salamanca, Spain More information: http://fmt.cs.utwente.nl/conferences/sac-svt2015/ and http://www.acm.org/conferences/sac/sac2015/ =================================================== Important dates --------------- * September 26, 2014: Submission of regular papers -- EXTENDED * November 17, 2014: Notification of paper acceptance/rejection * December 8, 2014: Camera-ready copies of accepted papers ACM Symposium on Applied Computing ---------------------------------- The ACM Symposium on Applied Computing (SAC) has gathered scientists from different areas of computing over the past twenty-nine years. The forum represents an opportunity to interact with different communities sharing an interest in applied computing. SAC 2015 is sponsored by SIGAPP and will be held at the UNESCO world heritage city of Salamanca in Spain. Software Verification and Testing Track --------------------------------------- We invite authors to submit new results in formal verification and testing, as well as development of technologies to improve the usability of formal methods in software engineering. Also welcome are detailed descriptions of applications of mechanical verification to large scale software. Possible topics include, but are not limited to: - model checking - theorem proving - correct by construction development - model-based testing - verification-based testing - symbolic execution - static and run-time analysis - abstract interpretation - analysis methods for dependable systems - software certification and proof carrying code - fault diagnosis and debugging - verification of large scale software systems - real world applications and case studies applying software verification Submissions Guidelines ---------------------- Paper submissions must be original, unpublished work. Submissions should be in electronic format, via the START site: http://www.acm.org/conferences/sac/sac2015/Paper-SubmissionUploadPage.htm Author(s) name(s) and address(es) must not appear in the body of the paper, and self-reference should be avoided and made in the third person. Submitted paper will undergo a blind review process. Authors of accepted papers should submit an editorial revision of their papers that fits within six two-column pages (an extra two pages, to a total of eight pages, may be available at a charge). Please comply to this page limitation already at submission time. Accepted papers will be published in the ACM SAC 2015 proceedings. Paper registration is required, allowing the inclusion of the paper/poster in the conference proceedings. An author or a proxy attending SAC MUST present the paper. This is a requirement for the paper/poster to be included in the ACM/IEEE digital library. No-show of scheduled papers and posters will result in excluding them from the ACM/IEEE digital library. A special issue of Science of Computer Programming has been confirmed. Selected papers will be invited for submission, and will be peer-reviewed according to the standard policy of Science of Computer Programming. Student Research Competition ---------------------------- As before, SAC 2015 organises a Student Research Competition (SRC) Program to provide graduate students the opportunity to meet and exchange ideas with researchers and practitioners in their areas of interest. Guidelines and information about the SRC program can be found at http://www.acm.org/conferences/sac/sac2015/. Submission to the SRC program should be in electronic form via the following website http://www.acm.org/conferences/sac/sac2015/SRC-SubmissionUploadPage.htm Program Committee ----------------- Laura Brandan Briones, National University of Cordoba, Argentina Maximiliano Cristi?, Universidad Nacional de Rosario, Argentina Marco Faella, University of Naples, Italy Ylies Falcone, University of Grenoble Alpes, France Tingting Han, University of London, UK Fabrice Kordon, University Pierre et Marie Curie, France Stefan Leue, University of Konstanz, Germany Shaoying Liu, Hosei University, Japan Malte Lochau, Darmstadt University, Germany Annabelle McIver, Macquarie University, Australia Mercedes Merayo, Universidad Complutense de Madrid, Spain Dominique Mery, University of Lorraine, France Mohammad Mousavi, Halmstad University, Sweden Brian Nielsen, Aalborg University, Denmark Jun Pang, University of Luxembourg, Luxembourg Corina Pasareanu, NASA Ames, USA Wishnu Prasetya, Utrecht University, The Netherlands Marjan Sirjani, Reykjavik University, Iceland Hasan S?zer, ?zyegin University, Turkey Tanja Vos, Valencia University, Spain Anton Wijs, Eindhoven University of Technology, The Netherlands Liu Yang, Nanyang Technological University, Singapore Gianluigi Zavattaro, University of Bologna, Italy Lijun Zhang, Chinese Academy of Sciences, China Program Committee Chairs ----------------- Gwen Sala?n, University of Grenoble Alpes, France Marielle Stoelinga, University of Twente, Netherlands From raoul.strackx at cs.kuleuven.be Tue Sep 9 13:43:39 2014 From: raoul.strackx at cs.kuleuven.be (Raoul Strackx) Date: Tue, 09 Sep 2014 13:43:39 +0200 Subject: [fg-arc] [ESSoS] Call for Papers (update) Message-ID: <540EE7EB.2090808@cs.kuleuven.be> === Call for Papers === Update: The paper submission deadline (Sep 15) for ESSOS 2015 will *not* be extended, but due to some requests, paper submissions for which no abstract has been received yet, are still allowed. Authors are encouraged to submit an abstract as soon as possible, but a paper can be submitted until the paper submission deadline even if no abstract was submitted first. Conference: International Symposium on Engineering Secure Software and Systems (ESSoS) Date: March 4 - 6, 2015 Venue: Milan, Italy Website: https://distrinet.cs.kuleuven.be/events/essos/2015/ Deadlines: Paper submission (September 15, 2014) In cooperation with: (pending) ACM SIGSAC and SIGSOFT and IEEE CS (TCSP). == Context and motivation == Trustworthy, secure software is a core ingredient of the modern world. So is the Internet. Hostile, networked environments, like the Internet, can allow vulnerabilities in software to be exploited from anywhere. To address this, high-quality security building blocks (e.g., cryptographic components) are necessary, but insufficient. Indeed, the construction of secure software is challenging because of the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies and the progress of attack vectors. Clearly, a strong need exists for engineering techniques that scale well and that demonstrably improve the software's security properties. == Goal and setup == The goal of this symposium, which will be the sixth in the series, is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering. Being one of the few conference-level events dedicated to this topic, it explicitly aims to bridge the software engineering and security engineering communities, and promote cross-fertilization. The symposium will feature two days of technical program. In addition to academic papers, the symposium encourages submission of high-quality, informative industrial experience papers about successes and failures in security software engineering and the lessons learned. Furthermore, the symposium also accepts short idea papers that crisply describe a promising direction, approach, or insight. == Topics == Paper submissions are solicited in all areas relating to secure software and secure systems research, including but not limited to: - Cloud security, virtualization for security - Mobile devices security - Automated techniques for vulnerability discovery and analysis - Model checking for security - Binary code analysis, reverse-engineering - Programming paradigms, models, and domain-specific languages for security - Operating system security - Verification techniques for security properties - Malware: detection, analysis, mitigation - Security in critical infrastructures - Security economics - Security by design - Static and dynamic code analysis for security - Web applications security - Program rewriting techniques for security - Security measurements - Empirical secure software engineering - Security-oriented software reconfiguration and evolution - Computer forensics - Processes for the development of secure software and systems - Human-computer interaction for security - Security testing - Embedded software security == Important dates == Abstract submission: September 8, 2014 (Not longer required) Paper submission: September 15, 2014 Demo submission: October 24, 2014 Author notification: November 17, 2014 Camera-ready: December 7, 2014 == Submission and format == The proceedings of the symposium are published by Springer-Verlag in the Lecture Notes in Computer Science Series (http://www.springer.com/lncs). Submissions should follow the formatting instructions of Springer LNCS. Submitted papers must present original, non-published work of high quality. For selected papers, there will be an invitation to submit extended versions to a special issue in the International Journal of Information Security. Two types of papers will be accepted: Full papers (max 14 pages without bibliography/appendices) - May describe original technical research with a solid foundation, such as formal analysis or experimental results, with acceptance determined mostly based on novelty and validation. Or, may describe case studies applying existing techniques or analysis methods in industrial settings, with acceptance determined mostly by the general applicability of techniques and the completeness of the technical presentation details. Idea papers (max 8 pages with bibliography) - May crisply describe a novel idea that is both feasible and interesting, where the idea may range from a variant of an existing technique all the way to a vision for the future of security technology. Idea papers allow authors to introduce ideas to the field and get feedback, while allowing for later publication of complete, fully-developed results. Submissions will be judged primarily on novelty, excitement, and exposition, but feasibility is required, and acceptance will be unlikely without some basic, principled validation (e.g., extrapolation from limited experiments or simple formal analysis). In the proceedings, idea papers will clearly identified by means of the "Idea" tag in the title. == Demo Session Submission == This year we are planning to include a demonstration session in the symposium. If you are working on practical solutions to industrial-relevant problems in key areas of ESSOS, consider disseminating about your experience at our demonstration session. To be considered for presentation, a proposal describing the demonstration should be mailed to the Industry Chair, Luca Compagna (luca.compagna at sap.com). The following type of submission will be accepted: Demo presentation (short description, max 4 pages, not published in proceedings) - May shortly describe (i) the overall problem, (ii) the architecture underlying the system demonstrated, and (iii) one or more use case scenarios that present how the audience will gain an understanding of the underlying technology. Submissions will be evaluated based on the motivation of the work behind the use of the system to be demonstrated and its novelty. Demo presentations will not be included in the formal proceeding of ESSOS. == Steering committee == Jorge Cuellar (Siemens AG) Wouter Joosen (Katholieke Universiteit Leuven) - chair Fabio Massacci (Universit? di Trento) Gary McGraw (Cigital) Bashar Nuseibeh (The Open University) Daniel Wallach (Rice University University) == Organizing committee == General chair: Stefano Zanero (Politecnico di Milano, IT) Program co-chairs: Frank Piessens (Katholieke Universiteit Leuven, BE); Juan Caballero (IMDEA Software Institute, ES) Doctoral Symposium co-chairs: Haris Mouratidis (University of Brighton , UK); Federico Maggi (Politecnico di Milano, IT); Christos Kalloniatis (University of the Aegean, Greece) Publication chair: Nataliia Bielova (INRIA Sophia Antipolis-M?diterran?e, FR) Industry chair: Luca Compagna (SAP Product Security Research, FR) Publicity chair: Raoul Strackx (Katholieke Universiteit Leuven, BE) Local arrangements chair: TBA Web chair: Ghita Saevels (Katholieke Universiteit Leuven, BE) == Program committee == Aslan Askarov, Harvard University, US Leyla Bilge, Symantec Research Labs, FR Stefano Calzavara, Universit? Ca' Foscari Venezia, IT Lorenzo Cavallaro, Royal Holloway, University of London, UK Bruno Crispo, University of Trento, IT Werner Dietl, University of Waterloo, CA Michael Franz, University of California, Irvine, US Christian Hammer, Saarland University, DE Marieke Huisman, University of Twente, NL Somesh Jha, University of Wisconsin, US Martin Johns, SAP Research, DE Christian Kreibich, Lastline, US Wenke Lee, Georgia Institute of Technology, US Zhenkai Liang, National University of Singapore, SG Jay Ligatti, University of South Florida, US Nick Nikiforakis, Stony Brook University, US Georgios Portokalidis, Stevens Institute of Technology, US Joachim Posegga, University of Passau, DE Alexander Pretschner, Technische Universit?t M?nchen, DE Tamara Rezk, INRIA, FR Konrad Rieck, University of G?ttingen, DE Andrei Sabelfeld, Chalmers University of Technology, SE Ahmad-Reza Sadeghi, TU Darmstadt, DE Kapil Singh, IBM Research, US Asia Slowinska, Vrije Universiteit Amsterdam, NL Pierre-Yves Strub, IMDEA Software Institute, ES Carmela Troncoso, Gradiant, ES Xiaofeng Wang, Indiana University, US Mohammad Zulkernine, Queen's University, CA Disclaimer: http://www.kuleuven.be/cwis/email_disclaimer.htm From raoul.strackx at CS.KULEUVEN.BE Tue Sep 9 13:43:39 2014 From: raoul.strackx at CS.KULEUVEN.BE (Raoul Strackx) Date: Tue, 9 Sep 2014 13:43:39 +0200 Subject: [fg-arc] [ESSOS] Call for Papers (update) Message-ID: <540EE7EB.2090808@cs.kuleuven.be> === Call for Papers === Update: The paper submission deadline (Sep 15) for ESSOS 2015 will *not* be extended, but due to some requests, paper submissions for which no abstract has been received yet, are still allowed. Authors are encouraged to submit an abstract as soon as possible, but a paper can be submitted until the paper submission deadline even if no abstract was submitted first. Conference: International Symposium on Engineering Secure Software and Systems (ESSoS) Date: March 4 - 6, 2015 Venue: Milan, Italy Website: https://distrinet.cs.kuleuven.be/events/essos/2015/ Deadlines: Paper submission (September 15, 2014) In cooperation with: (pending) ACM SIGSAC and SIGSOFT and IEEE CS (TCSP). == Context and motivation == Trustworthy, secure software is a core ingredient of the modern world. So is the Internet. Hostile, networked environments, like the Internet, can allow vulnerabilities in software to be exploited from anywhere. To address this, high-quality security building blocks (e.g., cryptographic components) are necessary, but insufficient. Indeed, the construction of secure software is challenging because of the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies and the progress of attack vectors. Clearly, a strong need exists for engineering techniques that scale well and that demonstrably improve the software's security properties. == Goal and setup == The goal of this symposium, which will be the sixth in the series, is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering. Being one of the few conference-level events dedicated to this topic, it explicitly aims to bridge the software engineering and security engineering communities, and promote cross-fertilization. The symposium will feature two days of technical program. In addition to academic papers, the symposium encourages submission of high-quality, informative industrial experience papers about successes and failures in security software engineering and the lessons learned. Furthermore, the symposium also accepts short idea papers that crisply describe a promising direction, approach, or insight. == Topics == Paper submissions are solicited in all areas relating to secure software and secure systems research, including but not limited to: - Cloud security, virtualization for security - Mobile devices security - Automated techniques for vulnerability discovery and analysis - Model checking for security - Binary code analysis, reverse-engineering - Programming paradigms, models, and domain-specific languages for security - Operating system security - Verification techniques for security properties - Malware: detection, analysis, mitigation - Security in critical infrastructures - Security economics - Security by design - Static and dynamic code analysis for security - Web applications security - Program rewriting techniques for security - Security measurements - Empirical secure software engineering - Security-oriented software reconfiguration and evolution - Computer forensics - Processes for the development of secure software and systems - Human-computer interaction for security - Security testing - Embedded software security == Important dates == Abstract submission: September 8, 2014 (Not longer required) Paper submission: September 15, 2014 Demo submission: October 24, 2014 Author notification: November 17, 2014 Camera-ready: December 7, 2014 == Submission and format == The proceedings of the symposium are published by Springer-Verlag in the Lecture Notes in Computer Science Series (http://www.springer.com/lncs). Submissions should follow the formatting instructions of Springer LNCS. Submitted papers must present original, non-published work of high quality. For selected papers, there will be an invitation to submit extended versions to a special issue in the International Journal of Information Security. Two types of papers will be accepted: Full papers (max 14 pages without bibliography/appendices) - May describe original technical research with a solid foundation, such as formal analysis or experimental results, with acceptance determined mostly based on novelty and validation. Or, may describe case studies applying existing techniques or analysis methods in industrial settings, with acceptance determined mostly by the general applicability of techniques and the completeness of the technical presentation details. Idea papers (max 8 pages with bibliography) - May crisply describe a novel idea that is both feasible and interesting, where the idea may range from a variant of an existing technique all the way to a vision for the future of security technology. Idea papers allow authors to introduce ideas to the field and get feedback, while allowing for later publication of complete, fully-developed results. Submissions will be judged primarily on novelty, excitement, and exposition, but feasibility is required, and acceptance will be unlikely without some basic, principled validation (e.g., extrapolation from limited experiments or simple formal analysis). In the proceedings, idea papers will clearly identified by means of the "Idea" tag in the title. == Demo Session Submission == This year we are planning to include a demonstration session in the symposium. If you are working on practical solutions to industrial-relevant problems in key areas of ESSOS, consider disseminating about your experience at our demonstration session. To be considered for presentation, a proposal describing the demonstration should be mailed to the Industry Chair, Luca Compagna (luca.compagna at sap.com). The following type of submission will be accepted: Demo presentation (short description, max 4 pages, not published in proceedings) - May shortly describe (i) the overall problem, (ii) the architecture underlying the system demonstrated, and (iii) one or more use case scenarios that present how the audience will gain an understanding of the underlying technology. Submissions will be evaluated based on the motivation of the work behind the use of the system to be demonstrated and its novelty. Demo presentations will not be included in the formal proceeding of ESSOS. == Steering committee == Jorge Cuellar (Siemens AG) Wouter Joosen (Katholieke Universiteit Leuven) - chair Fabio Massacci (Universit? di Trento) Gary McGraw (Cigital) Bashar Nuseibeh (The Open University) Daniel Wallach (Rice University University) == Organizing committee == General chair: Stefano Zanero (Politecnico di Milano, IT) Program co-chairs: Frank Piessens (Katholieke Universiteit Leuven, BE); Juan Caballero (IMDEA Software Institute, ES) Doctoral Symposium co-chairs: Haris Mouratidis (University of Brighton , UK); Federico Maggi (Politecnico di Milano, IT); Christos Kalloniatis (University of the Aegean, Greece) Publication chair: Nataliia Bielova (INRIA Sophia Antipolis-M?diterran?e, FR) Industry chair: Luca Compagna (SAP Product Security Research, FR) Publicity chair: Raoul Strackx (Katholieke Universiteit Leuven, BE) Local arrangements chair: TBA Web chair: Ghita Saevels (Katholieke Universiteit Leuven, BE) == Program committee == Aslan Askarov, Harvard University, US Leyla Bilge, Symantec Research Labs, FR Stefano Calzavara, Universit? Ca' Foscari Venezia, IT Lorenzo Cavallaro, Royal Holloway, University of London, UK Bruno Crispo, University of Trento, IT Werner Dietl, University of Waterloo, CA Michael Franz, University of California, Irvine, US Christian Hammer, Saarland University, DE Marieke Huisman, University of Twente, NL Somesh Jha, University of Wisconsin, US Martin Johns, SAP Research, DE Christian Kreibich, Lastline, US Wenke Lee, Georgia Institute of Technology, US Zhenkai Liang, National University of Singapore, SG Jay Ligatti, University of South Florida, US Nick Nikiforakis, Stony Brook University, US Georgios Portokalidis, Stevens Institute of Technology, US Joachim Posegga, University of Passau, DE Alexander Pretschner, Technische Universit?t M?nchen, DE Tamara Rezk, INRIA, FR Konrad Rieck, University of G?ttingen, DE Andrei Sabelfeld, Chalmers University of Technology, SE Ahmad-Reza Sadeghi, TU Darmstadt, DE Kapil Singh, IBM Research, US Asia Slowinska, Vrije Universiteit Amsterdam, NL Pierre-Yves Strub, IMDEA Software Institute, ES Carmela Troncoso, Gradiant, ES Xiaofeng Wang, Indiana University, US Mohammad Zulkernine, Queen's University, CA From schmid at sse.uni-hildesheim.de Tue Sep 9 14:48:50 2014 From: schmid at sse.uni-hildesheim.de (Klaus Schmid) Date: Tue, 9 Sep 2014 14:48:50 +0200 Subject: [fg-arc] =?utf-8?q?Aufruf_f=C3=BCr_Beitr=C3=A4ge=3A_Technologietr?= =?utf-8?q?ansferprogramm_der_Software_Engineering_2015_in_Dresden?= Message-ID: AUFRUF FUER BEITRAEGE: Technologietransferprogramm SE 2015 ========================================================== Aufruf fuer Beitraege zum Technologietransferprogramm der Software Engineering Tagung 2015 in Dresden. Ein reger Austausch zwischen industrieller Praxis und Forschung ist entscheidend fuer die Relevanz und Anwendbarkeit erfolgreicher Software Engineering Forschung. Viele Universitaeten kooperieren daher direkt mit Unternehmen, ebenso existieren eine Vielzahl dedizierter Technologietransfer-Einrichtungen auf Ebene der Universitaeten, der Bundeslaender und des Bundes. Erfolgreicher Technologietransfer zeitigt beiderseitigen Nutzen: neuestes Wissen wird in die Wirtschaft transferiert, gleichzeitig gewinnt die Forschung ein besseres Verstaendnis der Randbedingungen des industriellen Einsatzes neuer Methoden und neue Ansaetze und Methoden koennen in realen Anwendungskontexten validiert werden. Ziel des Technologietransferprogramms der SE 2015 ist es diesen Austausch von Erfahrungen im Technologie-Transfer von Software-Technik-Forschung zu unterstuetzen. THEMEN Konkret werden Beitraege erbeten, die: ? generalisierbares Wissen aus Technologietransferprojekten berichten, ? negative Erfahrungen dokumentieren (welche Ansaetze waren wider Erwarten schlecht umsetzbar?), ? ueber neue Organisationsformen von Technologie-Transfer (LivingLabs, Offene Innovationsplattformen, etc.) berichten, ? berichten, wie Software-Technik-Innovation allgemein verstaendlich dargestellt wurde, ? ueber Software-Technik im Verbund mit Anwendungsgebieten (z.B. Energie, Mobilitaet, Gesundheit) berichten. Beitraege sollten ueber reine Projektverlaufsberichte hinausgehen und die gemachten Erfahrungen explizit darstellen sowie ggf. neue Hypothesen fuer die Forschung ableiten. EINREICHUNGEN Beitraege sollten bis zu 6 Seiten im LNI-Format umfassen. Akzeptierte Beitraege werden in den Tagungsband der SE 2014 aufgenommen. Bitte reichen Sie Beitraege ueber EasyChair https://easychair.org/conferences/?conf=se2015 ein und waehlen Sie dabei ?SE 2015 Technologietransferprogramm? aus. Es wird erwartet, dass sich bei Annahme mindestens ein Autor/eine Autorin als Teilnehmer zur Konferenz registriert und dort vortraegt. WICHTIGE DATEN Einreichung von Abstracts: bis 12. Oktober 2014 Einreichung von Beitraegen: bis 19. Oktober 2014 Benachrichtigung: bis 15. November 2014 Beitraege fuer den Tagungsband: bis 15. Dezember 2014 Konferenz: 17-20. Maerz 2015 PROGRAMM-KOMITEE Klaus Schmid, Uni Hildesheim (Vorsitz) Manfred Broy, fortiss, Muenchen Gregor Engels, s-lab / c-lab, Paderborn Wilhelm Hasselbring, KoSSE, Kiel Stefan Jaehnichen, FZI, Berlin Martin Leucker, KoSSE, Luebeck Peter Loos, DFKI, Saarbruecken Klaus Pohl, Paluno, Essen Alexander Pretschner, TU Muenchen Ralf Reussner, KIT / FZI Dieter Rombach, Fraunhofer IESE, Kaiserslautern Bernhard Rumpe, RWTH Aachen Heinz Zuellighoven, Universitaet Hamburg ----------------------------------------------------------------- Prof. Dr. Klaus Schmid University of Hildesheim Tel.: +49(0)5121 / 883-40332 Institute of Computer Science Fax.: +49(0)5121 / 883-40333 Marienburger Platz 22 schmid at sse.uni-hildesheim.de D-31141 Hildesheim, Germany www.sse.uni-hildesheim.de ----------------------------------------------------------------- From i.schaefer at tu-braunschweig.de Wed Sep 10 09:21:07 2014 From: i.schaefer at tu-braunschweig.de (Ina Schaefer) Date: Wed, 10 Sep 2014 09:21:07 +0200 Subject: [fg-arc] =?windows-1252?q?Aufruf_f=FCr_Beitr=E4ge_zum_Studierende?= =?windows-1252?q?nprogramm_der_SE_2015?= Message-ID: <540FFBE3.1040704@tu-braunschweig.de> Aufruf f?r Beitr?ge ? SE 2015 Studierendenprogram http://swm2015.de/se-2015/tracks/studprog-se15 Studierende entwickeln im Laufe ihres Studiums Software in Gruppenprojekten. Solche Software-Systeme k?nnen aus softwaretechnischer Sicht sehr interessant sein. *Ziele* Mit dem Studierendenprogramm der Software Engineering 2015 geben wir Studierenden die Gelegenheit, ihre Arbeiten auf einer wissenschaftlichen Konferenz zu pr?sentieren. Damit k?nnen sie ihre Universit?t und sich selbst vorstellen, Kontakte zu anderen Wissenschaftlern oder Firmen kn?pfen und qualifizierte R?ckmeldungen zu ihren Projekten erhalten. Typischerweise werden Arbeiten pr?sentiert, die in Projekt- oder Studienpraktika, als Abschlussarbeiten oder aus Eigeninitiativen in einem unabh?ngigen Rahmen entstanden sind. *Einreichungen* Studierenden-Gruppen oder einzelnen Studierenden, die dieses Forum nutzen wollen, sind aufgefordert, eine kurze zweiseitige Skizze einzureichen. Eine Vorlage wird auf der Webseite bereitgestellt. Die eingereichten Beitr?ge werden nach den Kriterien Originalit?t, Relevanz, Systematik des Entwicklungsprozesses und Interesse f?r ein gr??eres Publikum bewertet. Bei erfolgreicher Begutachtung werden die Autoren eingeladen, ihre Arbeit mit einer 20-min?tigen Pr?sentation Wissenschaftlern, Industrievertretern und anderen Konferenzteilnehmern vorzustellen. Es wird erwartet, dass sich bei Annahme mindestens ein Autor/eine Autorin als Teilnehmer (mit Studierendenkonditionen) zur Konferenz registriert und dort vortr?gt. Der Beitrags wird zudem im Tagungsband ver?ffentlicht. Es ist geplant, dass neben den studentischen Vortr?gen die Studierenden durch Vortr?ge von Industrievertretern Einblicke in die berufliche Praxis erhalten. Die Einreichung erfolgt ?ber EasyChair: https://easychair.org/conferences/?conf=sesp2015. *Wichtige Daten* Einreichung von Beitr?gen: bis 20. November 2014 Benachrichtigung: bis 05. Dezember 2014 Finale Versionen: bis 20. Dezember 2014 *Programm-Komitee* Ina Schaefer, Technische Universit?t Braunschweig (Vorsitz) Steffen Becker, Universit?t Paderborn Michael Goedicke, Universit?t Duisburg-Essen Peter Forbrig, Universit?t Rostock Dirk Nowotka, Universit?t Kiel Barbara Paech, Universit?t Heidelberg Andreas Rausch, Technische Universit?t Clausthal Ralf Reussner, KIT Gabi Taentzer, Universit?t Marburg Karl Teille, Volkswagen AG Andreas Winter, Universit?t Oldenburg -- Prof. Dr.-Ing. Ina Schaefer Institut f?r Softwaretechnik und Fahrzeuginformatik Technische Universit?t Braunschweig M?hlenpfordtstr. 23 D-38106 Braunschweig Germany Tel: +49-531-391-2275 Fax: +49-531-391-2277 URL: http://www.tu-braunschweig.de/isf From zimmer at informatik.uni-halle.de Thu Sep 11 19:01:38 2014 From: zimmer at informatik.uni-halle.de (Prof. Dr. Wolf Zimmermann) Date: Thu, 11 Sep 2014 19:01:38 +0200 Subject: [fg-arc] =?utf-8?q?SE_2015_-_Aufruf_f=C3=BCr_Workshops_zur_Softwa?= =?utf-8?q?re_Engineering_Tagung_2015?= Message-ID: <5411D572.8090503@informatik.uni-halle.de> Aufruf f?r Workshops zur Software Engineering Tagung 2015 Die deutsche Software Engineering Tagung ist das wichtigste j?hrliche Treffen der Software Engineering-Community im deutschsprachigen Raum. In diesem Jahr steht die Tagung unter dem Motto ?Sichere Cyber-Physikalische Systeme?. Neben dem technisch-wissenschaftlichen Hauptprogramm stellt das Workshop-Programm immer einen wesentlichen Bestandteil des Tagungs-Programms dar. Durch das offene Workshop-Format ist es sogar in besonderer Weise m?glich neue Teilgebiete des Software Engineering zu f?rdern und eine starke Vernetzung und Kooperation von Wissenschaft und Praxis zu erreichen. Prinzipiell sind alle Themen mit klarem Software-Engineering-Bezug m?gliche Workshop-Themen. Einreichungen Vorschl?ge f?r Workshops sollten die folgenden Informationen enthalten und nicht mehr als drei Seiten umfassen. 1. Angabe der Hauptkontaktperson mit vollst?ndigen Kontaktdaten und zus?tzlichen Organisatoren 2. Darstellung des Erfahrungshintergrunds der Organisatoren (sowohl in Bezug auf Workshops als auch allgemein). 3. Gew?nschte L?nge (Halbtages- / Ganztages- Workshop) und bevorzugtes Datum (17. oder 18. M?rz 2015) 4. Titel, Akronym, Thema (inkl. Motivation warum dieses Thema f?r die SE 2015 wichtig ist) 5. Erwartete Ergebnisse (Arbeitsziele) des Workshops 6. Zusammenfassung (max. 150 Worte) f?r die Workshopdarstellung auf der Webseite der SE 2015. Es wird erwartet, dass der Workshop bei Annahme eine eigene, zus?tzliche Webseite erstellt. 7. Eine Erl?uterung des geplanten Ablaufs, dabei sollte insbesondere deutlich werden welchen Umfang Diskussionen und welchen Vortr?ge haben werden und in welcher Weise die Organisatoren beabsichtigen die Diskussionen anzuregen. 8. Liste der Programm-Komitee-Mitglieder (Vorschl?ge und bereits eingeholte Zusagen) 9. Erl?uterung der Werbestrategie 10. Erl?uterung des Auswahlprozesses f?r Workshopbeitr?ge (dieser muss wissenschaftlichen Standards gen?gen) 11. Angabe der erwarteten und der minimalen Zahl der Teilnehmer. Bei neuen Workshops = begr?ndete Sch?tzung, bei Workshops, die zuvor bereits gehalten wurden: Erfahrungswerte. 12. Darstellung der notwendigen Raumausstattung und anderer organisatorischer Voraussetzungen. Die Vorschl?ge k?nnen jederzeit an wolf.zimmermann at informatik.uni-halle.de eingereicht werden. Um eine fr?hzeitige Organisation und Werbung zu erm?glichen, erhalten Sie innerhalb von vier Wochen eine Entscheidung. Bei Fragen wenden Sie sich bitte an den Verantwortlichen f?r das Workshop-Programm: Wolf Zimmermann, wolf.zimmermann at informatik.uni-halle.de. Akzeptierte Workshops m?ssen von den jeweiligen Organisatoren geeignet angek?ndigt werden. Die SE 2015 wird zus?tzlich einen gemeinsamen Call f?r alle Workshops ver?ffentlichen. Die Organisatoren werden gebeten, nachdem ihr Thema akzeptiert wurde, eine Webseite einzurichten, mit deren Hilfe sie die Teilnehmer ?ber Inhalte und zeitlichen Ablauf, sowie ?ber den Workshop imAllgemeinen informieren. Dar?ber hinaus k?nnen die Organisatoren eine zweiseitige Beschreibung des Workshops im Tagungsband ver?ffentlichen (LNI-Format). Die Konferenzorganisation beh?lt es sich vor Workshops mit weniger als 8 zahlenden Teilnehmern abzusagen. Workshop-Komitee Wolf Zimmermann, Universit?t Halle-Wittenberg, (Vorsitz) Andreas Both, Unister GmbH (Leipzig) Anne Koziolek, Karlsruhe Institute of Technology Klaus Schmid, Universit?t Hildesheim Wichtige Daten Einreichung von Vorschl?gen: bis 15.10.2014 Benachrichtigung: vier Wochen nach Einreichung Workshopbeschreibung (f?r Tagungsband): bis 1. Dezember 2014 Einreichung Workshop-Beitr?ge: bis 16. Dezember 2014 Benachrichtigung zu Workshop-Beitr?gen: bis 13. Januar 2015 Finale Beitr?ge: bis 27. Januar 2015 From msteffen at ifi.uio.no Wed Sep 10 15:37:36 2014 From: msteffen at ifi.uio.no (Martin Steffen) Date: Wed, 10 Sep 2014 15:37:36 +0200 Subject: [fg-arc] Call for Industry Track papers at FM2015 (20th Intl. Symposium on Formal Methods); 22.-26. June, 2015, Oslo Message-ID: <20140910133737.072291769@nittedal.ifi.uio.no> --------------------------=== FM 2015 Industry Track ===----------------- as part of the 20th International Symposium on Formal Methods Oslo, Norway, June 22-26, 2015 http://fm2015.ifi.uio.no/fm2015-industry-track/ Call for Papers ------------------------------------------------------------------------- IMPORTANT DATES: - Feb 2, 2015: Industry Track Submission: - March 13, 2015: Industry Track Notification - June 22 - 26, 2015: Main Conference -------------------------------------------------------------------------- CALL FOR INDUSTRY TRACK PAPERS --------------------------------------------------------------------------- FM 2015 is the twentieth in a series of symposia organized by Formal Methods Europe, an independent association whose aim is to stimulate the use of, and research on, formal methods for software development. The symposia have been notably successful in bringing together innovators and practitioners in precise mathematical methods for software and systems development, industrial users, as well as researchers. The industry track of FM 2015 welcomes short papers describing industrial applications of formal methods, experience with introducing formal methods in industry, tool usage reports, experiments with challenge problems. Authors are encouraged to explain how the use of formal methods has overcome problems, led to improvements in design or provided new insights. A survey of industrial applications of formal methods has been conducted and is currently being extended (now with more than 100 entries). It would be welcome if submissions to the industrial track also would take the time to supply an entry to this survey. We hope during the industry track of FM 2015 to provide a new status of this survey so you will be able to see how your findings compare to others. PAPER SUBMISSION Industry track papers should not exceed 4 pages (including appendices and references). Accepted papers will be published in the Symposium Proceedings, to appear in Springer's Lecture Notes in Computer Science. Submitted papers should describe, in English, have not been published or submitted elsewhere concurrently for publication, and should be in Springer's format. All submissions will be evaluated by at least three members of the industry track program committee. Papers should be submitted through the FM 2015 Industry Track EasyChair web site: https://easychair.org/conferences/?conf=fm2015industrytrack -------------------------------------------------------------------------- INDUSTRY TRACK PROGRAM COMMITTEE - Jon Burton, Praxis, United Kingdom. - Ewen Denney, SGT/NASA Ames, United States. - Wolfgang Grieskamp, Google, United States. - Sako Hiroshi, Designers' Den Corp, Japan. - Michael Holloway, NASA, United States. - Ralf Huuck, NICTA, Australia. (co-chair). - Peter Gorm Larsen, Aarhus University, Denmark (co-chair). - Thierry Lecomte, ClearSy, France. - Pekka Pihlajasaari, Data Abstraction (Pty) Ltd, South Africa. - Nico Plat, West Consulting, Netherlands. - Andreas Roth, SAP, Germany (co-chair). - Bastian Schlich, ABB, Germany. - Marcel Verhoef, Chess Wireless, Netherlands. From grlmc at urv.cat Sun Sep 14 11:13:46 2014 From: grlmc at urv.cat (GRLMC) Date: Sun, 14 Sep 2014 11:13:46 +0200 Subject: [fg-arc] LATA 2015: 3rd call for papers Message-ID: *To be removed from our mailing list, please respond to this message with UNSUBSCRIBE in the subject line* **************************************************************************************** 9th INTERNATIONAL CONFERENCE ON LANGUAGE AND AUTOMATA THEORY AND APPLICATIONS LATA 2015 Nice, France March 2-6, 2015 Organized by: CNRS, I3S, UMR 7271 Nice Sophia Antipolis University Research Group on Mathematical Linguistics (GRLMC) Rovira i Virgili University http://grammars.grlmc.com/lata2015/ **************************************************************************************** AIMS: LATA is a conference series on theoretical computer science and its applications. Following the tradition of the diverse PhD training events in the field developed at Rovira i Virgili University in Tarragona since 2002, LATA 2015 will reserve significant room for young scholars at the beginning of their career. It will aim at attracting contributions from classical theory fields as well as application areas. VENUE: LATA 2015 will take place in Nice, the second largest French city on the Mediterranean coast. The venue will be the University Castle at Parc Valrose. SCOPE: Topics of either theoretical or applied interest include, but are not limited to: algebraic language theory algorithms for semi-structured data mining algorithms on automata and words automata and logic automata for system analysis and programme verification automata networks automata, concurrency and Petri nets automatic structures cellular automata codes combinatorics on words computational complexity data and image compression descriptional complexity digital libraries and document engineering foundations of finite state technology foundations of XML fuzzy and rough languages grammars (Chomsky hierarchy, contextual, unification, categorial, etc.) grammatical inference and algorithmic learning graphs and graph transformation language varieties and semigroups language-based cryptography parallel and regulated rewriting parsing patterns power series string and combinatorial issues in bioinformatics string processing algorithms symbolic dynamics term rewriting transducers trees, tree languages and tree automata unconventional models of computation weighted automata STRUCTURE: LATA 2015 will consist of: invited talks peer-reviewed contributions INVITED SPEAKERS: Paola Inverardi (L?Aquila), Synthesis of Protocol Adapters Johann A. Makowsky (Technion, Haifa), Hankel Matrices for Graph Parameters and Graph Grammars Giancarlo Mauri (Milano Bicocca), Complexity Classes for Membrane Systems Andreas Podelski (Freiburg), Automated Program Verification Antonio Restivo (Palermo), The Shuffle Product: New Research Directions PROGRAMME COMMITTEE: Andrew Adamatzky (West of England, Bristol, UK) Andris Ambainis (Latvia, Riga, LV) Franz Baader (Dresden Tech, DE) Rajesh Bhatt (Massachusetts, Amherst, US) Jos?-Manuel Colom (Zaragoza, ES) Bruno Courcelle (Bordeaux, FR) Erzs?bet Csuhaj-Varj? (E?tv?s Lor?nd, Budapest, HU) Aldo de Luca (Naples Federico II, IT) Susanna Donatelli (Turin, IT) Paola Flocchini (Ottawa, CA) Enrico Formenti (Nice, FR) Tero Harju (Turku, FI) Monika Heiner (Brandenburg Tech, Cottbus, DE) Yiguang Hong (Chinese Academy, Beijing, CN) Kazuo Iwama (Kyoto, JP) Sanjay Jain (National Singapore, SG) Maciej Koutny (Newcastle, UK) Anton?n Ku?era (Masaryk, Brno, CZ) Thierry Lecroq (Rouen, FR) Salvador Lucas (Valencia Tech, ES) Veli M?kinen (Helsinki, FI) Carlos Mart?n-Vide (Rovira i Virgili, Tarragona, ES, chair) Filippo Mignosi (L?Aquila, IT) Victor Mitrana (Madrid Tech, ES) Ilan Newman (Haifa, IL) Joachim Niehren (INRIA, Lille, FR) Enno Ohlebusch (Ulm, DE) Arlindo Oliveira (Lisbon, PT) Jo?l Ouaknine (Oxford, UK) Wojciech Penczek (Polish Academy, Warsaw, PL) Dominique Perrin (ESIEE, Paris, FR) Alberto Policriti (Udine, IT) Sanguthevar Rajasekaran (Connecticut, Storrs, US) J?rg Rothe (D?sseldorf, DE) Frank Ruskey (Victoria, CA) Helmut Seidl (Munich Tech, DE) Ayumi Shinohara (Tohoku, Sendai, JP) Bernhard Steffen (Dortmund, DE) Frank Stephan (National Singapore, SG) Paul Tarau (North Texas, Denton, US) Andrzej Tarlecki (Warsaw, PL) Jacobo Tor?n (Ulm, DE) Frits Vaandrager (Nijmegen, NL) Jaco van de Pol (Twente, Enschede, NL) Pierre Wolper (Li?ge, BE) Zhilin Wu (Chinese Academy, Beijing, CN) Slawomir Zadrozny (Polish Academy, Warsaw, PL) Hans Zantema (Eindhoven Tech, NL) ORGANIZING COMMITTEE: S?bastien Autran (Nice) Adrian Horia Dediu (Tarragona) Enrico Formenti (Nice, co-chair) Sandrine Julia (Nice) Carlos Mart?n-Vide (Tarragona, co-chair) Christophe Papazian (Nice) Julien Provillard (Nice) Pierre-Alain Scribot (Nice) Bianca Truthe (Giessen) Florentina Lilica Voicu (Tarragona) SUBMISSIONS: Authors are invited to submit non-anonymized papers in English presenting original and unpublished research. Papers should not exceed 12 single-spaced pages (including eventual appendices, references, etc.) and should be prepared according to the standard format for Springer Verlag's LNCS series (see http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). Submissions have to be uploaded to: https://www.easychair.org/conferences/?conf=lata2015 PUBLICATIONS: A volume of proceedings published by Springer in the LNCS series will be available by the time of the conference. A special issue of the Journal of Computer and System Sciences (Elsevier, 2013 JCR impact factor: 1.0) will be later published containing peer-reviewed substantially extended versions of some of the papers contributed to the conference. Submissions to it will be by invitation. REGISTRATION: The period for registration is open from July 21, 2014 to March 2, 2015. The registration form can be found at: http://grammars.grlmc.com/lata2015/Registration.php DEADLINES: Paper submission: October 10, 2014 (23:59 CET) Notification of paper acceptance or rejection: November 18, 2014 Early registration: November 25, 2014 Final version of the paper for the LNCS proceedings: November 26, 2014 Late registration: February 16, 2015 Submission to the journal special issue: June 6, 2015 QUESTIONS AND FURTHER INFORMATION: florentinalilica.voicu at urv.cat POSTAL ADDRESS: LATA 2015 Research Group on Mathematical Linguistics (GRLMC) Rovira i Virgili University Av. Catalunya, 35 43002 Tarragona, Spain Phone: +34 977 559 543 Fax: +34 977 558 386 ACKNOWLEDGEMENTS: Nice Sophia Antipolis University Rovira i Virgili University --- Este mensaje no contiene virus ni malware porque la protecci?n de avast! Antivirus est? activa. http://www.avast.com From aali at ltu.edu Wed Sep 17 13:14:31 2014 From: aali at ltu.edu (IEOM 2015) Date: Wed, 17 Sep 2014 07:14:31 -0400 Subject: [fg-arc] IEOM 2015 Dubai - Submission Deadline Extended to September 30, 2014 Message-ID: <76cb1553af7b49a398aee974aa3bcdfd@ltu.edu> Dear Colleagues: Submission deadline of IEOM 2015 Conference is extended to September 30, 2014 due to last minute submission technical problem and some requests. ASQ, IEEE and INFORMS are co-sponsoring IEOM 2015. Your papers will be published in IEEE Xplore and indexed. Still you can submit your technical papers/abstracts online: https://www.xcdsystem.com/ieom2015/ The following categories of submission are accepted: Technical Full Paper and/or Abstract Only - Scientific and applied research work can be submitted and presented at the IEOM Dubai conference in the breaded area of IE and OM. All full papers are subject to peer review. Accepted papers will be published in IEEE Xplore and indexed. Research can be presented independently with an abstract. Please submit online: www.xcdsystem.com/ieom2015/. Global Engineering Education - Provide a global view of the opportunities and challenges that are currently available in all aspects of engineering education. One of the main aspects is how to reduce readiness gap around the world for engineering graduates. If you are interested, please send your bio, photo and a summary to conference at iieom.org. Industry Solutions - Provide a review and analysis of a specific industry and the role that the engineering profession can play in addressing the issues and the solution facing a broad spectrum of industry in today's society. If you are interested, please send your bio, photo and a summary to conference at iieom.org. Operations Excellence - Examine the process and operational issues facing both manufacturing and non-manufacturing sectors of the international marketplace. Develop possible to approaches to increase the operational efficiency and productivity. If you are interested, please contact Mr. Paris (ParisJF at xonitek.com). Poster Sessions - Create a poster to communicate how a specific problem was addressed using graphics and a short narrative. All poster presentations are to be reviewed by IEOM members at the event for IEOM Members Choice Awards. Three awards will be given for the first, second and third places. Please submit online: www.xcdsystem.com/ieom2015/. Capstone Student Poster Competitions - Recognizes engineering students who may have an interest in submitting poster based on innovative subject from a capstone project. Please submit to Dr. Shamsuzzaman (mshamsuzzaman at sharjah.ac.ae). Student Paper Competition - Recognizes students who have demonstrated a strong interest in a publishing a paper on a project that may include research that addressed and solved an industrial engineering or operations management problem. Please submit to Dr. Shamsuzzoha (ahm.shamsuzzoha at uwasa.fi). Keynote Speakers . Dr. G. Don Taylor, Charles O. Gordon Professor and Department Head, Grad Department of Industrial and Systems Engineering, Virginia Tech, Blacksburg, VA, USA and Past IIE President (Opening Keynote) . Chris Smith; Vice President & Managing Director of Boeing Saudi Arabia . Dr. Chris Backhouse, Professor of Product Innovation, School of Mechanical and Manufacturing Engineering, Loughborough University, Leicestershire, UK . Dr. Leland Blank, Professor and Dean of Engineering, American University of Sharjah, UAE and Past IIE President Global Engineering Education Panel Session Speakers . Dr. Funso Falade, President, African Engineering Education Association . Dr. Hans-Juergen Hoyer, Secretary General of the International Federation for Engineering Education Societies (IFEES) . Dr. Abu Masud, Interim Dean of Graduate School and Boeing Global Engineering Professor at Wichita State University and . Dr. Hamid Parsaei, Professor of Industrial and Systems Engineering at Texas A&M University (College Station) and Associate Dean for Academic Affairs at Texas A&M University Qatar Please follow IEEE format for full paper submission. All full papers will be published in the IEEE Xplore and indexed. Your participation is highly appreciated. Let us know if you have any question. Thanks IEOM 2015 Conference Committee IEOM Society www.iieom.org -------------- next part -------------- An HTML attachment was scrubbed... URL: From m.huisman at utwente.nl Mon Sep 22 10:16:17 2014 From: m.huisman at utwente.nl (Marieke Huisman) Date: Mon, 22 Sep 2014 10:16:17 +0200 Subject: [fg-arc] Call for Proposals for Workshops at FM2015 (20th Intl. Symposium on Formal Methods); 22.-26. June, 2015, Oslo Message-ID: <541FDAD1.8030200@utwente.nl> CALL FOR PROPOSALS FOR WORKSHOPS The 20th International Symposium on Formal Methods (FM 2015) will take place in Oslo, Norway, June 22-26, 2015. For this major event, we are inviting people to submit proposals for workshops. The purpose of the workshops is to provide an informal setting for workshop participants to discuss technical issues, exchange research ideas, and to discuss and/or demonstrate applications. These workshops may be driven by fundamental academic interests or by needs from specific application domains. We encourage a diversity of workshops relating to different varieties of formal models. We also explicitly welcome satellite events in a non-traditional format, such as formal methods-related competitions. All workshop proposals must be written in English. Proposals for workshops should be no more than 3 pages in length and submitted to the Workshops chairs before November 14, 2014 (see below). A workshop proposal should include a draft call-for-papers containing at least the following information: - Title and brief technical description of the workshop, specifying the goals and the technical issues that will be its focus. - The names and contact information (web page, email address) of the Programme Committee (PC) chairs, i.e., the workshop organisers. - A tentative list of workshop PC members. We suggest one or two PC chairs and at least 10 PC members coming from different countries. Moreover, the following additional information is requested: - If the workshop has taken place before: How often has the workshop taken place so far? Which conference(s) has the workshop been colocated with so far? Number of participants in the last installment. - A discussion of the proposed format and agenda. - The proposed duration (half, one or two days). - Procedures for selecting participants and papers. - Potential invited speakers. - Expected number of participants. Each workshop programme chair will be responsible for the following: - Producing a web page and a "Call for Papers/Participation" for their workshop. - Providing a brief description of the workshop for the conference web page and programme, and providing a workshop web page the conference can refer to for details. - Selecting the papers for the workshop proceedings and providing the camera ready copies ready for publication. - All advertising of the workshop beyond web page advertising. - Appointing session chairs, etc. The local organisation of the conference will take care of the production of informal or electronic workshop proceedings, assuming that the proceedings are camera ready. Submission of Workshop Proposals Proposals should be submitted as a PDF file. Please send your proposals and any inquiries by electronic mail to the Workshop chairs: Marieke Huisman Volker Stolz. Dates Deadline for workshop proposals: November 14, 2014 Notification of decision on workshops: November 28, 2014 From grlmc at urv.cat Sat Sep 20 19:41:57 2014 From: grlmc at urv.cat (GRLMC) Date: Sat, 20 Sep 2014 19:41:57 +0200 Subject: [fg-arc] SLSP 2014: call for participation Message-ID: <736ECE4258284150B6CA23232C673181@Carlos1> *To be removed from our mailing list, please respond to this message with UNSUBSCRIBE in the subject line* ********************************************************************************** 2nd INTERNATIONAL CONFERENCE ON STATISTICAL LANGUAGE AND SPEECH PROCESSING SLSP 2014 Grenoble, France October 14-16, 2014 Organised by: ?quipe GETALP Laboratoire d?Informatique de Grenoble Research Group on Mathematical Linguistics (GRLMC) Rovira i Virgili University http://grammars.grlmc.com/slsp2014/ ********************************************************************************** PROGRAM Tuesday, October 14 9:00 - 10:00 Registration 10:00 - 10:15 Opening 10:15 - 11:05 Roger K. Moore: Spoken Language Processing: Time to Look Outside? - Invited Lecture 11:05 - 11:35 Coffee Break 11:35 - 12:50 Georgios Kontonatsios, Claudiu Mihaila, Ioannis Korkontzelos, Paul Thompson, and Sophia Ananiadou: A Hybrid Approach to Compiling Bilingual Dictionaries of Medical Terms from Parallel Corpora Wei Liu, Zhipeng Chang, and William J. Teahan: Experiments with a PPM Compression-based Method for English-Chinese Bilingual Sentence Alignment Chi-kiu Lo and Dekai Wu: BiMEANT: Integrating Cross-lingual and Monolingual Semantic Frame Similarities in the MEANT Semantic MT Evaluation Metric 12:50 - 14:20 Lunch 14:20 - 15:35 Mathias Verbeke, Vincent Van Asch, Walter Daelemans, and Luc De Raedt: Lazy and Eager Relational Learning using Graph-Kernels Mohamed Amine Boukhaled, and Jean-Gabriel Ganascia: Probabilistic Anomaly Detection Method for Authorship Verification Uli Fahrenberg, Fabrizio Biondi, Kevin Corre, Cyrille Jegourel, Simon Kongsh j, and Axel Legay: Measuring Global Similarity between Texts 16:00 - 18:00 Touristic visit Wednesday, October 15 9:00 - 9:50 Claire Gardent: Syntax and Data-to-Text Generation - Invited Lecture 9:50 - 10:05 Break 10:05 - 11:20 Borb?la Sikl?si and Attila Nov?k: Identifying and Clustering Relevant Terms in Clinical Records Using Unsupervised Methods Amine Abdaoui, J?r?me Az?, Sandra Bringay, Natalia Grabar, and Pascal Poncelet: Predicting Medical Roles in Online Health Fora Ekaterina Pronoza, Elena Yagunova, and Svetlana Volskaya: Corpus-based Information Extraction and Opinion Mining for the Restaurant Recommendation System 11:20 - 11:50 Coffee Break and Group Photo 11:50 - 13:05 Ra?l Ernesto Gutierrez de Pi?erez Reyes and Juan Francisco D?az-Fr?as: Informal Mathematical Discourse Parsing with Conditional Random Fields Waad Ben Kheder, Driss Matrouf, Pierre-Michel Bousquet, Jean-Fran?ois Bonastre and Moez Ajili: Robust Speaker Recognition Using MAP Estimation of Additive Noise in i-vectors Space Arseniy Gorin and Denis Jouvet: Structured GMM Based on Unsupervised Clustering for Recognizing Adult and Child Speech 13:05 - 14:35 Lunch 14:35 - 16:35 Visit to the Domus apartment Thursday, October 16 9:00 - 9:50 Martti Vainio: Phonetics and Machine Learning: Hierarchical Modelling of Prosody in Statistical Speech Synthesis - Invited Lecture 9:50 - 10:05 Break 10:05 - 11:20 G?bor Kiss and Kl?ra Vicsi: Physiological and Cognitive Status Monitoring on the Base of Acoustic-phonetic Speech Parameters Barbara Schuppler, Sebastian Grill, Andr? Menrath, and Juan A. Morales-Cordovilla: Automatic Phonetic Transcription in Two Steps: Forced Alignment and Burst Detection Mian Du, Matthew Pierce, Lidia Pivovarova, and Roman Yangarber: Supervised Classification using Balanced Training 11:20 - 11:50 Coffee Break 11:50 - 13:05 M?rius ?ajgal?k, Michal Barla, and M?ria Bielikov?: Exploring Multidimensional Continuous Feature Space to Extract Relevant Words Zhemin Zhu, Djoerd Hiemstra, and Peter Apers: Linear Co-occurrence Rate Networks (L-CRNs) for Sequence Labeling Th?odore Bluche, Hermann Ney, and Christopher Kermorvant: Handwriting Recognition with Deep and Recurrent Neural Networks 13:05 - 13:15 Closing --- Este mensaje no contiene virus ni malware porque la protecci?n de avast! Antivirus est? activa. http://www.avast.com From pmt6sbc at maths.leeds.ac.uk Thu Sep 25 23:00:55 2014 From: pmt6sbc at maths.leeds.ac.uk (S B Cooper) Date: Thu, 25 Sep 2014 22:00:55 +0100 (BST) Subject: [fg-arc] COMPUTABILITY IN EUROPE 2015: Evolving Computability, Bucharest, Romania, June 29-July 3 Message-ID: <201409252100.s8PL0tX7027805@maths.leeds.ac.uk> ---------------------------------------------------------------------------- P R E L I M I N A R Y A N N O U N C E M E N T COMPUTABILITY IN EUROPE 2015: Evolving Computability Bucharest, Romania June 29 - July 3 http://fmi.unibuc.ro/CiE2015/ ---------------------------------------------------------------------------- CiE 2015 is the 11-th conference organized by CiE (Computability in Europe), a European association of mathematicians, logicians, computer scientists, philosophers, physicists and others interested in new developments in computability and their underlying significance for the real world. Previous meetings have taken place in Amsterdam (2005), Swansea (2006), Siena (2007), Athens (2008), Heidelberg (2009), Ponta Delgada (2010), Sofia (2011), Cambridge (2012), Milan (2013) and Budapest (2014) CONFIRMED INVITED SPEAKERS Ann Copestake (University of Cambridge) Pawel Gawrychowski (Max-Planck-Institut fuer Informatik) Julia Knight (University of Notre Dame) Anca Muscholl (Universite Bordeaux) Gheorghe Paun (Romanian Academy) Alexander Razborov (University of Chicago and Steklov Mathematical Institute) Vlatko Vedral (University of Oxford) TUTORIAL SPEAKERS John Reif (Duke Unversity) Steve Simpson (Pennsylvania State University) SPECIAL SESSIONS on Representing streams (Organizers: Joerg Endrullis and Dimtri Hendriks) Automata, logic and infinite games (Organizers: Dietmar Berwanger and Ioana Leustean) Reverse mathematics (Organizers: Damir Dzhafarov and Alberto Marcone) Classical computability theory (Organizers: Marat Arslanov and Steffen Lempp) Bio-inspired computation (Organizers: Andrei Paun and Petr Sosik) History and philosophy of computing (Organizers: Christine Proust and Marco Benini) Evolution of the universe, and us within it, invite a parallel evolution in understanding. The CiE agenda - fundamental and engaged - targets the extracting and developing of computational models basic to current challenges. From the origins of life, to the understanding of human mentality, to the characterising of quantum randomness - computability theoretic questions arise in many guises. The CiE community, this coming year meeting for the first time in Bucharest, carries forward the search for coherence, depth and new thinking across this rich and vital field of research. In all cases we are looking for fundamental and theoretical submissions. In line with other conferences in this series, CiE 2015 has a broad scope and provides a forum for the discussion of theoretical and practical issues in Computability with an emphasis on new paradigms of computation and the development of their mathematical theory. We particularly invite papers that build bridges between different parts of the research community. The PROGRAMME COMMITTEE consists of: Marat Arslanov (Kazan), Jeremy Avigad (Pittsburgh), Veronica Becher (Buenos Aires), Arnold Beckmann (Swansea), Laurent Bienvenu (Paris), Gabriel Ciobanu (Bucharest), S Barry Cooper (Leeds), Laura Crosilla (Leeds), Liesbeth De Mol (Ghent), Walter Dean (Warwick), Volker Diekert (Stuttgart), Damir Dzhafarov (Storrs, Connecticut), Peter van Emde Boas (Amsterdam), Rachel Epstein (Harvard), Johanna Franklin (Storrs, Connecticut), Neil Ghani (Glasgow), Joel David Hamkins (New York), Rosalie Iemhoff (Utrecht), Emmanuel Jeandel (LORIA), Natasha Jonoska (Tampa, FL), Antonina Kolokolova (St.John's, NL), Antonin Kucera (Prague), Oliver Kutz (Bremen), Benedikt Loewe (Hamburg & Amsterdam), Jack Lutz (Ames, IA), Florin Manea (Kiel), Alberto Marcone (Udine), Radu Mardare (Aalborg), Joe Miller (Madison, WI), Russell Miller (Flushing, NY), Mia Minnes (La Jolla, CA), Victor Mitrana (Bucharest, co-chair), Dag Normann (Oslo), Ian Pratt-Hartmann (Manchester), Mehrnoosh Sadrzadeh (London), Anne Smith (St Andrews), Mariya Soskova (Sofia, co-chair), Paul Spirakis (Patras & Liverpool), Susan Stepney (York), Jacobo Toran (Ulm), Marius Zimand (Towson, MD). In a Call for Papers to be sent out in October 2014, the PC will invite all researchers in the area of the conference to submit their papers for presentation at CiE 2015. The best of the accepted papers will be published in the conference proceedings within the Lecture Notes in Computer Science (LNCS) series of Springer (tbc), which will be available at the conference. ____________________________________________________________________ CiE 2015 http://fmi.unibuc.ro/CiE2015/ ASSOCIATION COMPUTABILITY IN EUROPE http://www.computability.org.uk CiE Conference Series http://www.illc.uva.nl/CiE CiE Membership Application Form http://www.cs.swan.ac.uk/acie Computability (Journal of CiE) http://www.computability.de/journal/ CiE on FaceBook https://www.facebook.com/AssnCiE Association CiE on Twitter https://twitter.com/AssociationCiE From Gwen.Salaun at inria.fr Tue Sep 30 14:34:58 2014 From: Gwen.Salaun at inria.fr (Gwen.Salaun at inria.fr) Date: Tue, 30 Sep 2014 14:34:58 +0200 (CEST) Subject: [fg-arc] ACM SAC 2015: Software Verification and Testing Track - EXTENDED DEADLINES Message-ID: <201409301234.s8UCYw97002153@ubac.inrialpes.fr> ================================================== 30th Annual ACM Symposium on Applied Computing Software Verification and Testing Track April 13 - 17, 2015, Salamanca, Spain More information: http://fmt.cs.utwente.nl/conferences/sac-svt2015/ and http://www.acm.org/conferences/sac/sac2015/ =================================================== Important dates (EXTENDED) --------------- * October 10, 2014: Submission of regular papers * November 30, 2014: Notification of paper acceptance/rejection * December 15, 2014: Camera-ready copies of accepted papers NEW: --- A special issue of Science of Computer Programming has been confirmed. Selected papers will be invited for submission, and will be peer-reviewed according to the standard policy of Science of Computer Programming. ACM Symposium on Applied Computing ---------------------------------- The ACM Symposium on Applied Computing (SAC) has gathered scientists from different areas of computing over the past twenty-nine years. The forum represents an opportunity to interact with different communities sharing an interest in applied computing. SAC 2015 is sponsored by SIGAPP and will be held at the UNESCO world heritage city of Salamanca in Spain. Software Verification and Testing Track --------------------------------------- We invite authors to submit new results in formal verification and testing, as well as development of technologies to improve the usability of formal methods in software engineering. Also welcome are detailed descriptions of applications of mechanical verification to large scale software. Possible topics include, but are not limited to: - model checking - theorem proving - correct by construction development - model-based testing - verification-based testing - symbolic execution - static and run-time analysis - abstract interpretation - analysis methods for dependable systems - software certification and proof carrying code - fault diagnosis and debugging - verification of large scale software systems - real world applications and case studies applying software verification Submissions Guidelines ---------------------- Paper submissions must be original, unpublished work. Submissions should be in electronic format, via the START site: http://www.acm.org/conferences/sac/sac2015/Paper-SubmissionUploadPage.htm Author(s) name(s) and address(es) must not appear in the body of the paper, and self-reference should be avoided and made in the third person. Submitted paper will undergo a blind review process. Authors of accepted papers should submit an editorial revision of their papers that fits within six two-column pages (an extra two pages, to a total of eight pages, may be available at a charge). Please comply to this page limitation already at submission time. Accepted papers will be published in the ACM SAC 2015 proceedings. Paper registration is required, allowing the inclusion of the paper/poster in the conference proceedings. An author or a proxy attending SAC MUST present the paper. This is a requirement for the paper/poster to be included in the ACM/IEEE digital library. No-show of scheduled papers and posters will result in excluding them from the ACM/IEEE digital library. A special issue of Science of Computer Programming has been confirmed. Selected papers will be invited for submission, and will be peer-reviewed according to the standard policy of Science of Computer Programming. Student Research Competition ---------------------------- As before, SAC 2015 organises a Student Research Competition (SRC) Program to provide graduate students the opportunity to meet and exchange ideas with researchers and practitioners in their areas of interest. Guidelines and information about the SRC program can be found at http://www.acm.org/conferences/sac/sac2015/. Submission to the SRC program should be in electronic form via the following website http://www.acm.org/conferences/sac/sac2015/SRC-SubmissionUploadPage.htm Program Committee ----------------- Laura Brandan Briones, National University of Cordoba, Argentina Maximiliano Cristi?, Universidad Nacional de Rosario, Argentina Marco Faella, University of Naples, Italy Ylies Falcone, University of Grenoble Alpes, France Tingting Han, University of London, UK Fabrice Kordon, University Pierre et Marie Curie, France Stefan Leue, University of Konstanz, Germany Shaoying Liu, Hosei University, Japan Malte Lochau, Darmstadt University, Germany Annabelle McIver, Macquarie University, Australia Mercedes Merayo, Universidad Complutense de Madrid, Spain Dominique Mery, University of Lorraine, France Mohammad Mousavi, Halmstad University, Sweden Brian Nielsen, Aalborg University, Denmark Jun Pang, University of Luxembourg, Luxembourg Corina Pasareanu, NASA Ames, USA Wishnu Prasetya, Utrecht University, The Netherlands Marjan Sirjani, Reykjavik University, Iceland Hasan S?zer, ?zyegin University, Turkey Tanja Vos, Valencia University, Spain Anton Wijs, Eindhoven University of Technology, The Netherlands Liu Yang, Nanyang Technological University, Singapore Gianluigi Zavattaro, University of Bologna, Italy Lijun Zhang, Chinese Academy of Sciences, China Program Committee Chairs ----------------- Gwen Sala?n, University of Grenoble Alpes, France Marielle Stoelinga, University of Twente, Netherlands