From hasselbring at email.uni-kiel.de Tue Jan 6 16:31:04 2015 From: hasselbring at email.uni-kiel.de (Wilhelm (Willi) Hasselbring) Date: Tue, 06 Jan 2015 16:31:04 +0100 Subject: [fg-arc] SESoS 2015 - CFP Message-ID: <54ABFFB8.9010507@email.uni-kiel.de> CALL FOR PAPERS --------------- SESoS 2015 - Third International Workshop on Software Engineering for Systems-of-Systems http://sesos2015.icmc.usp.br/ at ICSE 2015 http://2015.icse-conferences.org/ Florence, Italy, May 17 2015 SCOPE ----- Systems-of-Systems (SoS) have become increasingly complex and are frequently used in highly distributed, dynamic, and open environments. SoS have emerged as a new class of evolving software systems, where constituent systems (themselves systems in their own right) work cooperatively in order to fulfill specific missions. SoS are characterized by managerial and operational independence, geographic distribution, evolutionary development, and creation of emergent behavior. These characteristics have raised substantial challenges to software engineering researchers and practitioners. SoS is becoming a hotspot, from both the research and the industrial viewpoints, in particular, related to crucial classes of applications such as safety-critical or mission-critical SoS. Furthermore, SoS are increasingly involved in applications that address societal needs such as environmental monitoring, distributed energy grids management, emergency coordination and crisis management, global tra! ffic control, and smart cities. Software engineering theories and tools are needed to adequately design, implement, operate, and even evolve such dynamic, complex software-intensive SoS. The main goal of SESoS is to provide a forum for software engineering researchers and practitioners to exchange ideas and experiences, analyze research and development issues, discuss promising solutions, and propose inspiring visions for the future. TOPICS ------ The workshop will focus on discussing and establishing the foundations for the SoS Software Engineering domain, to pave the way for a more structured community effort. The workshop includes, but is not limited to the following topics: - SoS Analysis & Architecture -Requirements engineering -Architectural description -Architectural evaluation -Architectural evolution - SoS Model-Based Engineering -Modeling and simulation -Model driven engineering -Models at runtime - SoS Construction and Evolution -Techniques and technologies -Service-orientation -Component frameworks -Evolutionary development - SoS Experience -Industrial perspectives -Case studies - SoS General Issues -Characteristics of SoS -Quality in SoS -SoS development processes -Acquisition and project management -Verification and validation of SoS - Future perspective, challenges, and directions of SoS research and/or development SUBMISSION ---------- Two types of submissions are invited: - Regular papers (up to seven pages): sound technical contributions from both academia and industry; and - Position papers (up to four pages): new ideas, positions, or perspectives of research that are not fully validated. All papers submitted to the workshop must be unpublished original work and must not be simultaneously under review or submitted elsewhere. All papers will be judged on the basis of their clarity, relevance, originality, and contribution. All submissions must be in English, formatted according to the ICSE 2015 Format and Submission Guidelines and submitted in PDF format through online upload to the workshop submission website at: http://sesos2015.icmc.usp.br/ PUBLICATION OF PAPERS --------------------- Accepted papers will become part of the workshop proceedings and published in the ICSE companion proceedings. IMPORTANT DATES --------------- Submission deadline: January 23, 2015 Notification: February 18, 2015 Camera-ready copy: February 27, 2015 Workshop date: May 17, 2015 WORKSHOP ORGANIZERS ------------------- Flavio Oquendo, IRISA ? Univ. of South Brittany, France Paris Avgeriou, University of Groningen, The Netherlands Carlos E. Cuesta, Rey Juan Carlos University, Spain Khalil Drira, LAAS-CNRS ? University of Toulouse, France Elisa Yumi Nakagawa and Jos? Carlos Maldonado, University of S?o Paulo, Brazil Andrea Zisman, The Open University, UK From cesar.a.munoz at nasa.gov Wed Jan 7 16:29:48 2015 From: cesar.a.munoz at nasa.gov (MUNOZ, CESAR (LARC-D320)) Date: Wed, 7 Jan 2015 15:29:48 +0000 Subject: [fg-arc] [fm-announcements] Postdoc Position Announcement Message-ID: POSTDOC POSITION ANNOUNCEMENT National Institute of Aerospace Software Assurance and Formal Methods The National Institute of Aerospace (NIA) has an opening for a postdoctoral Research Scholar to work in the research area of software assurance and formal methods in support of NASA's sponsored programs. The successful candidate will work with NASA and NIA researchers on one or more research topics centered on techniques and methods for preserving and improving the integrity of software and safety-critical systems of interest to NASA. Examples of these systems include separation assurance algorithms for air traffic management, concepts of operations for Next Generation Air Transportation (NextGen), fault-tolerant avionics systems, etc. The areas of interest within the research team include: * Formal verification of software intensive safety-critical systems. * Development of techniques and tools for formal verification. * Integration of formal verification tools into software development practice. * Design and analysis of operational procedures, algorithms and enabling technologies for air traffic control. Requirements: * PhD degree or equivalent in Computer Science, Mathematics, Electrical or Aerospace Engineering or closely related fields * Demonstrated research experience within the stated areas of interest. * Knowledge of at least one formal verification technique, e.g., theorem proving, model-checking, abstract interpretation, symbolic execution, etc. * Excellent oral and writing communication skills. Desired skills: * Familiarity with current challenges in formal specification and verification of cyber-physical systems, such as modeling of hybrid systems, numerical issues due to machine numbers, etc. * Familiarity with current challenges in application fields related to aerospace engineering, such as autonomy and authority, modeling and simulation, etc. APPLICATION INFORMATION Interested candidates should apply online via NIA's career opportunities site located at http://ch.tbe.taleo.net/CH12/ats/careers/apply.jsp?org=NIANET&cws=1&rid=164 Please include a letter of introduction, resume, and the names and contact information of three current references. Deadline: February 15, 20015 NIA, located near NASA Langley Research Center in Hampton, Virginia, is a non-profit research and graduate education institute created to perform aerospace and atmospheric research, develop new technologies for the nation, and help inspire the next generation of scientists and engineers. Additional information about NIA and its research programs is available at www.nianet.org. NIA ranked 12th in Top 50 Best Non-Profit Companies to work for in the U.S. NIA is an equal opportunity/affirmative action employer. Women, members of minority groups, individuals with disabilities and veterans are encouraged to apply. 12/2014 NIA CONTACT INFORMATION 100 Exploration Way Hampton, VA 23666, US (757)325-6700 info at nianet.org www.nianet.org --- To opt-out from this mailing list, send an email to fm-announcements-request at lists.nasa.gov with the word 'unsubscribe' as subject or in the body. You can also make the request by contacting fm-announcements-owner at lists.nasa.gov From pmt6sbc at maths.leeds.ac.uk Thu Jan 8 18:48:12 2015 From: pmt6sbc at maths.leeds.ac.uk (S B Cooper) Date: Thu, 8 Jan 2015 17:48:12 GMT Subject: [fg-arc] CiE 2015 in Bucharest - FINAL CALL FOR PAPERS and EXTENDED DEADLINE, 21 Jan, 2015 Message-ID: <201501081748.t08HmCM2016518@maths.leeds.ac.uk> ------------------------------------------------------------------------ CiE 2015: 3rd CfP - EXTENDED DEADLINE and BEST STUDENT PAPER AWARD ------------------------------------------------------------------------ FINAL CALL FOR PAPERS (incl. deadline extension due to popular demand) 3rd CALL FOR PAPERS: COMPUTABILITY IN EUROPE 2015: Evolving Computability Bucharest, Romania June 29 - July 3 http://fmi.unibuc.ro/CiE2015/ ************************************************************************ IMPORTANT DATES: EXTENDED Submission Deadline for LNCS: 21 January 2015 Notification of authors: 9 March 2015 Deadline for final revisions: 6 April 2015 ************************************************************************ CiE 2015 is the 11-th conference organized by CiE (Computability in Europe), a European association of mathematicians, logicians, computer scientists, philosophers, physicists and others interested in new developments in computability and their underlying significance for the real world. Previous meetings have taken place in Amsterdam (2005), Swansea (2006), Siena (2007), Athens (2008), Heidelberg (2009), Ponta Delgada (2010), Sofia (2011), Cambridge (2012), Milan (2013) and Budapest (2014) Evolution of the universe, and us within it, invite a parallel evolution in understanding. The CiE agenda - fundamental and engaged - targets the extracting and developing of computational models basic to current challenges. From the origins of life, to the understanding of human mentality, to the characterising of quantum randomness - computability theoretic questions arise in many guises. The CiE community, this coming year meeting for the first time in Bucharest, carries forward the search for coherence, depth and new thinking across this rich and vital field of research. In all cases we are looking for fundamental and theoretical submissions. In line with other conferences in this series, CiE 2015 has a broad scope and provides a forum for the discussion of theoretical and practical issues in Computability with an emphasis on new paradigms of computation and the development of their mathematical theory. We particularly invite papers that build bridges between different parts of the research community. For topics covered by the conference, please visit http://fmi.unibuc.ro/CiE2015/topics.html AWARDS: The best student paper award is presented to the author(s) of the best paper, as selected by the PC, written solely by student author(s). This award is sponsored by Springer. FUNDING OPPORTUNITIES: CiE 2015 has received funding from ASL (Association for Symbolic Logic) and EATCS (European Association for Theoretical Computer Science) that allows students who are members of ASL or EATCS and want to attend CiE 2015 to apply for travel funds or a reduction of the early registration fee. Preference will be given to presenters of accepted papers. Applications for ASL travel grants have to be addressed directly to ASL, with a strict deadline of March 28, 2015. Applications for EATCS travel grants have to be sent to cie2015 at fmi.unibuc.ro prior to the early registration deadline. TUTORIAL SPEAKERS * John Reif (Duke Unversity) * Steve Simpson (Pennsylvania State University) PLENARY SPEAKERS * Ann Copestake (University of Cambridge) * Mircea Dumitru (University of Bucharest, Public Lecture) * Pawel Gawrychowski (Max-Planck-Institut fuer Informatik) * Julia Knight (University of Notre Dame) * Anca Muscholl (Universite Bordeaux) * Gheorghe Paun (Romanian Academy) * Alexander Razborov (University of Chicago and Steklov Mathematical Institute) * Vlatko Vedral (University of Oxford) SPECIAL SESSIONS on * Representing streams (Organizers: Joerg Endrullis and Dimtri Hendriks) * Automata, logic and infinite games (Organizers: Dietmar Berwanger and Ioana Leustean) * Reverse mathematics (Organizers: Damir Dzhafarov and Alberto Marcone) * Classical computability theory (Organizers: Marat Arslanov and Steffen Lempp) * Bio-inspired computation (Organizers: Andrei Paun and Petr Sosik) * History and philosophy of computing (Organizers: Christine Proust and Marco Benini) The speakers of the special sessions may be find at http://fmi.unibuc.ro/CiE2015/sessions.html The PROGRAMME COMMITTEE consists of: * Marat Arslanov (Kazan) * Jeremy Avigad (Pittsburgh) * Veronica Becher (Buenos Aires) * Arnold Beckmann (Swansea) * Laurent Bienvenu (Paris) * Alessandra Carbone (Paris) * Gabriel Ciobanu (Iasi) * S Barry Cooper (Leeds) * Laura Crosilla (Leeds) * Liesbeth De Mol (Ghent) * Walter Dean (Warwick) * Volker Diekert (Stuttgart) * Damir Dzhafarov (Storrs,Connecticut) * Peter van Emde Boas (Amsterdam) * Rachel Epstein (Harvard) * Johanna Franklin (Hempstead, NY) * Neil Ghani (Glasgow) * Joel David Hamkins (New York) * Rosalie Iemhoff (Utrecht) * Emmanuel Jeandel (LORIA) * Natasha Jonoska (Tampa, FL) * Antonina Kolokolova (St.John's,NL) * Antonin Kucera (Prague) * Oliver Kutz (Magdeburg) * Benedikt Loewe (Hamburg & Amsterdam) * Jack Lutz (Ames, IA) * Florin Manea (Kiel) * Alberto Marcone (Udine) * Radu Mardare (Aalborg) * Joe Miller (Madison, WI) * Russell Miller (Flushing, NY) * Mia Minnes (La Jolla, CA) * Victor Mitrana (Bucharest, co-chair) * Ian Pratt-Hartmann (Manchester) * Dag Normann (Oslo) * Mehrnoosh Sadrzadeh (London) * Anne Smith (St Andrews) * Mariya Soskova (Sofia, co-chair) * Susan Stepney (York) * Paul Spirakis (Patras & Liverpool) * Jacobo Toran (Ulm) * Marius Zimand (Towson, MD) The PROGRAMME COMMITTEE cordially invites all researchers (European and non-European) in computability related areas to submit their papers (in PDF format, maximum 10 pages using the LNCS style) for presentation at CiE 2015. The submission site https://www.easychair.org/conferences/?conf=cie2015 is open. For submission instructions consult http://fmi.unibuc.ro/CiE2015/submission.html The CONFERENCE PROCEEDINGS will be published by LNCS, Springer Verlag. The CONFERENCE POSTER can be downloaded from http://fmi.unibuc.ro/CiE2015/images/CiE_Poster.jpg _____________________________________________________________________ CiE 2015 http://fmi.unibuc.ro/CiE2015 ASSOCIATION COMPUTABILITY IN EUROPE http://www.computability.org.uk CiE Conference Series http://www.illc.uva.nl/CiE CiE Membership Application Form http://www.lix.polytechnique.fr/CIE Computability (Journal of CiE) http://www.computability.de/journal CiE on FaceBook https://www.facebook.com/AssnCiE Association CiE on Twitter https://twitter.com/AssociationCiE From uwe.assmann at tu-dresden.de Sat Jan 10 16:54:51 2015 From: uwe.assmann at tu-dresden.de (Uwe Assmann) Date: Sat, 10 Jan 2015 16:54:51 +0100 Subject: [fg-arc] Startup-Call der SE+SWM 2015 (Deadline 15.1.) und "Meet the Door Opener" Message-ID: <54B14B4B.1030906@tu-dresden.de> Sehr geehrte Damen und Herren, ich schreiben Sie noch einmal an, um auf den Startup-Call der SE+SWM 2015 f?r den 19.-20.3.2015 aufmerksam zu machen. Bitte geben Sie den anh?ngenden Call ?ber Ihr Netzwerk, im Newsletter o.?. an Interessierte, Startups oder Startups-in-spe weiter. Deadline: 15.1.2015. Die Ziele des neuen Startup-Tracks der SE/SWM sind: a) durch ein interessantes Programm Startups mit Infos von erfahrenen Gr?ndern und Unternehmern weiterhelfen zu k?nnen b) etwas gegen die anf?ngliche, regionale Isolation von Startups zu tun. Da das anwesende Publikum der SE+SWM (es werden 250 Teilnehmer erwartet) aus allen Regionen Deutschlands stammt und vielen Kontakte in die IT-Netze hat, sollte es einem Startup m?glich sein, neue Kontakte in anderen Regionen Deutschlands finden, z.B. um weitere Vortr?ge oder Pitches in anderen Regionen halten zu k?nnen und somit die Chancen zu vergr??ern, Partner und Kunden zu finden. Zur Untersetzung von Ziel a) ist sind folgende Keynotes im Plenum geplant: - Fr. 20.3.11:00 Prof. August-Wilhelm Scheer, Scheer Group, "*Chancen f?r Startups f?r die Industrie 4.0*" (Teil des Startup-Programms) Prof. Scheer ist einer der erfahrendsten Gr?nder in Deutschlang (IDS Scheer) und betreibt in Saarbr?cken einen Inkubator - Do. 19.3.9:00 Prof. Bernd Br?gge, TU M?nchen, "Schnelle Prototypen f?r intelligente Kleidung" (Interessante Innovationen im IoT) - Do. 19.3.16:00 Prof. Gerhard Fettweis,TU Dresden "The Tactile Internet and the 5G Lab Germany" www.dresden5glab.org (Die Innovationswelle der 5. Generation Mobilfunk) Zur Untersetzung von Ziel b) plant Prof. Zeller f?r den Startup-Track eine interaktive Session "Meet the Door Opener". In dieser Session sollen sich mehrere IT-Netze vorstellen, und Startups sich im Anschluss vernetzen k?nnen. F?r diese Session suchen wir 3-5 IT-Netze, die sich den Startups vorstellen. W?re das etwas f?r Ihr Netzwerk? Bitte sprechen Sie Prof. Zeller oder mich an. Bitte helfen Sie mit, dass wir diese Ziele erreichen. Danke. mit freundlichen Gr??en Uwe A?mann General Chair -- ----------------------------------------------------------------------------- Visit SE/SWM 2015: http://swm2015.de/se-2015/program15 http://swm2015.de/organisation/anmeldung Startup-Track (still open): http://swm2015.de/se-2015/tracks/startup-se15 ----------------------------------------------------------------------------- Prof. Dr. Uwe A?mann mailto:uwe.assmann at tu-dresden.de Software Engineering Group tel:+49 351 463 38463 Institut f?r Software- und fax:+49 351 463 38459 Multimediatechnik http://st.inf.tu-dresden.de Fakult?t Informatik building: Noethnitzer Str. 46, 01307 Dresden Technische Universitat Dresden room/Zimmer: 2087, 2. Stock, West D-01062 Dresden ----------------------------------------------------------------------------- -------------- next part -------------- ?Call for Startup Pitches (Leiter Prof. Andreas Zeller) Aufruf zur Teilnahme und Pr?sentationen: Startup-Programm Software Engineering http://swm2015.de/se-2015/tracks/startup-se15 Ihre Forschung war erfolgreich. Jetzt k?nnten Sie was draus machen. Aber wie? Das Startup-Programm der Software Engineering 2015 bietet allen Firmengr?ndern und solchen, die es werden wollen, die Gelegenheit zum Austausch mit Gr?ndern, Forschern, und Startup-Beratern. 1. Startup-Track am 20.3.: Hochkar?tige Redner zu Startup-Gr?ndung, Finanzierung, und Innovationsmanagement aus der Hochschule heraus bieten wertvolle Hinweise und weitere M?glichkeiten der Vernetzung. Eine interaktive Session ?Meet the Door Opener? dient zum Vernetzen von Startups und IT-Netzwerken wie Silicon Saxony, zum Allozieren von weiteren Vortr?gen in den Netzwerken, zur Partner- und Kundengewinnung. 2. Wir bieten Software-Startups, und solchen, die es werden wollen, an, sich auf der Konferenz mit einem kurzen Pitch und einem Poster vorzustellen; einige ausgew?hlte Startups erhalten zudem Gelegenheit zu einem Kurzvortrag ?ber ihre bisherigen Erfahrungen. 3. Schwerpunktthema ist "Sichere Software f?r cyber-physikalische Systeme", um das sich mehrere Keynotes drehen: * Prof. August-Wilhelm Scheer, Scheer Group, "Chancen f?r Startups f?r die Industrie 4.0" * Prof. Bernd Br?gge, TU M?nchen, "Schnelle Prototypen f?r intelligente Kleidung" * Prof. Gerhard Fettweis,TU Dresden, "The 5G Lab Germany" www.dresden5glab.org Die Zahl der Pl?tze ist strikt limitiert. Wenn Sie sich pr?sentieren m?chten, bereiten Sie folgende Materialien vor: 1. Drei Folien (als PDF-Dokument), auf denen Sie folgendes skizzieren: a. Problem, Markt und Zielgruppe b. Ihre Probleml?sung c. Derzeitiger Stand (Team, Kunden, Finanzen, Firma, ?) 2. Zusammenfassung Ihres Vortrages mit Verweis (URL) auf Ihre Webpr?senz Ein Komitee aus Gr?ndern, Forschern, und Beratern wird aus allen Einreichungen ausw?hlen. Reichen Sie Ihren Pr?sentationsvorschlag bis zum 15.01.2015 als PDF wie folgt ein: 1. Gehen Sie zur Einreichungsseite https://easychair.org/conferences/?conf=se2015 und melden Sie sich an. 2. W?hlen Sie den Track ?SE 2015 Startup-Programm (SE-2015-STUP)? 3. Reichen Sie als ?Abstract? Ihre Zusammenfassung ein. 4. Reichen Sie als ?Paper? Ihre Vortragsfolien ein. From raoul.strackx at CS.KULEUVEN.BE Wed Jan 14 16:13:33 2015 From: raoul.strackx at CS.KULEUVEN.BE (Raoul Strackx) Date: Wed, 14 Jan 2015 16:13:33 +0100 Subject: [fg-arc] [ESSoS] Call for Participation Message-ID: <54B6879D.2050501@cs.kuleuven.be> === Call for Participation === Conference: International Symposium on Engineering Secure Software and Systems (ESSoS) Date: March 4 - 6, 2015 Venue: Milan, Italy Website: https://distrinet.cs.kuleuven.be/events/essos/2015/ Deadlines: January 25, 2015 (Early bird) In cooperation with: (pending) ACM SIGSAC and SIGSOFT and IEEE CS (TCSP). == Context and Motivation == Trustworthy, secure software is a core ingredient of the modern world. Hostile, networked environments, like the Internet, can allow vulnerabilities in software to be exploited from anywhere. To address this, high-quality security building blocks (e.g., cryptographic components) are necessary, but insufficient. Indeed, the construction of secure software is challenging because of the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies and the progress of attack vectors. Clearly, a strong need exists for engineering techniques that scale well and that demonstrably improve the software's security properties. == Goal and Setup == The goal of this symposium, which will be the seventh in the series, is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering. Being one of the few conference-level events dedicated to this topic, it explicitly aims to bridge the software engineering and security engineering communities, and promote cross-fertilization. The symposium will feature two days of technical program. In addition to academic papers, the symposium encourages submission of high-quality, informative industrial experience papers about successes and failures in security software engineering and the lessons learned. Furthermore, the symposium also accepts short idea papers that crisply describe a promising direction, approach, or insight. == Venue == ESSoS 2015 will take place in Milano, at Politecnico di Milano, the largest engineering and architecture university in Italy, with more than 39.000 students and 7 campuses. ESSoS will take place at the main campus of the university, located in Milan's "Citt? studi" (university neighborhood). Hotels conveniently located around the Politecnico di Milano have been reserved at preferential rates through our partner KC Travel. A range of accommodations will be available, together with any additional travel services you may require. Details will be posted soon to the ESSoS 2015 website. == Program == Complete overview of the program can be found at: https://distrinet.cs.kuleuven.be/events/essos/2015/programme.html = Tutorials = *Browser technology - essentials for securing the Web* Dr. Philippe De Ryck iMinds-DistriNet, KU Leuven *Effective security management: a tutorial on CVSS v3 and using case control studies to measure vulnerability risk* Luca Allodi & Fabio Massacci = Keynotes = *The botnet that would not die Keynote talk* Herbert Bos (VU Amsterdam) *The European Strategic Agenda for Research and Innovation in Cybersecurity* Afonso Ferreira (European Commission) *Rocco Mammoliti (Poste Italiane)* *Felix Lindner (Recurity Labs GmbH)* = Papers = *Re?thinking Kernelized MLS Database Architectures in the Context of Cloud?Scale Data Stores* Thuy Nguyen, Mark Gondree, Jean Khosalim and Cynthia Irvine. *Formal Verification of Liferay RBAC* Stefano Calzavara, Alvise Rabitti and Michele Bugliesi. *Improving reuse of access control policies using policy templates* Maarten Decat, Jasper Moeys, Bert Lagaisse and Wouter Joosen. *Are Your Training Datasets Still Relevant?* Kevin Allix, Tegawende Bissyande, Jacques Klein and Yves Le Traon. *Formal Verification of Privacy Properties in Electric Vehicle Charging* Marouane Fazouane, Henning Kopp, Rens W. van der Heijden, Daniel Le M?tayer and Frank Kargl. *The Heavy Tails of Vulnerability Exploitation* Luca Allodi. *A Security Ontology for Security Requirements Elicitation* Amina Souag, Camille Salinesi, Raul Mazo and Isabelle Comyn-Wattiau. *Learning how to Prevent Return-Oriented Programming Efficiently* David Pfaff, Sebastian Hack and Christian Hammer. *Producing Hook Placements To Enforce Expected Access Control Policies* Divya Muthukumaran, Nirupama Talele, Trent Jaeger and. *OMEN: Faster Password Guessing using Markov Models* Markus D?rmuth, Fabian Angelstorf, Claude Castelluccia and Daniele Perito. *Monitoring Database Access Constraints with an RBAC Metamodel: a Feasibility Study* Lars Hamann, Martin Gogolla and Karsten Sohr. *Idea: Optimising Multi-Cloud Application Deployments with Security Controls as Constraints* Philippe Massonet, Jesus Luna, Alain Pannetrat and Ruben Trapero. *Idea: Towards an Inverted Cloud* Raoul Strackx, Pieter Philippaerts and Fr?d?ric Vogels. *Idea: Benchmarking indistinguishability obfuscation - A candidate implementation* Sebastian Banescu, Mart?n Ochoa, Nils Kunze and Alexander Pretschner. *Idea: Unwinding based Model-Checking and Testing for Non-Interference on EFSMs* Mart?n Ochoa, Alexander Pretschner, Jorge Cuellar and Per Hallgren. *Idea: State-Continuous Transfer of State in Protected-Module Architectures* Raoul Strackx and Niels Lambrigts. = Demos = *MAVERIC: static analysis module for Mobile App security* (this demo will be presented as part of the industry keynote) Alessandro Armando, Gianluca Bocci, Giantonio Chiarelli, Gabriele Costa, Gabriele De Maglie, Rocco Mammoliti, and Alessio Merlo. Poste Italiane, U. of Genova, and FBK. *Joern analyser: discovering vulnerabilities via code property graph* Fabian Yamaguchi. University of Goettingen. *Open-Source Vulnerability Assessment in Composite Application Scenarios* Henrik Plate, Serena Ponta, and Antonino Sabetta. SAP SE. *Using Split Kernel to Make Kernel Hardening Practical* Anil Kurmus and Robby Zippel. IBM research. *The RACOMAT tool* Johannes Viehmann, Ketil Stolen, and Juergen Grossmann. Fraunhofer and SINTEF. *TESTREX: a Testbed for Repeatable Exploits* Stanislav Dashevskyi, Daniel Ricardo dos Santos, Fabio Massacci, and Antonino Sabetta. U. of Trento, FBK, and SAP SE. *A Pattern-driven and Model-Based Test Generation Toolchain for Web Vulnerability* Alexandre Vernotte, Bruno Legeard, and Fabien Peureux. FEMTO-ST CNSR and Smartesting R&D Center. *A Transitive Access Solution for Web Services* Worachet Uttha, Clara Bertolissi, and Silvio Ranise. LIF CNRS and FBK. = Doctoral Symposium = TBA Disclaimer: http://www.kuleuven.be/cwis/email_disclaimer.htm From raoul.strackx at cs.kuleuven.be Wed Jan 14 21:38:27 2015 From: raoul.strackx at cs.kuleuven.be (Raoul Strackx) Date: Wed, 14 Jan 2015 21:38:27 +0100 Subject: [fg-arc] [ESSoS] Call for Participation Message-ID: <54B6D3C3.7020209@cs.kuleuven.be> === Call for Participation === Conference: International Symposium on Engineering Secure Software and Systems (ESSoS) Date: March 4 - 6, 2015 Venue: Milan, Italy Website: https://distrinet.cs.kuleuven.be/events/essos/2015/ Deadlines: January 25, 2015 (Early bird) In cooperation with: (pending) ACM SIGSAC and SIGSOFT and IEEE CS (TCSP). == Context and Motivation == Trustworthy, secure software is a core ingredient of the modern world. Hostile, networked environments, like the Internet, can allow vulnerabilities in software to be exploited from anywhere. To address this, high-quality security building blocks (e.g., cryptographic components) are necessary, but insufficient. Indeed, the construction of secure software is challenging because of the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies and the progress of attack vectors. Clearly, a strong need exists for engineering techniques that scale well and that demonstrably improve the software's security properties. == Goal and Setup == The goal of this symposium, which will be the seventh in the series, is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering. Being one of the few conference-level events dedicated to this topic, it explicitly aims to bridge the software engineering and security engineering communities, and promote cross-fertilization. The symposium will feature two days of technical program. In addition to academic papers, the symposium encourages submission of high-quality, informative industrial experience papers about successes and failures in security software engineering and the lessons learned. Furthermore, the symposium also accepts short idea papers that crisply describe a promising direction, approach, or insight. == Venue == ESSoS 2015 will take place in Milano, at Politecnico di Milano, the largest engineering and architecture university in Italy, with more than 39.000 students and 7 campuses. ESSoS will take place at the main campus of the university, located in Milan's "Citt? studi" (university neighborhood). Hotels conveniently located around the Politecnico di Milano have been reserved at preferential rates through our partner KC Travel. A range of accommodations will be available, together with any additional travel services you may require. Details will be posted soon to the ESSoS 2015 website. == Program == Complete overview of the program can be found at: https://distrinet.cs.kuleuven.be/events/essos/2015/programme.html = Tutorials = *Browser technology - essentials for securing the Web* Dr. Philippe De Ryck iMinds-DistriNet, KU Leuven *Effective security management: a tutorial on CVSS v3 and using case control studies to measure vulnerability risk* Luca Allodi & Fabio Massacci = Keynotes = *The botnet that would not die Keynote talk* Herbert Bos (VU Amsterdam) *The European Strategic Agenda for Research and Innovation in Cybersecurity* Afonso Ferreira (European Commission) *Rocco Mammoliti (Poste Italiane)* *Felix Lindner (Recurity Labs GmbH)* = Papers = *Re?thinking Kernelized MLS Database Architectures in the Context of Cloud?Scale Data Stores* Thuy Nguyen, Mark Gondree, Jean Khosalim and Cynthia Irvine. *Formal Verification of Liferay RBAC* Stefano Calzavara, Alvise Rabitti and Michele Bugliesi. *Improving reuse of access control policies using policy templates* Maarten Decat, Jasper Moeys, Bert Lagaisse and Wouter Joosen. *Are Your Training Datasets Still Relevant?* Kevin Allix, Tegawende Bissyande, Jacques Klein and Yves Le Traon. *Formal Verification of Privacy Properties in Electric Vehicle Charging* Marouane Fazouane, Henning Kopp, Rens W. van der Heijden, Daniel Le M?tayer and Frank Kargl. *The Heavy Tails of Vulnerability Exploitation* Luca Allodi. *A Security Ontology for Security Requirements Elicitation* Amina Souag, Camille Salinesi, Raul Mazo and Isabelle Comyn-Wattiau. *Learning how to Prevent Return-Oriented Programming Efficiently* David Pfaff, Sebastian Hack and Christian Hammer. *Producing Hook Placements To Enforce Expected Access Control Policies* Divya Muthukumaran, Nirupama Talele, Trent Jaeger and. *OMEN: Faster Password Guessing using Markov Models* Markus D?rmuth, Fabian Angelstorf, Claude Castelluccia and Daniele Perito. *Monitoring Database Access Constraints with an RBAC Metamodel: a Feasibility Study* Lars Hamann, Martin Gogolla and Karsten Sohr. *Idea: Optimising Multi-Cloud Application Deployments with Security Controls as Constraints* Philippe Massonet, Jesus Luna, Alain Pannetrat and Ruben Trapero. *Idea: Towards an Inverted Cloud* Raoul Strackx, Pieter Philippaerts and Fr?d?ric Vogels. *Idea: Benchmarking indistinguishability obfuscation - A candidate implementation* Sebastian Banescu, Mart?n Ochoa, Nils Kunze and Alexander Pretschner. *Idea: Unwinding based Model-Checking and Testing for Non-Interference on EFSMs* Mart?n Ochoa, Alexander Pretschner, Jorge Cuellar and Per Hallgren. *Idea: State-Continuous Transfer of State in Protected-Module Architectures* Raoul Strackx and Niels Lambrigts. = Demos = *MAVERIC: static analysis module for Mobile App security* (this demo will be presented as part of the industry keynote) Alessandro Armando, Gianluca Bocci, Giantonio Chiarelli, Gabriele Costa, Gabriele De Maglie, Rocco Mammoliti, and Alessio Merlo. Poste Italiane, U. of Genova, and FBK. *Joern analyser: discovering vulnerabilities via code property graph* Fabian Yamaguchi. University of Goettingen. *Open-Source Vulnerability Assessment in Composite Application Scenarios* Henrik Plate, Serena Ponta, and Antonino Sabetta. SAP SE. *Using Split Kernel to Make Kernel Hardening Practical* Anil Kurmus and Robby Zippel. IBM research. *The RACOMAT tool* Johannes Viehmann, Ketil Stolen, and Juergen Grossmann. Fraunhofer and SINTEF. *TESTREX: a Testbed for Repeatable Exploits* Stanislav Dashevskyi, Daniel Ricardo dos Santos, Fabio Massacci, and Antonino Sabetta. U. of Trento, FBK, and SAP SE. *A Pattern-driven and Model-Based Test Generation Toolchain for Web Vulnerability* Alexandre Vernotte, Bruno Legeard, and Fabien Peureux. FEMTO-ST CNSR and Smartesting R&D Center. *A Transitive Access Solution for Web Services* Worachet Uttha, Clara Bertolissi, and Silvio Ranise. LIF CNRS and FBK. = Doctoral Symposium = TBA Disclaimer: http://www.kuleuven.be/cwis/email_disclaimer.htm From jeremy.gibbons at cs.ox.ac.uk Fri Jan 16 07:49:34 2015 From: jeremy.gibbons at cs.ox.ac.uk (Jeremy Gibbons) Date: Fri, 16 Jan 2015 12:19:34 +0530 Subject: [fg-arc] Two research assistantships in model-driven engineering and semantic technologies, University of Oxford Message-ID: We have two positions open in the Programming Languages and Software Engineering Research Group, for research assistants (postdocs) in model-driven engineering and semantic technologies. The positions are associated with the EU-funded ?ALIGNED: Quality-Centric Software and Data Engineering? project, working with Jim Davies and Jeremy Gibbons. The primary selection criteria are strong design and development skills in object-oriented and functional programming, representation and manipulation of semi-structured data, and model transformation, together with a proven track record of relevant publications. Applicants should have a PhD in Computer Science. Full details are at http://www.cs.ox.ac.uk/news/869-full.html and the closing date is 12 noon GMT on 9th February. Please contact me if you have any questions about the positions, and please distribute this notice to anyone who may be interested. Jeremy and Jim Jeremy.Gibbons at cs.ox.ac.uk Oxford University Department of Computer Science, Wolfson Building, Parks Road, Oxford OX1 3QD, UK. ? +44 1865 283521 http://www.cs.ox.ac.uk/people/jeremy.gibbons/ From Muzaffar.Igamberdiev at unisa.edu.au Fri Jan 16 00:25:24 2015 From: Muzaffar.Igamberdiev at unisa.edu.au (Muzaffar Igamberdiev (IEE)) Date: Thu, 15 Jan 2015 23:25:24 +0000 Subject: [fg-arc] EDOC 2015 - 2nd Call for Workshop Proposals Message-ID: <56897632a3df4f31a796a48fa7015f8d@ITUPW-EXMBOX3A.UniNet.unisa.edu.au> Call for Workshop Proposals Following the tradition of previous conferences, EDOC 2015 (www.edocconference.org) plans to host a number of workshops alongside the main conference. The workshops will provide a collaborative forum for a group of typically 15 to 30 participants to exchange recent and/or preliminary results, to conduct intensive discussions on a particular topic, or to coordinate efforts between representatives of a technical community. They are intended as a forum for lively discussion of innovative ideas, recent progress, or practical approaches and applications. Each workshop should provide a balanced distribution of its time for both presentation of papers and discussions. We encourage prospective workshop organizers to submit proposals for highly-interactive workshops focusing on areas related to enterprise computing in general. Both research-oriented and applied topics are welcome. Important Dates Workshop Proposal Deadline: January 26, 2015 Workshop Proposal Notification: February 16, 2015 Workshop Paper Submission: April 27. 2015 Workshop Acceptance: June 15, 2015 Workshop Camera Ready: July 4, 2015 Please note that the above dates, when provided, will be common across all workshops. Workshop Proposal Guidelines Your proposal document must contain the following information: 1. Title of the workshop 2. Proposed duration of the workshop 3. Name, affiliation, and e-mail addresses of the workshop chairs 4. Extended abstract (about 500-1000 words; approximately 1-2 pages) of the workshop, explaining importance of the workshop topics, fit within and complementarity with the EDOC 2011 conference, intended audience, and other relevant issues that are not adequately covered in the preliminary Call for Papers 5. Preliminary Call for Papers (not all Program Committee members have to be confirmed at the workshop proposal submission time, although it is certainly beneficial to have some preliminary acceptances) 6. Information about distribution channels (e.g., list-servs) that will be used for advertising the workshop 7. History of the workshop (if it was held before) with some statistics of the size of the workshops (i.e., how many papers were presented) 8. Short biographies (about 200 words each) of all workshop chairs, including information about past experience in organizing/chairing conferences and workshops. Submissions Please ensure that you adhere to the above workshop proposal guidelines providing all requested information using at most six pages. In addition, please provide a one page draft of your planned Call for Papers to the proposal (not included in the six pages). Submit your workshop proposal electronically in PDF using the Springer LNCS style. The proposal must be submitted as a PDF file to the workshop committee chairs. Proceedings Workshop papers will be published in a second volume of the EDOC 2015 conference proceedings. Details will be communicated to the organizers of accepted workshops at the time of notification. Workshop Committee Chairs Jens Kolb, Ulm University, Germany, jens.kolb at uni-ulm.de Barbara Weber, University of Innsbruck, Austria, barbara.weber at uibk.ac.at For further information, please send an email to the workshop committee chairs. -------------- next part -------------- An HTML attachment was scrubbed... URL: From sren at cis.fiu.edu Mon Jan 19 21:18:06 2015 From: sren at cis.fiu.edu (Shaolei Ren) Date: Mon, 19 Jan 2015 15:18:06 -0500 Subject: [fg-arc] Fwd: ICAC 2015, Call for Papers In-Reply-To: References: Message-ID: [Sorry for multiple/cross postings.] =========================================== ICAC 2015 Call for Papers *http://icac2015.imag.fr * *12th International Conference on Autonomic Computing (ICAC 2015)* Grenoble, France, July 7-10, 2015 In cooperation with USENIX and SPEC Corporate supporters: Google, HP Labs, Orange Labs _________________________________________________________________ IMPORTANT DATES Paper Submission: *January 29, 2015 (Extended!!)* Author Notification: April 10, 2015 Final Manuscript: May 1, 2015 ___________________________________________________________________ SCOPE AND TOPICS ICAC is the leading conference on autonomic computing techniques, foundations, and applications. Large-scale systems of all types, such as data centers, compute clouds, smart cities, cyber-physical systems, sensor networks, and embedded or pervasive environments, are becoming increasingly complex and burdensome for people to manage. Achieving self-management requires and motivates research that spans a wide variety of scientific and engineering disciplines, including distributed systems, artificial intelligence, machine learning, modeling, control theory, optimization, planning, decision theory, user interface design, data management, software engineering, emergent behavior analysis, and bio-inspired computing. Topics of interest include, but are not limited to: * Self-managing components, such as compute, storage, networking devices, embedded and real time systems, and mobile devices. * AI and mathematical techniques, such as machine learning, control theory, operations research, probability and stochastic processes, queueing theory, rule-based systems, bio-inspired techniques. * End-to-end design and implementation of systems for management of resources, workloads, scalability, availability, performance, reliability, power/cooling, and security. * Monitoring components and platforms for autonomic systems in IT or cyber-physical environments. * Hypervisors, operating systems, middleware, and application support for autonomic computing. * Novel human interfaces for monitoring and controlling autonomic systems. * Goal specification and policies, IT governance, and business-driven IT management. * Frameworks, architectures, toolkits (from software engineering practices and to agent-based techniques). * Automated management techniques for emerging applications, systems, and platforms, including social networks, cloud computing, big data systems, multi-core servers, smart cities, and cyber-physical systems. * Fundamental science and theory of self-managing systems * Self-organization and emergent behavior in technical systems trustworthy self-organizing systems. * Infrastructures and architectures for organic computing systems. * Online self-integration of complex systems. * Applications of autonomic computing and experiences with prototyped or deployed systems solving real-world problems in science, engineering, business, or society. Paper Submission All papers must represent original and unpublished work that is not currently under review. Papers will be judged on originality, significance, interest, correctness, clarity, and relevance to the broader community. Papers are strongly encouraged to report on experiences, measurements, user studies, and provide an appropriate quantitative evaluation if at all possible. At least one author of each accepted paper is expected to attend the conference. Papers can be submitted in one of the following three categories with different acceptance criteria for each category: * Full research papers limited to 10 pages (double column) * Experience papers limited to 8 pages (double column) * Short papers limited to 6 pages (double column) Papers must be submitted electronically in PDF format through the ICAC 2015 submission site: EasyChair https://easychair.org/conferences/?conf=icac2015 See conference website for format instructions. ORGANIZATION General Chairs * Philippe Lalanda, University of Grenoble, France * Ada Diaconescu, Telecom ParisTech, France Program Committee Co-Chairs * Lucy Cherkasova, HP Labs, USA * Samuel Kounev, University of Wuerzburg, Germany Workshop Chair * Eric Rutten, INRIA Grenoble Rhone-Alpes, France Publicity Co-Chairs * Ningfang Mi, Northeastern University, USA * David Carrera, UPC-BarcelonaTech & Barcelona Supercomputing Center, Spain * Shaolei Ren, Florida International University, USA * Jorge Villalobos, Universidad de Los Andes, Colombia Finance Chair * Vincent Lestideau, University of Grenoble, France Proceedings Chair * Sonia Ben Mokhtar, INSA de Lyon, France Poster Chair * Marin Litoiu, York University, Canada Local Arrangements Chair * Stephanie Chollet, Grenoble INP, France Web Chair * Vincent Lestideau, University of Grenoble, France Program Committee * Tarek Abdelzaher, University of Illinois at Urbana-Champaign, USA * Artur Andrzejak, Heidelberg University, Germany * Danilo Ardagna, Politecnico di Milano, Italy * Novella Bartolini, University of Rome "Sapienza?, Italy * Christian Becker, University of Mannheim, Germany * Kirstie Bellman, The Aerospace Corporation, USA * Sonia Ben Mokhtar, LIRIS-CNRS, France * Andre Bottaro, Orange Labs, France * Giacomo Cabri, Universita di Modena e Reggio Emilia, Italy * David Carrera, UPC - BarcelonaTech and BSC, Spain * Giuliano Casale, Imperial College London, UK * Claris Castillo, Renaissance Computing Institute, USA * Lydia Chen, IBM Zurich, Switzerland * Yuxin Diao, IBM Research, USA * Elisabetta Di Nitto, Politecnico di Milano, Italy * Jose Fortes, University of Florida, USA * Daniel Gmach, HP Labs, USA * Rean Griffith, VMware, USA * Ashvin Goel, University of Toronto, Canada * Xiaohui Gu, North Carolina State University, USA * Indranil Gupta, UIUC, USA * Yuxiong He, Microsoft Research, USA * Alexandru Iosup, Delft University of Technology, The Netherlands * Vana Kalogeraki, Athens University of Economics and Business, Greece * Evangelia Kalyvianaki, City University London, UK * Fabio Kon, University of Sao Paulo, Brasil * Michael Kozuch, Intel, USA * Jayaram K.R., IBM Research, USA * Diwakar Krishnamurthy, University of Calgary, Canada * Marin Litoiu, York University, Canada * Julie McCann, Imperial College London, UK * Arif Merchant, Google, USA * Ningfang Mi, Northeastern University, USA * Dejan Milojicic, HP Labs, USA * Christian Mueller-Schloer, Leibniz Universitaet Hannover, Germany * Calton Pu, Georgia Institute of Technology, USA * Christian Plessl, University of Paderborn, Germany * Shaolei Ren, Florida International University, USA * Eric Rutten, INRIA, France * Kai Sachs, SAP, Germany * Hartmut Schmeck, Karlsruhe Institute of Technology, Germany * Onn Shehory, IBM Research Haifa, Israel * Karsten Schwan, Georgia Institute of Technology, USA * Evgenia Smirni, College of William and Mary, USA * Christopher Stewart, Ohio State University, USA * Vanish Talwar, HP Labs, USA * Sven Tomforde, University of Augsburg, Germany * Jordi Torres, Barcelona Supercomputing Center, Spain * Jim Torresen, University of Oslo, Norway * Timothy Wood, George Washington University, USA * Rolf Wuertz, Ruhr-Universitaet Bochum, Germany * Dongyan Xu, Purdue University, USA * Xin Yao, University of Birmingham, UK * Ming Zhao, Florida International University, USA * Xiaobo Zhou, University of Colorado, USA * Xiaoyun Zhu, VMware, USA -- ------------------------------------------------------------------------- Shaolei Ren Assistant Professor School of Computing and Information Sciences Florida International University Miami, FL 33199, United States E-mail: sren at cs.fiu.edu Phone: (305) 348-2032 Homepage: http://www.cs.fiu.edu/~sren/ ------------------------------------------------------------------------- -------------- next part -------------- An HTML attachment was scrubbed... URL: From grlmc at urv.cat Sat Jan 17 16:23:10 2015 From: grlmc at urv.cat (GRLMC) Date: Sat, 17 Jan 2015 16:23:10 +0100 Subject: [fg-arc] BigDat 2015: early registration deadline 23 January Message-ID: *To be removed from our mailing list, please respond to this message with UNSUBSCRIBE in the subject line* ***************************************************** INTERNATIONAL WINTER SCHOOL ON BIG DATA BigDat 2015 Tarragona, Spain January 26-30, 2015 Organized by Rovira i Virgili University http://grammars.grlmc.com/bigdat2015/ ***************************************************** --- Early registration deadline: January 23, 2015 --- ***************************************************** AIM: BigDat 2015 is a research training event for graduates and postgraduates in the first steps of their academic career. It aims at updating them about the most recent developments in the fast developing area of big data, which covers a large spectrum of current exciting research, development and innovation with an extraordinary potential for a huge impact on scientific discoveries, medicine, engineering, business models, and society itself. Renowned academics and industry pioneers will lecture and share their views with the audience. All big data subareas will be displayed, namely: foundations, infrastructure, management, search and mining, security and privacy, and applications. Main challenges of analytics, management and storage of big data will be identified through 4 keynote lectures, 22 six-hour courses, and 1 round table, which will tackle the most lively and promising topics. The organizers believe outstanding speakers will attract the brightest and most motivated students. Interaction will be a main component of the event. ADDRESSED TO: Graduate and postgraduates from around the world. There are no formal pre-requisites in terms of academic degrees. However, since there will be differences in the course levels, specific knowledge background may be required for some of them. BigDat 2015 is also appropriate for more senior people who want to keep themselves updated on recent developments and future trends. They will surely find it fruitful to listen and discuss with major researchers, industry leaders and innovators. REGIME: In addition to keynotes, 3 courses will run in parallel during the whole event. Participants will be able to freely choose the courses they will be willing to attend as well as to move from one to another. VENUE: BigDat 2015 will take place in Tarragona, located 90 kms. to the south of Barcelona. The venue will be: Campus Catalunya Universitat Rovira i Virgili Av. Catalunya, 35 43002 Tarragona KEYNOTE SPEAKERS: Ian Foster (Argonne National Laboratory), Taming Big Data: Accelerating Discovery via Outsourcing and Automation Geoffrey C. Fox (Indiana University, Bloomington), Mapping Big Data Applications to Clouds and HPC C. Lee Giles (Pennsylvania State University, University Park), Scholarly Big Data: Information Extraction and Data Mining William D. Gropp (University of Illinois, Urbana-Champaign), Using MPI I/O for Big Data COURSES AND PROFESSORS: Hendrik Blockeel (KU Leuven), [intermediate] Decision Trees for Big Data Analytics Diego Calvanese (Free University of Bozen-Bolzano), [introductory/intermediate] End-User Access to Big Data Using Ontologies Jiannong Cao (Hong Kong Polytechnic University), [introductory/intermediate] Programming with Big Data Edward Y. Chang (HTC Corporation, New Taipei City), [introductory/advanced] Big Data Analytics: Architectures, Algorithms, and Applications Ernesto Damiani (University of Milan), [introductory/intermediate] Process Discovery and Predictive Decision Making from Big Data Sets and Streams Gautam Das (University of Texas, Arlington), [intermediate/advanced] Mining Deep Web Repositories Maarten de Rijke (University of Amsterdam), tba Geoffrey C. Fox (Indiana University, Bloomington), [intermediate] Using Software Defined Systems to Address Big Data Problems Minos Garofalakis (Technical University of Crete, Chania) [intermediate/advanced], Querying Continuous Data Streams Vasant G. Honavar (Pennsylvania State University, University Park) [introductory/intermediate], Learning Predictive Models from Big Data Tao Li (Florida International University, Miami), [introductory/intermediate] Data Mining Techniques to Understand Textual Data Kwan-Liu Ma (University of California, Davis), [intermediate] Big Data Visualization Christoph Meinel (Hasso Plattner Institute, Potsdam), [introductory/intermediate] New Computing Power by In-Memory and Multicore to Tackle Big Data Manish Parashar (Rutgers University, Piscataway), [intermediate] Big Data Challenges in Simulation-based Science Srinivasan Parthasarathy (Ohio State University, Columbus), [intermediate] Scalable Data Analysis Evaggelia Pitoura (University of Ioannina), [introductory/intermediate] Online Social Networks Vijay V. Raghavan (University of Louisiana, Lafayette), [introductory/intermediate] Visual Analytics of Time-evolving Large-scale Graphs Pierangela Samarati (University of Milan), [intermediate], Data Security and Privacy in the Cloud Peter Sanders (Karlsruhe Institute of Technology), [introductory/intermediate] Algorithm Engineering for Large Data Sets Johan Suykens (KU Leuven), [introductory/intermediate] Fixed-size Kernel Models for Big Data Domenico Talia (University of Calabria, Rende), [intermediate] Scalable Data Mining on Parallel, Distributed and Cloud Computing Systems Jieping Ye (Arizona State University, Tempe), [introductory/advanced] Large-Scale Sparse Learning and Low Rank Modeling ORGANIZING COMMITTEE: Adrian Horia Dediu (Tarragona) Carlos Mart?n-Vide (Tarragona, chair) Florentina Lilica Voicu (Tarragona) REGISTRATION: It has to be done at http://grammars.grlmc.com/bigdat2015/registration.php The selection of up to 8 courses requested in the registration template is only tentative and non-binding. For the sake of organization, it will be helpful to have an approximation of the respective demand for each course. Since the capacity of the venue is limited, registration requests will be processed on a first come first served basis. The registration period will be closed and the on-line registration facility disabled when the capacity of the venue will be complete. It is much recommended to register prior to the event. FEES: As far as possible, participants are expected to stay full-time. Fees are a flat rate covering the attendance to all courses during the week. There are several early registration deadlines. Fees depend on the registration deadline. ACCOMMODATION: Suggestions of accommodation are available on the webpage. CERTIFICATE: Participants will be delivered a certificate of attendance. QUESTIONS AND FURTHER INFORMATION: florentinalilica.voicu at urv.cat POSTAL ADDRESS: BigDat 2015 Lilica Voicu Rovira i Virgili University Av. Catalunya, 35 43002 Tarragona, Spain Phone: +34 977 559 543 Fax: +34 977 558 386 ACKNOWLEDGEMENTS: Universitat Rovira i Virgili --- Este mensaje no contiene virus ni malware porque la protecci?n de avast! Antivirus est? activa. http://www.avast.com From mail at ansgarscherp.net Tue Jan 20 20:11:43 2015 From: mail at ansgarscherp.net (Ansgar Scherp) Date: Tue, 20 Jan 2015 20:11:43 +0100 Subject: [fg-arc] 1. CfP DOKTORANDENPROGRAMM der INFORMATIK 2015 in Cottbus / 1st CfP Doctoral Programme of INFORMATIK 2015 Message-ID: <54BEA86F.50303@ansgarscherp.net> CfP - Aufruf zum DOKTORANDENPROGRAMM der INFORMATIK 2015 in Cottbus [Note: English Version below!] === Aufruf zum DOKTORANDENPROGRAMM der INFORMATIK 2015 === === am 1. und 2. Oktober 2015 === === im Rahmen der INFORMATIK 2015 vom 28.09.-02.10.2015 in Cottbus === === siehe http://informatik2015.de/doktoranden0.html === Das Doktorandenprogramm der INFORMATIK 2015 erlaubt jungen Forschern und Forscherinnen ihr Thema in einem Vortrag oder als Poster einem breiten Publikum vorzustellen. Es gibt den DoktorandInnen au?erdem die M?glichkeit sich mit anderen Forschern und Doktoranden auszutauschen, gegenseitige Kontakte zu kn?pfen, Probleme und deren L?sungswege zu diskutieren und R?ckmeldungen von promovierten WissenschaftlerInnen und ProfessorInnen auf verwandten Forschungsgebieten zu erhalten. Neben den wissenschaftlichen Pr?sentationen und Diskussionen steht daher im Doktorandenprogramm der pers?nliche Kontakt und Austausch mit erfahrenen Forschern im Vordergrund. Die eingereichten Beitr?ge werden nach den Kriterien Relevanz, Innovation und Interesse f?r ein gr??eres Publikum bewertet und bei Annahme entweder als Vortrag oder im Rahmen einer Poster-Session pr?sentiert. Einreichungen erbitten wir in L?nge von 10-12 Seiten gem?? den Formatierungsrichtlinien der INFORMATIK (das hei?t im LNI-Format, http://www.gi.de/service/publikationen/autorenrichtlinien.html). Neben einer inhaltlichen Fokussierung der Einreichung ist auch die Einbettung in das ?bergeordnete Thema der Dissertation auf 1-2 Seiten zu beschreiben. Zudem sind auch Einreichungen als Kurzbeitr?ge der L?nge von 4-6 Seiten m?glich. Diese werden im Rahmen der Postersession am Donnerstag pr?sentiert. Eine Einbettung in das ?bergeordnete Thema ist f?r Kurzbeitr?ge nicht erforderlich. Im Sinne eines Doktorandenkolloquiums wird ausdr?cklich gebeten, dass die Beitr?ge in Alleinautorenschaft der Doktoranden erstellt werden. Die akzeptierten Beitr?ge m?ssen von den Doktoranden als Vortrag beziehungsweise als Poster pr?sentiert werden. Die Poster werden gemeinsam mit den Postern der GI Jahrestagung sowie den Postern des Studierendenprogramms der GI Jahrestagung vorgestellt. Auf Wunsch k?nnen die Doktoranden zudem an einem Mentorenprogramm teilnehmen, bei dem f?r das Thema passende erfahrene Forscher ausgesucht und f?r ein pers?nliches Gespr?ch zur Verf?gung stehen. Interesse an der Teilnahme an diesem Programm kann bei der Einreichung der Beitr?ge angegeben werden. Das Mentorenprogramm erfolgt vorbehaltlich einer hinreichenden Passgenauigkeit verf?gbarer erfahrener Forscher und wird rechtzeitig bekannt gegeben. Am 2. Oktober wird zudem ein Promotionsworkshop mit eingeladenen Vortr?gen zum Thema "Wie promoviere ich?" angeboten. Dieser Workshop ist offen f?r alle interessierte Forscher und Forscherinnen der INFORMATIK 2015. ** Wichtige Daten ** - Einreichung der Beitr?ge: 20. April 2015 - Benachrichtigung zur Begutachtung: 18. Mai 2015 - Einreichung der finalen Version: 22. Juni 2015 - Vortr?ge: 1. Oktober 2015 - Vorstellung der Poster: 1. Oktober 2015 - Mentorenprogramm: am 1. Oktober 2015 ** Informationen zur Einreichung ** * Umfang und Gestaltung der Vollbeitr?ge: - 10-12 Seiten (gem?? den Formatierungsrichtlinien der INFORMATIK im LNI-Format). - Beitr?ge sollen einen thematischen Fokus haben sowie auf 1-2 Seiten die Einbettung in das ?bergeordnete Thema der Dissertation beschreiben. * Umfang und Gestaltung der Kurzbeitr?ge: - 4-6 Seiten (gem?? den Formatierungsrichtlinien der INFORMATIK im LNI-Format). - Beitr?ge sollen einen thematischen Fokus haben. Eine Einbettung in das ?bergeordnete Thema der Dissertation ist nicht notwendig. * Beitr?ge k?nnen in Deutsch oder Englisch (bevorzugt!) eingereicht werden. * Akzeptierte Vollbeitr?ge werden entweder als Vortrag oder Poster-Pr?sentation vorgestellt. Akzeptierte Kurzbeitr?ge werden als Poster pr?sentiert. * Einreichung von Beitr?gen erfolgt ?ber ConfTool der INFORMATIK 2015. ** SKILL ** Ich darf zudem auf die Studierendenkonferenz der INFORMATIK 2015 (SKILL 2015) aufmerksam machen. Die SKILL 2015 richtet sich an alle Studentinnen und Studenten der Informatik sowie angrenzender Disziplinen mit dem Schwerpunkt Informatik. Sie findet ebenfalls am 1. und 2. Oktober 2015 statt. Die Einreichungsfrist ist der 13. April 2015. Aktuelle Informationen finden Sie auf der Webseite der SKILL 2015 unter http://skill.informatik.uni-leipzig.de. ** Leitung des Doktorandenprogramms ** - Ansgar Scherp, Leibniz-Informationszentrum Wirtschaft und Universit?t zu Kiel - Heinrich T. Vierhaus, BTU Cottbus - Steffen Becker, TU Chemnitz --- CfP - Call for Participation to the Doctoral Programme of INFORMATIK 2015 === Call for DOCTORAL PROGRAMME of INFORMATIK 2015 === === to be held during October 1-2, 2015 === === at INFORMATIK 2015 from September 28 to October 2, 2015 in Cottbus, Germany === === details: http://informatik2015.de/doktoranden0.html === The doctoral programme of INFORMATIK 2015 allows young researchers to present his or her topic to a broader audience. Accepted submissions will be presented either as oral presentation or poster. In addition, the doctoral programme allows the researchers to exchange experiences with other students, build contacts, discuss problems and solutions, and receive feedback from senior researchers in related research areas. Thus, focus of the doctoral programme is besides scientific presentations and discussions also the possibility for socializing with researchers in related fields and getting feedback from experienced researchers. The doctoral programme is held in conjunction with the 45th annual meeting of the German Informatics Society (Gesellschaft f?r Informatik e.V. (GI)). Submitted papers are evaluated by relevance, innovation, and interest for a larger audience. We expect full paper submissions of 10-12 pages adhering to the formatting guidelines of INFORMATIK (i.e., GI LNI format, http://www.gi.de/service/publikationen/autorenrichtlinien.html). The papers should be focused on a particular research question as well as provide a 1-2 page description of the broader topic of the dissertation. In addition, we accept short papers of 4-6 pages. They are presented during the poster session on Thursday. A description of the broader topic of the dissertation is not required for short paper submissions. In terms of a doctoral programme, we kindly ask that the papers are authored and submitted by the doctoral students being the only author. Accepted papers are to be presented by the doctoral students either as oral presentation or poster. The posters will be presented together with the posters of the annual GI meeting and the posters of the students programme. Interested students can sign up for a mentoring programme. The organizers will select experienced researchers and assign slots for a personal coaching. Expression of interest to the mentoring programme can be done when submitting the papers. The mentoring programme is offered under the condition of proper fit to the topic and availability of experienced researchers. It will be given due notice. On October 2, there will be an additional PhD workshop on "How to accomplish a Phd study?". This workshop is open to all interested researchers attending INFORMATIK 2015. ** Important Dates ** Submission of papers April 20, 2015 Notification: May 18, 2015 Camera ready version: June 22, 2015 Presentations: October 1, 2015 Poster session: October 1, 2015 Mentoring programme: October 1, 2015 ** Details about the submission: ** * Full papers: - 10-12 pages (according to formatting guidelines of INFORMATIK in LNI format) - Submissions are expected to focus on a research question as well as describe on 1-2 pages the context of the dissertation * Short papers: - 4-6 pages (according to formatting guidelines of INFORMATIK in LNI format) - Submissions are expected to focus on a research question. Description of the broader context of the dissertation is not required. * Submissions in English are preferred, other submission language is German * Accepted submissions are either presented in oral (full papers) or as poster (full papers/short papers). * Submissions are handled through ConfTool of INFORMATIK 2015. ** Organizers of the Doctoral Programme ** - Ansgar Scherp, Leibniz Information Center for Economics, Kiel and Kiel University, Germany - Heinrich T. Vierhaus, BTU Cottbus, Germany - Steffen Becker, TU Chemnitz From grlmc at urv.cat Sat Jan 24 21:17:43 2015 From: grlmc at urv.cat (GRLMC) Date: Sat, 24 Jan 2015 21:17:43 +0100 Subject: [fg-arc] InfoSec 2015: registration deadline 3 February Message-ID: <9F84BFB1361D4DCC9E82E7E1BB34267E@Carlos1> *To be removed from our mailing list, please respond to this message with UNSUBSCRIBE in the subject line* ********************************************************************** INTERNATIONAL SUMMER SCHOOL ON INFORMATION SECURITY InfoSec 2015 Tarragona, Spain July 6-10, 2015 Organized by Rovira i Virgili University http://grammars.grlmc.com/InfoSec2015/ ********************************************************************** --- 2nd registration deadline: February 3, 2015 --- ********************************************************************** AIM: InfoSec 2015 will be a major research training event addressed to graduates and postgraduates in the first steps of their academic career. With a global scope, it aims at updating them about the most recent advances in the critical and fast developing area of information security, which covers a large spectrum of current exciting academic research and industrial innovation. It refers to procedures to defend information from unauthorized access, use, modification, recording or destruction, with a critical role to play in order to avoid or minimize risks in the digital world. Renowned academics and industry pioneers will lecture and share their views with the audience. Most information security subareas will be displayed, namely: computer security, cryptography, privacy, cyber security, mobile security, network security, world wide web security, fraud prevention, data protection, etc. Main challenges of information security will be identified through 4 keynote lectures, 33 six-hour courses, and 1 round table, which will tackle the most active and promising topics. The organizers believe outstanding speakers will attract the brightest and most motivated students. Interaction will be a main component of the event. ADDRESSED TO: Graduates and postgraduates from around the world. There are no formal pre-requisites in terms of academic degrees. However, since there will be differences in the course levels, specific background knowledge may be required for some of them. InfoSec 2015 is also appropriate for more senior people who want to keep themselves updated on recent developments and future trends. They will surely find it fruitful to listen and discuss with major researchers, industry leaders and innovators. REGIME: In addition to keynotes, 4 courses will run in parallel during the whole event. Participants will be able to freely choose the courses they will be willing to attend as well as to move from one to another. VENUE: InfoSec 2015 will take place in Tarragona, located 90 kms. to the south of Barcelona. The venue will be: Campus Catalunya Universitat Rovira i Virgili Av. Catalunya, 35 43002 Tarragona KEYNOTE SPEAKERS: Jan Camenisch (IBM Research, Zurich), Privacy in a Digital World: a Lost Cause? Hao Chen (University of California, Davis), (In)security of Mobile Apps in Untrusted Networks Jennifer Seberry (University of Wollongong), The Global Village: the Beginning of the Need for Computer Security [via videoconference] Gene Tsudik (University of California, Irvine), Off-line Proximity-based Social Networking PROFESSORS AND COURSES: N. Asokan (Aalto University), [intermediate] Mobile Security: Overview of Hardware Platform Security and Considerations of Usability Jan Camenisch (IBM Research, Zurich), [introductory/intermediate] Technologies to Protect Online Privacy Hao Chen (University of California, Davis), [intermediate/advanced] Security of the Mobile App Ecosystem Nicolas T. Courtois (University College London), [introductory/intermediate] Security of ECDSA in Bitcoin and Crypto Currency Claude Cr?peau (McGill University, Montr?al), [introductory/intermediate] Quantum Computation, Cryptography and Cryptanalysis Joan Daemen (ST Microelectronics Belgium, Diegem), [introductory/intermediate] Sponge Functions, Keccak and SHA-3 Sajal K. Das (Missouri University of Science and Technology, Rolla), [intermediate/advanced] Securing Cyber-Physical Systems: Challenges and Opportunities Sabrina De Capitani di Vimercati (University of Milan), [introductory/intermediate] Security and Privacy in the Cloud Herv? Debar (T?l?com SudParis), [introductory/intermediate] Detection and Reaction to Attacks: from Intrusion Detection to Cyber-Defense David Evans (University of Virginia, Charlottesville), [introductory/intermediate] Secure Multiparty Computation: Techniques, Theory, and Tools for Building Privacy-Preserving Applications Rosario Gennaro (City University of New York), [intermediate/advanced] A Survey of Verifiable Delegation of Computation Trent Jaeger (Pennsylvania State University, University Park), [intermediate/advanced] How to Add Security Enforcement to Legacy Programs Markus Jakobsson (Qualcomm, Santa Clara), [introductory/intermediate] Frontiers in Fraud Prevention Antoine Joux (Pierre et Marie Curie University, Paris), [introductory/intermediate] Discrete Logarithms in Finite Fields Marc Joye (Technicolor R&I, Los Altos), [introductory/intermediate] Secure Public-Key Cryptosystems Somesh Jha (University of Wisconsin, Madison), [intermediate/advanced] Analysis Techniques in Information Security Lars R. Knudsen (Technical University of Denmark, Lyngby), [introductory/intermediate] Block Ciphers: the Workhorses in Cryptography Songwu Lu (University of California, Los Angeles), [introductory/intermediate] Cellular Network Security: Issues and Defenses Catherine Meadows (Naval Research Laboratory, Washington DC), [introductory/intermediate] Formal Analysis of Cryptographic Protocols Nasir Memon (New York University), [introductory/intermediate] User Authentication Ethan L. Miller (University of California, Santa Cruz), [intermediate/advanced] Securing Stored Data in a Connected World Stefano Paraboschi (University of Bergamo), [introductory/intermediate] Data Protection in Network-enabled Systems Bart Preneel (KU Leuven), [introductory/intermediate] Cryptology: State of the Art and Research Challenges Jean-Jacques Quisquater (Catholic University of Louvain), [introductory/intermediate] The History of RSA: from Babylon to Smart Cards Shantanu Rane (Palo Alto Research Center), [introductory/intermediate] Privacy-preserving Data Analytics: Problems, Solutions and Challenges Mark Ryan (University of Birmingham), [introductory/intermediate] Designing Security Protocols: Electronic Voting, and Electronic Mail Rei Safavi-Naini (University of Calgary), [introductory/intermediate] Information-theoretically Secure Communication Stefan Saroiu (Microsoft Research, Redmond), [advanced] Dealing with Loss: Protecting Data on a Lost Mobile Device Milind Tambe (University of Southern California, Los Angeles), [introductory/intermediate] Introduction to the Emerging Science of Security Games Gene Tsudik (University of California, Irvine), [intermediate/advanced] Security and Privacy in Candidate Future Internet Architectures Yang Xiao (University of Alabama, Tuscaloosa), [introductory/advanced] Security in Smart Grids Wenyuan Xu (University of South Carolina, Columbia), [intermediate] Security and Privacy Analysis of Embedded Systems Yuliang Zheng (University of North Carolina, Charlotte), [introductory] Cryptography and the Future of Money ORGANIZING COMMITTEE: Adrian Horia Dediu (Tarragona) Carlos Mart?n-Vide (Tarragona, chair) Florentina Lilica Voicu (Tarragona) REGISTRATION: The registration form can be found at: http://grammars.grlmc.com/InfoSec2015/registration.php The selection of up to 8 courses requested in the registration template is only tentative and non-binding. For the sake of organization, it will be helpful to have an approximation of the respective demand for each course. Since the capacity of the venue is limited, registration requests will be processed on a first come first served basis. The registration period will be closed and the on-line registration facility disabled when the capacity of the venue will be complete. It is much recommended to register prior to the event. FEES: Fees are a flat rate covering the attendance to all courses during the week. There are several early registration deadlines. Fees depend on the registration deadline. ACCOMMODATION: Suggestions of accommodation will be provided in due time. CERTIFICATE: Participants will be delivered a certificate of attendance. QUESTIONS AND FURTHER INFORMATION: florentinalilica.voicu at urv.cat POSTAL ADDRESS: InfoSec 2015 Lilica Voicu Rovira i Virgili University Av. Catalunya, 35 43002 Tarragona, Spain Phone: +34 977 559 543 Fax: +34 977 558 386 ACKNOWLEDGEMENTS: Universitat Rovira i Virgili From e.a.boiten at kent.ac.uk Tue Jan 27 10:53:17 2015 From: e.a.boiten at kent.ac.uk (Eerke Boiten) Date: Tue, 27 Jan 2015 09:53:17 +0000 Subject: [fg-arc] CfP: Refinement Workshop: Oslo at FM (submissions 21->28 March) In-Reply-To: <54C75E22.6050408@kent.ac.uk> References: <54C75E22.6050408@kent.ac.uk> Message-ID: <54C7600D.1080503@kent.ac.uk> Call for Papers: 2015 Refinement Workshop at FM 2015 in Oslo 22 June 2015, colocated with FM 2015 at Oslo www.refinenet.org.uk/ref15/ Refinement is one of the cornerstones of a formal approach to software engineering: the process of developing a more detailed design or implementation from an abstract specification through a sequence of mathematically-based steps that maintain correctness with respect to the original specification. The aim of this BCS FACS Refinement Workshop, is to bring together people who are interested in the development of more concrete designs or executable programs from abstract specifications using formal notations, tool support for formal software development, and practical experience with formal refinement methodologies. The purpose of the workshop is to provide a forum for the exchange of ideas, and discussion of common ground and key differences. Topics of interest include (but are not limited to): Simulation techniques Foundations and semantics Case studies (specification and verification) Compositional and modular reasoning Object-orientation Time, Probability, Hybrid Systems Specification notations Programming models Verification and tool support Proceedings Submissions will be reviewed, workshop proceedings will be published, likely in Electronic Proceedings in Theoretical Computer Science, like the 2013 and 2011 editions. It is anticipated that selected papers from this workshop will be published in extended versions in a special edition of a major international journal, in line with the special issues in FACJ and SCP that have appeared for workshop editions since 2003. Key Dates Abstract Submission: 21 March 2015 Paper Submission: 28 March 2015 Notification: 22 April 2015 Workshop: 22 June 2015 Submissions Submissions can be made via EasyChair: https://easychair.org/conferences/?conf=ref2015. There is no prescribed format for submissions but accepted papers will need to use the EPTCS LaTeX macro package, see EPTCS info for authors: http://info.eptcs.org/ Papers should be no more than 16 pages. History of the workshop This 17th Refinement Workshop continues a long tradition in refinement workshops run under the auspices of the British Computer Society (BCS) FACS special interest group. Running since 1988, previous refinement workshops have been held at Cambridge, London, Bath etc. In 1998 the BCS refinement workshop was combined with the Australasian Refinement Workshop to form the International Refinement Workshop, hosted alongside Formal Methods Pacific 1998 at The Australian National University. In 2002, the Refinement Workshop was held as an FME workshop in Copenhagen. This and seven subsequent editions (Surrey, Macau, Oxford, Turku, Eindhoven, Limerick, Turku) have had proceedings in ENTCS or EPTCS and a subsequent journal special issue or selected journal papers (most in Formal Aspects of Computing, once in Science of Computer Programming). For more details, see here. The Workshop Webpage is available from www.refinenet.org.uk Program committee Eerke Boiten, University of Kent, UK (co-chair) John Derrick, University of Sheffield, UK (co-chair) Steve Reeves, University of Waikato, NZ (co-chair) Richard Banach, University of Manchester, UK Luis Barbosa, University of Minho, PT Ana Cavalcanti, University of York, UK Brijesh Dongol, Brunel University, UK Steve Dunne, UK Lindsay Groves, Victoria University of Wellington, NZ Stefan Hallerstede, Aarhus University, DK Marcel Oliveira, Universidade Federal do Rio Grande do Norte, Brazil Gerhard Schellhorn, Augsburg University, Germany Steve Schneider , University of Surrey, UK Emil Sekerinski, McMaster University, Canada Graeme Smith, University of Queensland, Australia Helen Treharne, University of Surrey, UK Heike Wehrheim, University of Paderborn, Germany From ICMOE at iieom.org Wed Jan 28 22:27:48 2015 From: ICMOE at iieom.org (IEOM Orlando Conference) Date: Wed, 28 Jan 2015 16:27:48 -0500 Subject: [fg-arc] IEOM International Conference on Operations Excellence and Service Engineering, Orlando, Sept. 10-11, 2015 Message-ID: <55a0a715bbe44e3b9c3a8c045f988e9e@iieom.org> IEOM International Conference on Operations Excellence and Service Engineering Orlando, Florida, USA September 10-11, 2015 Venue: Rosen Plaza Hotel, International Dr. www.iieom.org/icmoe2015/ Organized by: IEOM Society IEOM Society is organizing an International Conference on Operations Excellence and Service Engineering in Orlando, Florida, USA during September 10 - 11, 2015 at Rosen Plaza Hotel - International Drive.. The main theme of the conference is "Achieving and Sustaining Excellence in Quality, Service and Operations". The conference provides a forum for academics, researchers and practitioners to exchange ideas and recent developments in the field of manufacturing and operations excellence. The event will foster networking, collaboration and joint effort among the conference participants to advance the theory and practice. ONLINE Submission Site: www.xcdsystem.com/icmoe2015/ Presentation can be given with an abstract. Full paper is optional. Participants can present theoretical and applied research with abstract. There are four completion presentations: high school STEM project presentation competition, senior design project presentation competition, student paper competition and undergraduate research presentation competition. First, second and third place awards will be provided for each category. The conference will cover the following topics but not limited to: TOPICS Artificial Intelligence Automation and Control Case Studies Construction Management Data Analytics Decision Sciences E-Business/E-Service E-Manufacturing Energy Engineering Education Engineering Management Entrepreneurship and Innovation Environmental Services Financial Service Management Healthcare Operations and Services Human Factors and Ergonomics Industrial Services Industry Practices and Solutions Information Technology Inventory Management Lean and Six Sigma Logistics Services Maintenance Services Manufacturing and Design Modeling and Simulation Operations Management Operations Research Production Planning and Management Project Management Public Service Quality and Reliability Retail Service Service Systems and Management Supply Chain Sustainability Systems Engineering Technology Management Transportation High School STEM Project Presentation Competition Poster Competition Senior Design Project Presentation Competition STUDENT PAPER COMPETITION Undergraduate Research Presentation Competition Pre-Conference Workshops Two pre-conference workshops are arranged on September 9, 2015. 1. Six Sigma and Lean Green Belt Certification 2. Entrepreneurship, Intrapreneurship (Corporate Entrepreneurship) and Innovation Deadlines Paper/Abstract Submission: May 15, 2015 Review Feedback: June 15, 2015 Registration: July 15, 2015 We appreciate for your attention and joining the IEOM Conference in Orlando. Thanks IEOM Conference Committee ICMOE at iieom.org www.iieom.org/icmoe2015/ -------------- next part -------------- An HTML attachment was scrubbed... URL: From claudia.ermel at tu-berlin.de Fri Jan 30 12:36:21 2015 From: claudia.ermel at tu-berlin.de (Claudia Ermel) Date: Fri, 30 Jan 2015 12:36:21 +0100 Subject: [fg-arc] CFP: IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC'15) In-Reply-To: <54CB6A9F.3090009@tu-berlin.de> References: <54CB6A9F.3090009@tu-berlin.de> Message-ID: <54CB6CB5.3020007@tu-berlin.de> *** CALL FOR PAPERS *** ------------------------------------------------------------------- VL/HCC 2015 IEEE Symposium on Visual Languages and Human-Centric Computing http://vlhcc.org/ October 18-22, 2015 Atlanta, Georgia, USA ------------------------------------------------------------------- We are pleased to invite you to submit papers to the 2015 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC), to be held in Atlanta, Georgia, USA at the Georgia Tech Hotel & Conference Center, October 18-22, 2015. SCOPE AND TOPICS We solicit original, unpublished research papers that focus on efforts to design, formalize, implement, or evaluate computing technologies and languages for programming, modeling and communicating, which are easier to learn, use or understand than the state of the art. This includes languages and tools intended for general audiences (e.g., professional or novice programmers, or the public) or domain-specific audiences (e.g., people working in healthcare, urban design or scientific domains). It encompasses languages and tools for expressing forms of computation and reasoning through any means (e.g., visual, textual, form-based, haptic) and in any computing context (e.g., cloud, web, desktop, mobile or pervasive computing). Areas of interest include, but are not limited to: * Design, evaluation, and theory of visual languages * End-user development and end-user programming * Novel representations and user interfaces for expressing computation * Human aspects and psychology of software development and language design * Debugging and program understanding * Crowdsourcing, as related to languages and tools * Computational thinking and Computer Science education * Model-driven development * Domain-specific languages * Software visualization * Query languages SPECIAL EMPHASIS FOR 2015: COMPUTATIONAL THINKING AND CS EDUCATION The push to enhance computational thinking and computing skills in education has never been stronger, with a number of high-profile movements actively working to establish computer science as a foundation in education (e.g., Code.org) and to broaden participation in computing among underrepresented groups (e.g., NCWIT). VL/HCC is well suited to this pursuit: learning and education is inherently human-centered, and the potential of visual languages to captivate users and remove barriers is well recognized. Thus, for VL/HCC 2015, we seek to place a special emphasis on education-oriented topics. To this end, we strongly encourage the submission of works on visual languages and human-centric computing that, for example, explore theories of human learning, propose new methods and tools to enhance learning, and empirically investigate and evaluate learning in a variety of computing contexts. PAPER SUBMISSIONS We invite two kinds of papers (deadlines below under Important Dates): [***NOTE: The page limits have changed for 2015.] * full-length research papers, up to 8 pages -- plus 1 additional page that contains only references * short research papers, up to 4 pages -- plus 1 additional page that contains only references In addition to papers, we also invite contributions of other types -- see below under Workshops, Showpieces (Posters & Demos), and Graduate Consortium. All accepted papers, whether full or short, should be complete archival contributions. Contributions from full papers are more extensive than those from short papers. Work-in-progress, which has not yet yielded a contribution, should be submitted to the Showpieces category. All submissions will be reviewed by members of the Program Committee. Submission and reviews for the technical program are managed with EasyChair. Accepted papers will be distributed at the conference and will be submitted for inclusion in the IEEE Xplore Digital Library (http://ieeexplore.ieee.org/). The proceedings are an official electronic publication of the IEEE in Computer Science, with an ISBN number. Be sure to use the current IEEE conference paper format, which was changed in 2011: http://www.ieee.org/conferences_events/conferences/publishing/templates.html Additionally, selected papers from VL/HCC 2014 and 2015 will be invited for submission in expanded form to a special issue of the Journal of Visual Languages and Computing (JVLC). The topic of the special issue will be programming and modeling tools. Further instructions regarding formatting and the review/publication process will be provided when the invitations are made. The latest details are available at our website: http://vlhcc.org/ EVALUATION Papers are expected to support their claims with appropriate evidence. For example, a paper that claims to improve programmer productivity is expected to demonstrate improved productivity; a paper that claims to be easier to use should demonstrate increased ease of use. However, not all claims necessarily need to be supported with empirical evidence or studies with people. For example, a paper that claims to make something feasible that was clearly infeasible might substantiate its claim through the existence of a functioning prototype. Moreover, there are many alternatives to empirical evidence that may be appropriate for claims, including analytical methods or formal arguments. Given this criteria, we encourage potential authors to think carefully about what claims their submission makes and what evidence would adequately support these claims. The evaluation process will proceed as follows: 1. Initial review period: At least three members of the Program Committee will review each paper. At the end of this period, these initial reviews will be released to the authors. 2. Author response period: Authors will have an opportunity to submit a 500-word response based on their initial reviews. Responses should focus on answering reviewers' questions, addressing reviewers' concerns, and clarifying any factual misunderstandings. 3. Final review period: Taking the author response into account, the original reviewers will revise their reviews as they deem appropriate, and the Program Committee will reach a final decision to accept or reject the submitted work. WORKSHOPS, SHOWPIECES (POSTERS & DEMOS), AND GRADUATE CONSORTIUM The conference also invites submissions for workshops and tutorials, showpieces (e.g., demos and posters), and the Graduate Consortium (GC). More information about these contribution types will be posted on the VL/HCC 2015 web site at http://vlhcc.org/. IMPORTANT DATES Fri 27 Feb: Deadline - Workshop/tutorial proposals Fri 27 Mar: Notifications - Workshop/tutorial proposals Fri 1 May: Deadline - Paper abstracts Fri 8 May: Deadline - Papers Sat 9 May - Fri 12 June: Initial review period Fri 12 June: Preliminary notifications - Papers Fri 12 June - Fri 19 June: Author response period Fri 19 June: Deadline - Author responses Sat 20 June - Fri 26 June: Final review period Mon 29 June: Final notifications - Papers Fri 24 July: Deadline - Workshop papers, showpieces, and GC applications Fri 14 Aug: Notifications - Workshop papers, showpieces, and GC applications Fri 4 Sep: Deadline - All final camera-readies ORGANIZERS General Chair Eileen Kraemer - Clemson University, USA Program Chairs Claudia Ermel - Technische Universit?t Berlin, Germany Scott D. Fleming - University of Memphis, USA Publications Chair Zhen Li - Microsoft Corporation, USA Graduate Consortium Chair Anita Sarma - University of Nebraska-Lincoln, USA Showpieces Chairs Iman Avazpour - Swinburne University of Technology, Australia Co-chair to be announced PROGRAM COMMITTEE Robin Abraham - Microsoft Corporation, USA Alan Blackwell - University of Cambridge, UK Chris Bogart - Carnegie Mellon University, USA Paolo Bottoni - Sapienza, University of Rome, Italy Margaret Burnett - Oregon State University, USA Maria Francesca Costabile - University of Bari, Italy Gennaro Costagliola - Universit? di Salerno, Italy Shaundra Daily - Clemson University, USA Juan de Lara - Universidad Autonoma de Madrid, Spain Robert DeLine - Microsoft Research, USA Simone Diniz Junqueira Barbosa - PUC-Rio, Brazil Gregor Engels - Universit?t Paderborn, Germany Andrew Fish - University of Brighton, UK Judith Good - University of Sussex, UK John Grundy - Swinburne University of Technology, Australia Felienne Hermans - Delft University of Technology, Netherlands John Hosking - University of Auckland, New Zealand John Howse - University of Brighton, UK Chris Hundhausen - Washington State University, USA Caitlin Kelleher - Washington University in St. Louis, USA Andrew J. Ko - University of Washington, USA Thomas D. LaToza - University of California, Irvine, USA Zhen Li - Microsoft Corporation, USA Mark Minas - Universit?t der Bundeswehr M?nchen, Germany Emerson Murphy-Hill - North Carolina State University, USA Brad Myers - Carnegie Mellon University, USA Chris Parnin - North Carolina State University, USA Marian Petre - The Open University, UK Emmanuel Pietriga - INRIA & INRIA Chile, France Beryl Plimmer - University of Auckland, New Zealand David Redmiles - University of California, Irvine, USA Alexander Repenning - University of Colorado, USA Mary Beth Rosson - Pennsylvania State University, USA Anita Sarma - University of Nebraska-Lincoln, USA Stefan Sauer - Universit?t Paderborn, Germany Christopher Scaffidi - Oregon State University, USA Gem Stapleton - University of Brighton, UK Simone Stumpf - City University London, UK Steven Tanimoto - University of Washington, USA Franklyn Turbak - Wellesley College, USA Eric Walkingshaw - Oregon State University, USA VISIT OUR WEB SITE http://vlhcc.org/ LIKE US ON FACEBOOK http://www.facebook.com/vlhcc FOLLOW US ON TWITTER http://twitter.com/vlhcc -------------- next part -------------- An HTML attachment was scrubbed... URL: