Call For Papers: The Internet and Naming (ANS 2012)

The American Name Society is pleased to announce its first call for critical papers for an upcoming Special Issue of NAMES dedicated exclusively to exploring the relationship between NAMES, NAMING, AND THE INTERNET. From software to malware, the world wide web has yielded an astounding array of new names. By the same token, the virtual world has also had an unparalleled effect upon traditional names and naming patterns within the real world. As yet, however, scientific articles which have been published on these onomastic developments have been surprisingly few and far between.
To help address this oversight, authors are cordially invited to submit abstracts for this Special Issue. In particular, the editors are interested in papers which systematically address the synchronic and/or diachronic relationship between the internet and names of any and all type. Possible topics for submission include the following:

• user names
• names of computer parasites (e.g. viruses, worms, trojan horses, etc.)
• the influence of the internet on naming in the real world
• domain names
• international and/or national laws governing e-name usage
• passwords and names
• naming and virtual spaces (e.g. partner search banks, chat rooms, and social networks)

Authors wishing to have their article considered for publication are asked to send a
250-word abstract proposal as a Word document directly to the Special Editor Dr. I. M. Laversuch ( no later than November 16, 2011.
All submissions must be in English and conform with the NAMES style sheet ( Each submission is to be accompanied by an electronic cover letter containing the following information: author name; author affiliation; author email and postal address; title of submission; total number of words. After submission, all abstract proposals will be subject to anonymous, external review. Specific inquiries regarding this call may be sent directly to the Series Editor:

P.D. Dr. Laversuch
Albertus Magnus Platz
English Department
University of Cologne
50923 Cologne
email: (

Once an article has been accepted for publication in the special issue of NAMES, the author must join the American Name Society. Notifications regarding acceptance or rejection will be sent by December 30, 2012. Final papers from solicited authors will be due June 15, 2012 for final editorial review before publication. The projected date of publication is the Winter of 2012.


Posted in Conferences | Tagged , , , , | Leave a comment

Call For Papers: Interactive Learning Environments special issue on Linked Data for Education and Technology-Enhanced Learning (ILE-SI-LinkedData-Education 2011)

Interactive Learning Environments special issue on Linked Data for Education and Technology-Enhanced Learning

– Special issue:
– Journal:

* 30 November 2011: Paper submission deadline
(11:59pm Hawaiian time)
* 30 March 2012: Notification of first review round
* 30 April 2012: Submission of major revisions
* 15 July 2012: Notification of major revision reviews
* 15 August 2012: Submission of minor revisions
* 30 August 2012: Notification of acceptance
* late 2012 : Publication

While sharing of open learning and educational resources on the Web became common practice throughout the last years a large amount of research was dedicated to interoperability between educational repositories based on semantic technologies. However, although the Semantic Web has seen large-scale success in its recent incarnation as a Web of Linked Data, there is still only little adoption of the successful Linked Data principles in the domains of education and technology-enhanced learning (TEL). This special issue builds on the fundamental belief that the Linked Data approach has the potential to fulfill the TEL vision of Web-scale interoperability of educational resources as well as highly personalised and adaptive educational applications. The special issue solicits research contributions exploring the promises of the Web of Linked Data in TEL by gathering researchers from the areas of the Semantic Web and educational science and technology.

We welcome papers describing current trends on research in (a) how technology-enhaced learning approaches take advantage of Linked Data on the Web and (b) how Linked Data principles and semantic technologies are being applied in technology-ehnaced learning contexts. Both rather application-oriented as well as theoretical papers are welcome. Relevant topics include but are not limited to the following:

* Using Linked Data to support interoperability of educational resources
* Linked Data for informal learning
* Personalisation and context-awareness in TEL
* Usability and advanced user interfaces in learning environments and Linked Data
* Light-weight TEL metadata schemas
* Exposing learning object metadata via RDF/SPARQL & service-oriented approaches
* Semantic & syntactic mappings between educational metadata schemas and standards
* Controlled vocabularies, ontologies and terminologies for TEL
* Personal & mobile learning environments and Linked Data
* Learning flows and designs and Linked Data
* Linked Data in (visual) learning analytics and educational data mining
* Linked Data in organizational learning and learning organizations
* Linked Data for harmonizing individual learning goals and organizational objectives
* Competency management and Linked Data
* Collaborative learning and Linked Data
* Linked-data driven social networking collaborative learning

All manuscripts should be compliant with the submission guidelines and policies of the Interactive Learning Environments journal ( and will be subject to the high standards of peer review. Papers must be submitted via the online submission system at On submission, please make sure that you indicate that your manuscript is for the “Special Issue (Linked Data for Education and Technology-Enhanced Learning)”.

The special issue will be edited by the organisers of the ESWC-2011 workshop “Linked Learning 2011” (

* Dragan Gasevic, Athabasca University (Canada)

* Stefan Dietze, L3S Research Center (Germany)

* Mathieu d’Aquin, The Open University (UK)

* Miguel-Angel Sicilia, University of Alcalá (Spain)

For any enquiries, please contact the guest editors via

Posted in Conferences | Tagged , , , , | Leave a comment

Call For Papers: Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2012)

The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2012) is a forum for scientists, engineers, and practitioners to present their latest research results, ideas, developments and applications in the areas of Computer Communications, Communication networks, Communication Software Communication Technologies and Applications, and other related themes.

This conference (ICADIWT 2012) will include presentations of contributed papers and state-of-the-art lectures by invited keynote speakers.

This conference welcomes papers address on, but not limited to, the following research topics:

Computer Communication
Communication Technologies
Forensics, Recognition Technologies and Applications
Communication Software
Fuzzy and neural network systems
Signal processing, pattern recognition and applications
Digital image processing
Speech processing
Computational biology and bioinformatics
Computer networks
Information retrieval and internet applications
Software engineering
Data Commnication
Digital Communication
Databases and applications
Distributed Computing
Data mining
Real time systems
Computer and network security
Multi-Agent systems

Modified versions of the selected papers of the conference will be published in the following peer reviewed journals
1. Journal of Digital Information Management
2. International Journal of Web Applications
3. International Journal of Information Studies
4. Journal of E-Technology
5. Journal of Information Technology Review

Submission of papers January 31, 2012
Notification of Acceptance March 31, 2012
Camera ready May 31, 2012
Registration early bird June 30, 2012
Registration late July 20, 2012
Conference dates August 27-29 2012


Posted in Conferences | Tagged , , , , , , , , , , , | Leave a comment

Call For Papers: ACM Special Interest Group on Data Communication (SIGCOMM 2012)

The SIGCOMM 2012 conference seeks papers describing significant research contributions to the field of computer and data communication networks. We invite submissions on a wide range of networking research, including, but not limited to:

Design, implementation, and analysis of network architectures and algorithms
Economic aspects of the Internet
Enterprise, datacenter, and storage area networks
Experimental results from operational networks or network applications
Fault-tolerance, reliability, and troubleshooting
Insights into network and traffic characteristics
Network management and traffic engineering
Network security, vulnerability, and defenses
Network, transport, and application-layer protocols
Networking issues for emerging applications
Operating system and host support for networking
Peer-to-peer, overlay, and content distribution networks
Resource management, quality of service, and signaling
Routing, switching, and addressing
Technical aspects of online social networks
Techniques for network measurement and simulation
Wireless, mobile, ad-hoc, and sensor networks


SIGCOMM is a highly selective conference where full papers typically report novel results firmly substantiated by experimentation, simulation, or analysis. Submissions can be up to 14 pages in length, in two-column 10pt format. . The submission instructions will be posted here in some time. Note that accepted camera-ready papers will be 12 pages in length, in two-column format with 9pt font.

This year, authors will have the option of submitting a short rebuttal of the reviews of their paper after the first round of reviewing has concluded. The goal of the rebuttal process is to allow authors the opportunity to correct misperceptions, if any, regarding their paper. Note that submitting a rebuttal is entirely optional.

In addition to the main conference, SIGCOMM 2012 will have a series of co-located workshops, a poster and demo session, a travel grant program, and conference best paper and SIGCOMM awards.


When Aug 13, 2012 – Aug 17, 2012
Where Helsinki, Finland
Abstract Registration Due Jan 20, 2012
Submission Deadline Jan 27, 2012
Notification Due Apr 30, 2012


Posted in Conferences | Tagged , , , , , , , , | Leave a comment

Call For Papers: IEEE Conference on Open System 2012 (ICOS 2012)

The 2012 IEEE Conference on Open Systems will be held in Kuala Lumpur, Malaysia on 20th – 24th October 2012. The conference is organized to invite international delegates to enjoy the capital city of Malaysia; the modern and dynamic yet still preserve natural rainforest inside the heart of it.

We aim to provide an excellent opportunity to share and exchange technologies and applications in the area of Open Systems for professionals, engineers, academics and industrial people worldwide. ICOS 2012 will be sponsored by the IEEE Malaysia Computer Chapter. ICOS 2010 and 2011 was successfully organized in Kuala Lumpur from 5-8 December 2010 and Langkawi from 25-28 September 2011, respectively.

Conference Tracks

Papers on original works are solicited from prospective authors. Topics includes; but not limited to the following tracks:

•Smart, Adaptive & Intelligent Systems Technologies
•Automation & Robotics
•Information Retrieval & Knowledge Management
•Embedded & Real-Time Systems
•Processor Architectures
•Parallel & Distributed Systems
•Grid & Cloud Computing

•Programming Languages
•Operating Systems
•Software Requirements Engineering
•Product / Systems Integration
•Critical Systems Specification
•Software Testing and Analysis
•Models of Reuse
•Agile Development
•User Interface Design & Human Factors
•Usability, Scalability, Maintainability & Quality Issues

•Engineering & Industrial Applications
•Bio-Tech & Medical Applications
•Web & Content Management Applications
•Educational, e-Learning Games Applications
•AI & Neural Networks Applications
•Virtual Environments & Games Applications
•Wireless & Mobile Applications
•Remote Sensing & GIS Applications
•E-Commerce Applications
•Social Networks

•Security in Mobile Applications
•Cyber Security and Strategies
•Secure Communications
•Encryption and Cryptography
•Security and Privacy Standards
•Tools in managing security and privacy

•Health Service Management & E-Health
•E-Government & e-Governance

•Open Infrastructure
•Software Standards
•Communication Standards

•IPR and Legal Implications in Open Systems
•Business Models & Strategies in Open Systems
•Innovation in Open Systems
•Case studies of Open Systems deployment and migration models

Submission Guidelines

Authors should submit an original paper in English, carefully checked for grammar and spelling. ICOS 2012 accepts both regular (completed) research papers and research-in-progress as well as case study papers.

Paper Format

All manuscripts must be in English.

Papers submitted for review MUST NOT contain any author information (no authors, affiliation or address, and no explicit self-reference) due to the double-blind review process.

All submitted papers should be in the form of MS Word file and are to be limited to a maximum length of 6 pages (A4 size, single space, Times Roman of font size 10, two  columns format), including figures, tables and references.

Papers must conform to the format defined by the IEEE template available on ICOS 2012 below.

* The Proceedings of ICOS 2012 will be included in the IEEE Xplore database and will normally be indexed in SCOPUS.

Contact Us
Email :

When Oct 20, 2012 – Oct 24, 2012
Where Kuala Lumpur, Malaysia
Submission Deadline Apr 15, 2012
Notification Due Jul 15, 2012
Final Version Due Oct 1, 2012
Posted in Conferences | Tagged , , , , , , , , , , , , , , | Leave a comment

Call For Papers: The Seventh International Conference on Internet and Web Applications and Services (ICIW 2012)

The seventh International Conference on Internet and Web Applications and Services) continues a series of co-located events that covers the complementary aspects related to designing and deploying of applications based on IP&Web techniques and mechanisms.

ICIW 2012 comprises five complementary tracks. They focus on Web technologies, design and development of Web-based applications, and interactions of these applications with other types of systems. Management aspects related to these applications and challenges on specialized domains are aided at too. Evaluation techniques and standard position on different aspects are part of the expected agenda.

Internet and Web-based technologies led to new frameworks, languages, mechanisms and protocols for Web applications design and development. Interaction between web-based applications and classical applications requires special interfaces and exposes various performance parameters.

Web Services and applications are supported by a myriad of platforms, technologies, and mechanisms for syntax (mostly XML-based) and semantics (Ontology, Semantic Web). Special Web Services based applications such as e-Commerce, e-Business, P2P, multimedia, and GRID enterprise-related, allow design flexibility and easy to develop new services. The challenges consist of service discovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when designing such applications.

Entertainment systems became one of the most business-oriented and challenging area of distributed real-time software applications’ and special devices’ industry. Developing entertainment systems and applications for a unique user or multiple users requires special platforms and network capabilities.

Particular traffic, QoS/SLA, reliability and high availability are some of the desired features of such systems. Real-time access raises problems of user identity, customized access, and navigation.
Particular services such interactive television, car/train/flight games, music and system distribution, and sport entertainment led to ubiquitous systems. These systems use mobile, wearable devices, and wireless technologies.

Interactive game applications require particular methodologies, frameworks, platforms, tools and languages. State-of-the-art games today can embody the most sophisticated technology and the most fully developed applications of programming capabilities available in the public domain.

The impact on millions of users via the proliferation of peer-to-peer (P2P) file sharing networks such as eDonkey, Kazaa and Gnutella was rapidly increasing and seriously influencing business models (online services, cost control) and user behavior (download profile). An important fraction of the Internet traffic belongs to P2P applications.

P2P applications run in the background of user’s PCs and enable individual users to act as
downloaders, uploaders, file servers, etc. Designing and implementing P2P applications raise particular requirements. On the one hand, there are aspects of programming, data handling, and intensive computing applications; on the other hand, there are problems of special protocol features and networking, fault tolerance, quality of service, and application adaptability

Additionally, P2P systems require special attention from the security point of view. Trust, reputation, copyrights, and intellectual property are also relevant for P2P applications.

On-line communications frameworks and mechanisms allow distribute the workload, share business process, and handle complex partner profiles. This requires protocols supporting interactivity and real-time metrics.

Collaborative systems based on online communications support collaborative groups and are based on the theory and formalisms for group interactions. Group synergy in cooperative networks includes online gambling, gaming, and children groups, and at a larger scale, B2B and B2P cooperation.

Collaborative systems allow social networks to exist; within groups and between groups there are problems of privacy, identity, anonymity, trust, and confidentiality. Additionally, conflict, delegation, group selection, and communications costs in collaborative groups have to be monitored and managed.

Building online social networks requires mechanism on popularity context, persuasion, as well as technologies, techniques, and platforms to support all these paradigms.

During the last years, different web applications based on the use of Internet environments have been introduced to help teachers and students in the learning-teaching process. These web applications, mainly supported by Internet systems and services, are changing the traditional educational process not only in Higher Education (HE) qualifications, but also in open learning for any type of course. Nowadays, there exist different public and commercial Virtual Learning Environments (VLE) aimed at helping teachers to manage courses and contents, as well as to support the students’ learning process. In this sense, VLE are an important factor contributing towards the change from traditional educational methodologies to new paradigms including active teaching. This implies not only a shift in the way of tackling learning and teaching, but also new challenges for software engineers and developers. Virtual Learning Environments have to be built bearing in mind their mandatory use through the Internet, thus requiring important characteristics and capabilities such as security, good latency, several tools for interoperability, storage management, etc.

Also, the age of information and communication has revolutionized the way companies do business, especially in providing competitive and innovative services. Business processes not only integrates departments and subsidiaries of enterprises but also are extended across organizations and to interact with governments. On the other hand, wireless technologies and peer-to-peer networks enable ubiquitous access to services and information systems with scalability. This results in the removal of barriers of market expansion and new business opportunities as well as threats. In this new globalized and ubiquitous environment, it is of increasing importance to consider legal and social aspects in business activities and information systems that will provide some level of certainty. There is a broad spectrum of vertical domains where legal and social issues influence the design and development of information systems, such as web personalization and protection of users privacy in service provision, intellectual property rights protection when designing and implementing virtual works and multiplayer digital games, copyright protection in collaborative environments, automation of contracting and contract monitoring on the web, protection of privacy in location-based computing, etc.

We solicit research and industrial contributions. ICIW 2012 will offer tutorials, plenary sessions, and panel sessions.

The ICIW 2012 will have the following tracks:


Internet and Web-based Applications and Services


Web Services-based Systems and Applications

ENSYS Entertainment Systems
P2PSA P2P Systems and Applications
ONLINE Online Communications, Collaborative Systems, and Social Networks
SERCOMP Service Computing
SLAECE Social and Legal Aspect of Internet Computing
VEWAeL Virtual Environments and Web Applications for eLearning
ECC Enterprise cloud computing
We solicit both academic, research, and industrial contributions. We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals.

Industrial presentations are not subject to the format and content constraints of regular submissions. We expect short and long presentations that express industrial position and status.

Tutorials on specific related topics and panels on challenging areas are encouraged.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.

All topics and submission formats are open to both research and industry contributions.

IWAS : Internet and Web-based Applications and Services

Web technologies, frameworks, languages, mechanisms
Web applications design and development
Interaction with/from Web-based applications
Web-based applications’ features
Management of Web-based applications
Evaluation of Web applications
Specialized Web applications
Aggregating multimedia documents
E-business, appliances, and services
IP Grid Management and Grid Services
IP-based convergent solutions and next generation networks
Standards, case studies and special groups on web-based applications
E-business system design, development, and management for SMEs

WSSA : Web Services-based Systems and Applications

Service Innovations
Service Architectures
Model-driven development of context-aware services
Context-aware service models, architectures and frameworks
Model-driven development of semantic Web services
Web services foundation, architectures, frameworks, languages
Web services architecture and business continuity
Special Web services mechanisms
Semantic Web, Ontology, and Web services
Web service applications
Data Management aspects in Web Services
Autonomic e-Business integration and collaboration
Web service based Grid computing and P2P computing
Web services based applications for e-Commerce
Multimedia applications using Web Services
Automatic computing for Web services
Web services challenges on trust, security, performance, scalability
Enterprise Web services
Web services discovery, announcing, monitoring and management
Platforms, technologies, mechanisms and case studies
Grid architectures, middleware and toolkits

ENSYS: Entertainment Systems

Developing entertainment systems and applications
Platforms for entertainment systems
Speech technology & its usability for entertainment systems
Networking requirements for entertainment systems
Traffic generated by entertainment applications
QoS/SLA on entertainment systems
Reliability and high availability of entertainment systems
Identify aspects in entertainment systems
Real-time access to entertainment systems
Customized access entertainment systems
Navigation and entertainment systems
Integration and interoperability aspects in entertainment systems
Entertainment systems and applications
Networking and system support for entertainment systems
Wireless and mobile technologies for entertainment
Wireless multimedia for entertainment
Systems for music and movie distribution
Games on mobile and resource-constrained devices
Mobile video entertainment systems
Car/flight/train entertainment systems
Ubiquitous entertainment systems
Interactive television
Technologies for sport and entertainment
WiFi wireless home entertainment systems
Wearable technologies for entertainment

P2PSA: P2P Systems and Applications

P2P architectures, techniques, paradigms
P2P programming and data handling
P2P security features
Data and compute intensive applications
P2P networks and protocols
P2P management
P2P Trust and reputation management
Fault tolerance in P2P, quality of availability, accounting in P2P
Self-adaptiveness in P2P overlay networks
Self-configurable P2P systems
Case studies, benchmarking
Copyright and intellectual property,
Electronic marketplace, Digital asset management and trading systems
Platforms, environments, testbeds

ONLINE: Online Communications, Collaborative Systems, and Social Networks

Theory, frameworks, mechanisms, and tools for online communication
Methodologies and languages for on-line communications
Web services and XML use for online communications
Tools for assessing online work, distributed workload
Shared business processes
Collaborative groups and systems
Theory and formalisms of group interactions
Group synergy in cooperative networks
Online gambling, gaming, children groups
Identity features, risks, jurisdiction for online communications
Specifics emergency and e-coaching on online communications
B2B and B2E cooperation
Privacy, identify, security on online communications
Individual anonymity, group trust, and confidentiality on online groups
Conflict, delegation, group selection
Community costs in collaborative groups
Building online social networks with popularity contexts, persuasion, etc.
Technology support for collaborative systems
Techniques, mechanisms, and platforms for remote cooperation

SERCOMP: Service computing

Adaptive Architecture
Business process integration and management
Cloud Computing
Collective Intelligence for Service Computing
Computational Intelligence
Data Mining of Actual Services
Decision Science
Digital EcoSystems Infrastructure
Economic Clusters
Economics and Economic Experiments
Game Theory
Human Modeling in Services
Intelligent Agents and Multi-Agent Systems
Intra- and Inter-enterprise services
Knowledge Discovery for Service Computing
Nature Inspired Computing Techniques for Service Computing
Optimization of Service Processes
Psychological Approaches to Services
Self Organizing Infrastructure
Sensing of Human Behaviors
Service-centric business models and their economics
Service discovery, repository and registry
Service Engineering
Service evaluation, measurements and delivery audit
Service interaction, service ontologies and service composition
Service Marketing
Service-Oriented Architecture
Service Oriented computing
Soft Computing
Society and business services (public, utility, business, healthcare, consulting, etc.)
Sustainable Frameworks
Swarm Intelligence
Ubiquitous and pervasive services (technology, context, security)
Value Creation in Services
Web-based basics on service modeling, deployment and maintenance

SLAECE: Social and Legal Aspect of Internet Computing

Principles, theories, and challenges of legal and social aspects
Strategies, modeling, and requirements engineering of legal and social aspects
Architectures, implementations, and deployment consideration of legal and social aspects
Cyber threats, emerging risks, systemic concerns, and emergency preparedness
Social computing and lifestyle computing
Service marketing and customer relationship management
Market structures and emerging business models
Emerging legal issues due to new computing environment
File / information sharing networks and user behavior
Knowledge modeling, management, and application
Negotiation and contracting as well as contract monitoring and enforcement
E-democracy, e-policy, and governance
Legal and social ontologies
Privacy and copyright in collaborative environments and social networks
Intellectual property rights
Trust, security, and privacy
Counterfeit forensic
Identity management and access control
Security and privacy in location-based services

VEWAeL: Virtual Environments and Web Applications for eLearning

Web Technologies and Tools for Educational Purposes
Services for E-Learning Platforms
Virtual Learning Environments (VLE)
Course Management Systems
Web applications for Teaching
Social Implications of E-Learning
Lifelong E-learning
Teaching-Learning Experiences using the Internet for Educational Purposes
E-learning in the European Higher Education Area (EHEA) and other HE contexts
Web protocols for VLE
Security for VLE
QoS for VLE
Storage management in VLE

ECC: Enterprise cloud computing

Architectures for enterprise clouds
Principles, concepts and methodologies of enterprise cloud computing
Tools, technologies, methodologies and frameworks for enterprise cloud computing
Enterprise IS architectures such as application, information and technology architectures
Synergies between SOA, Grid Computing and Cloud Infrastructures
Quality of Service (QoS) models
‘Elastic’ and on-demand allocation and management of resources to meet business needs
Benefits, issues and limitations of enterprise clouds
Security, data integrity, legal and governance issues for enterprise clouds
Management, monitoring an governance issues
Portability of architectures, applications and data between cloud providers
Reliability and maintenance of cloud-based business architectures
Architectures for Software as a Service, Platform as a Service and Infrastructure as a Service
Network architecture using Storage Clouds
Experience reports with designing, building and using Cloud infrastructure
Novel application architectures, best practices, case studies and surveys


Authors of selected papers will be invited to submit extended versions to one of the IARIA Journals.

Publisher: XPS (Xpert Publishing Services)
Archived: ThinkMindTM Digital Library (free access)
Submitted for indexing:
– ISI Thompson Conference Proceedings Citation Index (CPCI)
– Elsevier’s EI Compendex Database, EI’s Engineering Information Index
– DBLP, IET INSPEC, and other relevant specialized indexes.
– Other indexes are being considered

Important deadlines:

Submission (full paper) January 5, 2012
Notification February 23, 2012
Registration March 7, 2012
Camera ready March 7, 2012
Only .pdf or .doc files will be accepted for paper submission. All received submissions will be acknowledged via an automated system.


Regular Papers (up to 6-10 page article)

Final author manuscripts will be 8.5″ x 11″, not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Helpful information for paper formatting can be found on the here.

Your paper should also comply with the additional editorial rules.

Once you receive the notification of paper acceptance, you will be provided by the publisher an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.

Work in Progress (short paper up to 4 pages long)

Work-in-progress contributions are welcome. Please submit the contributions following the instructions for the regular submissions using the “Submit a Paper” button and selecting the contribution type as work in progress. Authors should submit a four-page (maximum) text manuscript in IEEE double-column format including the authors’ names, affiliations, email contacts. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings.

For more details, see the Work in Progress explanation page

Posters (poster or collection of 6 to 8 slides, including industrial presentations)

Posters are intended for ongoing research projects, concrete realizations, or industrial applications/projects presentations. Acceptance will be decided based on a 1-2 page abstract and/or 6-8 .pdf slide deck submitted through the conference submission website. The poster may be presented during sessions reserved for posters, or mixed with presentation of articles of similar topic. The slides must have comprehensive comments. One big Poster and/or the associated slides should be used for discussions, once on the conference site.

For more details, see the Posters explanation page.

Ideas (2 page proposal of novel idea)

This category is dedicated to new ideas in their early stage. Contributions might refer to PhD dissertation, testing new approaches, provocative and innovative ideas, out-of-the-box, and out-of-the-book thinking, etc. Acceptance will be decided based on a maximum 2 page submission through the conference submission website. The contributions for Ideas will be presented in special sessions, where more debate is intended. The Idea contribution must be comprehensive, focused, very well supported (details might miss, obviously). A 6-8 slide deck should be used for discussions, once on the conference site.

For more details, see the Ideas explanation page.

Technical marketing/business/positioning presentations

The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will not be published in the conference’s CD Proceedings. Presentations’ slide decks will be posted on the IARIA’s site. Please send your presentations to


Tutorials provide overviews of current high interest topics. Proposals should be for three hour tutorials. Proposals must contain the title, the summary of the content, and the biography of the presenter(s). The tutorials’ slide decks will be posted on the IARIA’s site. Please send your proposals to

Panel proposals

The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies. The panel’s slide deck will be posted on the IARIA’s site.

For more information,

Workshop proposals

We welcome workshop proposals on issues complementary to the topics of this conference. Your requests should be forwarded to

Posted in Conferences | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Call For Papers: Soft Computing Journal Special Issue on Evolutionary Computing & Complex Systems (ECCS 2012)

Special issue of the Soft Computing Journal

Evolutionary Computing & Complex Systems


The large-scale use and applicability of evolutionary computing for complex real-life systems and applications determined a need for ensuring solid theoretical grounds, providing sensitivity, resilience or error propagation analysis results.

The aim of this special issue is to build a bridge between probabilities, statistics, set oriented numerics and evolutionary computing, as to identify new common and challenging research aspects useful for highly complex systems. Out of control stochastic factors, uncertainty or error propagation, are all potential pathways for hazardous conditions or catastrophic failures when dealing with complex systems in financial markets, nuclear plants, surveillance and defense, etc. Similarly, the handling of large quantities of data may require the use of distributed environments where the probability of failure and the stability of the algorithms may need in-depth study. Therefore, algorithms capable of delivering robust solutions in the presence of erroneous or abnormal inputs, resilient to failures or with performance guarantees, evolved to be of crucial importance when applied to such systems.

The special issue will primarily focus on the solutions provided for highly complex systems by applied and theoretical evolutionary computation that advance the research in the field. The topics of interest include, but are not limited to:

· performance guarantee factors for large scale / highly multi-modal problems
· performance guarantees measures for existing algorithms
· highly complex systems optimization
· robust methods for large scale, high dimensional problems
· theoretical tools, components that ensure the robustness in practice
· mathematical objects and evolutionary programming
· robust / fast estimation of mathematical quantities
· particle methods, Markov Chain Monte Carlo methods
· spatial complexity of methods and its implications in practice
· robustness of parallel and distributed evolutionary optimization
· self-tuning, self-adaptive techniques
· particular issues (e.g. landscape analysis)
· swarm intelligence
· real-world applications

Important Dates

Submission of manuscripts: Jan 15, 2012
First revision notification: Apr 30, 2012
Submission of revised manuscripts: May 31, 2012
Second revision notification: Jun 15, 2012
Submission of final manuscripts: Jun 30, 2012
Final notification: Jul 15, 2012
Expected publication: End 2012

Notes for Prospective Authors

Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. For any additional information please contact Alexandru-Adrian TANTAR or Emilia TANTAR. A guide for authors, aims and scope of the Soft Computing Journal and other relevant information for submitting papers are available online at the following address:
Manuscripts have to be submitted online via

A PDF version of this call is available at

Guest Editors

Alexandru-Adrian Tantar Emilia Tantar Pascal Bouvry
University of Luxembourg University of Luxembourg University of Luxembourg
Luxembourg Luxembourg Luxembourg

Oliver Schütze Carlos Coello Coello
Mexico City, Mexico Mexico City, Mexico

Pierre Del Moral
INRIA Bordeaux-Sud Ouest
Université Bordeaux I
Head of ALEA Team

Editor-in-Chief Co-Editor-in-Chief

Antonio Di Nola Vincenzo Loia
E-mail: E-mail:
Universitá di Salerno Universitá di Salerno
Salerno, Italy Salerno, Italy

Posted in Conferences | Tagged , , , , , | Leave a comment

Call For Papers: IEEE Symposium on Security and Privacy (S&P 2012)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

We solicit previously unpublished papers offering novel research contributions in any aspect of computer security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation of secure systems.

Topics of interest include:
Access control Accountability
Anonymity Application security
Attacks and defenses Authentication
Censorship and censorship-resistance Distributed systems security
Embedded systems security Forensics
Hardware security Intrusion detection
Language-based security Malware
Metrics Network security
Privacy-preserving systems Protocol security
Secure information flow Security and privacy policies
Security architectures System security
Usability and security Web security

This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review. See back for detailed submission instructions.
Systematization of Knowledge Papers

Following the success of the previous year’s conferences, we are also soliciting papers focused on systematization of knowledge (SoK). The goal of this call is to encourage work that evaluates, systematizes, and contextualizes existing knowledge. These papers will provide a high value to our community but would otherwise not be accepted because they lack novel research contributions. Suitable papers include survey papers that provide useful perspectives on major research areas, papers that support or challenge long-held beliefs with compelling evidence, or papers that provide an extensive and realistic evaluation of competing approaches to solving specific problems. Submissions will be distinguished by a checkbox on the submission form. They will be reviewed by the full PC and held to the same standards as traditional research papers, except instead of emphasizing novel research contributions the emphasis will be on value to the community. Accepted papers will be presented at the symposium and included in the proceedings.


When May 20, 2012 – May 23, 2012
Where San Francisco Bay Area
Submission Deadline Nov 16, 2011
Notification Due Feb 1, 2012
Final Version Due Mar 5, 2012
Posted in Conferences | Tagged , , , , , , , | Leave a comment