Wednesday 31 December 2014

The International Conference on Electrical and Bio-medical Engineering, Clean Energy and Green Computing (EBECEGC2015)

The International Conference on Electrical and Bio-medical Engineering, Clean Energy 
and Green Computing (EBECEGC2015)

Dubai, UAE, on January 28-30, 2015



All registered papers will be included in SDIWC Digital Library
==============================================================

The submission is open from now until Jan. 08, 2015.

Paper submission link: http://goo.gl/lhRxTv

Researchers are encouraged to submit their work electronically. Full paper must be submitted (Abstracts are not acceptable).

==============================================================

Looking forward to receive your papers related to Electrical/ Bio-medical Engineering and  Clean Energy/Green Computing.

Tuesday 30 December 2014

The 24th International Conference on Computer Communication and Networks (ICCCN 2015)

Call for Papers – ICCCN 2015

The 24th International Conference on Computer Communication and Networks (ICCCN 2015)
August 3 – August 6, 2015
Las Vegas, Nevada, USA

ICCCN is one of the leading international conferences for presenting novel ideas and fundamental advances in the fields of computer communications and networks. ICCCN serves to foster communication among researchers and practitioners with a common interest in improving computer communications and networking through scientific and technological innovation. ICCCN is technically co-sponsored by the IEEE Communications Society. 

Scope:

The primary focus of the conference is on new and original research results in the areas of design, implementation, and applications of computer communications and networks. Topics of interest include, but are not limited to, the following:

* Cognitive, Cellular and Mobile Networks (CCM)
* Communication Architecture, Algorithms, Modeling and Evaluation (CAAME)
* Data Centers and Big Data Computing (DCBC)
* Green Networks and Sustainable Computing (GREEN)
* Grid, Cloud, Internet and Peer-to-peer Computing and Communication (GCIP)
* Internet of Things (IoT)       
* Multimedia and Real-Time Networking (MRN)
* Security, Privacy, and Trust (SPT)
* Sensor/Embedded Networks and Pervasive Computing (SNPC)
* Software Defined Networks and Network Testing and Deployment (SDN)
* Wireless LAN, Ad Hoc, and Mesh Networks (WAM)
* Hot Topics in Networking (HOT)

Instructions for Authors:

Submitted manuscripts must be formatted in standard IEEE camera-ready format (double-column, 10-pt font) and must be submitted via EasyChair (http://www.easychair.org/) as PDF files (formatted for 8.5x11-inch paper). The manuscripts should be no longer than 8 pages. Up to two additional pages are permitted if the authors are willing to pay extra charge at the time of publication (manuscripts should not exceed 10 pages in total). Submitted papers should not be previously published in or be under consideration for publication in another conference or journal. Paper titles and/or author names cannot be changed and/or added to the papers once papers are submitted to ICCCN 2015 for review. The Program Committee reserves the right to not review papers that either exceed the length specification or have been submitted or published elsewhere. Submissions must include a title, abstract, keywords, author(s) and affiliation(s) with postal and e-mail address(es). A paper abstract must be registered on EasyChair by the deadline indicated below.

Review and Publication of Manuscripts:

Submitted papers will be reviewed by the TPC and judged on originality, technical correctness, relevance, and quality of presentation. An accepted paper must be presented at the conference venue by the registered author at the full registration rate. Each full registration covers up to two papers authored by the registered author. “Accepted and presented papers will be published in the conference proceedings and submitted to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases.” Papers of special merit will be selected for possible fast track publication.

Workshops:

·         Workshop on Network Services and Applications: Big Data and e-Health (BDeHS);
·         Workshop on Context-aware QoS Provisioning and Management for Emerging Networks, Applications and Services(ContextQoS);
·         Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST);
·         Workshop on Wireless Mesh and Ad-hoc Networking (WiMAN);
·         Workshop on Manageability and Security of Software Defined Network and Network Function Virtualization (MASONS);

Please note that the page limit for the workshop program is different. Workshop papers should be no longer than 6 pages with up to two extra pages given the authors are willing to pay extra page charge. The detailed info can be found in the workshop Call for Papers (workshop links at the ICCCN 2015 website). For any questions or additional information, please contact the General, TPC, or Workshop Chairs.

Important Dates:

February 19, 2015:             Abstract Due
February 26, 2015:             Paper Due
April 13, 2015:     Acceptance Notification
May 8, 2015:                         Camera Ready Due

General Chairs:          

Min Song, Michigan Technological University, USA (mins@mtu.edu)
Zhisheng Niu, Tsinghua University, China (niuzhs@tsinghua.edu.cn)

Program Chairs:        

Aaron Striegel, University of Notre Dame, USA (striegel@nd.edu)
Kewei Sha, Oklahoma City University, USA (ksha@okcu.edu)

Workshop Chairs:     

Mike Wittie, Montana State University, USA (mwittie@cs.montana.edu)
Wei Cheng, Virginia Commonwealth University, USA (wcheng3@vcu.edu)

Publicity Chairs:

Habib M. Ammari, University of Michigan-Dearborn, USA
Liqiang Zhang, Indiana University – South Bend, USA

Publications Chairs:

Bo Sheng, University of Massachusetts-Boston, USA
Bin Tang, Wichita State University, USA

Webmaster:

Chenren Xu, Carnegie Mellon University, USA

Special issue for Enterprise Security for 2 journals, IJOCI and OJBD

International Journal of Organizational and Collective Intelligence (IJOCI), suggested deadline, end of Feb 2015:
http://www.igi-global.com/calls-for-papers-special/international-journal-organizational-collective-intelligence/1140

Open Journal of Big Data (OJBD) for Enterprise Security in Big Data (ESiBD-2015), suggested deadline or later (with permissions granted):
http://www.ronpub.com/index.php/journals/ojbd/special-issues/upcoming-special-issues

If your paper will be accepted following our vigorous review process, those who submit early will get waiver from OJBD. Those who submit to IJOCI, will be based on the first-come-first serve basis.
Details about the scope, topics, our motivation and impacts of our research contributions are available at the end of this email.

For those who are interested to visit our social network sites to see our recent events, activities and visions, you can go to:
Facebook: https://www.facebook.com/ES2014ECs2015
LinkedIn: https://www.linkedin.com/groups/Enterprise-Security-international-workshop-8147153
Twitter: https://twitter.com/ES_ESaaSA_works

Many thanks again for your considerations and interests. Happy New Year! Thanks and regards.

Dr. Victor Chang,
Editor-in-Chief, OJBD and IJOCI


Scope:

Enterprise security is the key to achieving global information security in business and organizations. Cloud computing is a new paradigm for enterprise where businesses need to be secured. However, this new trend needs to be more systematic with respect to cloud security, which is a factor in sustaining cloud technology by building-in trust. For example, current challenges with cyber security and application security flaws are highlighting important lessons to be learned and also lead to the adoption of best practices. Similarly, as the demand for cloud services increases, the importance of security and privacy will also increase.

One solution is to develop a framework for enterprise security to analyze and model organizational security of the cloud and its data. In particular, cloud data and cloud storage technologies (Amazon s3, drop box, Google drive, etc.) have now become normal practice for almost every computing user. This can explain why building trust for cloud users is one of the main focuses of cloud computing research. On the other hand, the social, human and business aspects of enterprise security are essential to users to keep their skills, business concepts and policies up-to-date. By maintaining all these aspects of security, organizations can develop an enterprise security solution to work together with business models, such as cloud provider enterprise model and cloud consumer enterprise model. In this way, enterprise security can address technical and organizational aspects of security to provide added value and win-win situations for users, adopters and service providers.

By blending technical and organizational aspects of security, our workshop can provide a platform for intellectual discussions and interactions. To highlight the significance of enterprise security and disseminate research contributions in cloud community, we welcome papers addressing technical (implementations, algorithms, experiments, simulation, modeling and prototypes) and organizational (information system related issues, recommendation and best practices, frameworks, risks) issues.

Topics:

Algorithms, software engineering and development
System design and implementation
Testing (software; penetration; product development)
Encryption, access control, identity management
Experiments of using security solutions and proof-of-concepts
Large-scale simulations in the Cloud and Big Data
Intrusion and detection techniques
Risk Modeling, business process modeling
Trust and privacy
Data security, disaster recovery
Data center management
Adoption challenges and recommendation
Risk management and control
Business models
Change management
Information systems related issues
Conceptual frameworks and models
Emerging issues and recommendations for organizational security
E-Commerce and online banking
Social network analysis, emerging issues in social networks
Education and e-Learning
Surveys and their quantitative analysis
Architecture (technical or organizational)
Case studies
The focus of this workshop is to present new techniques, demonstrations, innovative approaches and case studies related to Enterprise Security. The impacts of research contributions are as follows.

- Explain how to implement enterprise security and their added values.
- Demonstrate how enterprise security can be used in different case studies.
- Describe how to resolve challenges in each adoption scenario.
- Provide reproducible steps for anyone to follow, and support reproducibility, an important aspect in Cloud Computing science.
- Explain how their Cloud services can work effectively in production and real-time
- Present how their services can make contributions to users involved in the use of Cloud services and adoption.
- Sum up and disseminate all the lessons learned and recommendation to play an influential role in academia and industry.

Monday 29 December 2014

SpringSim 2015 - Work in Progress session

Part of the SPRING SIMULATION MULTI-CONFERENCE 2015
(http://www.scs.org/springsim)
April 12-15, 2015
The Westin Alexandria; Alexandria, VA, USA (Washington DC Area)

With over 330 submissions already under evaluation for SpringSim, we are
currently seeking outstanding submissions for presentation in a work in
progress session. These papers should present work that is currently in
progress or not quite ready for full-length articles. Student papers are
especially welcome as this track provides an excellent forum for graduate
students to present and get feedback for thesis, project or dissertation
work. All papers will undergo a review by the Symposium Chairs and accepted
papers in this track will also be published in the Springsim'15 conference
proceedings.

Paper submission is encouraged in any modeling and simulation related areas
including but not limited to the below:
o       Computer/Communication Networks with Special Emphasis on Modeling
and Simulation
o       Numerical Simulation and Optimization as Applied to Business and
Industry
o       Use of Modeling and Simulation in the Area of Computer Security
o       Modeling and Simulation in the area of Neural Networks
o       Modeling and Simulation related to Image/Video
Compression/Processing and Robotic Vision
o       Any Aspect of Modeling and Simulation related to the Military
Modeling, Analysis and Simulation of Telecommunication Systems
o       Web-based Modeling and Simulation
o       High-performance Computing and Simulation
o       Network/Internet Traffic Modeling and Workload Characterization
o       Simulation Languages, Tools, and Environments
o       Simulation of Parallel Systems, Distributed Systems and Databases
o       Simulation of Clusters, Grids and Wireless Systems
o       Simulation of Multimedia Applications and Systems
o       Modeling and Simulation of Real-Time and Embedded Systems
o       Simulation Methodology, Theory and Philosophy
o       Parallel and Distributed Simulators and Simulation Techniques
o       Application of Modeling and Simulation in Biology
o       Discrete Event Modeling and Simulation

Prepare a 4 to 6 page paper using the Paper Formatting Guidelines for the
conference. Each paper must have the designation "WIP" in the title.  All
final paper submissions are to be made electronically to SCS via the SCS
Conference Proceedings Management System at:
http://www.softconf.com/scs/SpringWIP15/

IMPORTANT DATES:
Paper Submission - January 9, 2015
Notification of Acceptance - January 24, 2015
Camera-Ready Paper Due - February 10, 2015

Happy 2015!

CFP: The 4th IEEE Non-Volatile Memory Systems and Applications Symposium (NVMSA)

    Call for Papers

The 4th IEEE Non-Volatile Memory Systems and Applications Symposium (NVMSA)
Hong Kong, August 19-21, 2015, 
In Conjunction with RTCSA-2015 

Non-Volatile memory (NVM) technologies have demonstrated great potentials on improving many aspects of present and future memory hierarchy, offering high integration density, larger capacity, zero standby power and good resilience to soft errors. The recent research progress of various NVMs, e.g., NAND flash, PCM, STT-RAM, RRAM, FeRAM, etc., have drawn tremendous attentions from both academy and industry. Besides developing robust and scalable devices, the unique characteristics of these NVM technologies, such as read-write asymmetry, stochastic programming behavior, performance-power-nonvolatility tradeoff etc., introduce plenty of opportunities and challenges for novel circuit designs, architectures, system organizations, and management strategies. There is an urgent need of technology invention, modeling, analysis, design and application of these NVMs ranging from circuit design level to system level.

IEEE Non-Volatile Memory Systems and Applications Symposium (NVMSA) provides a fantastic opportunity for global nonvolatile memory researchers from different communities to discuss and exchange knowledge, ideas, and insights, and to facilitate the establishment of potential collaborations that can speed up the progress in the design and application of NVMs. An expanded technical program will be offered in NVMSA 2015 for the audience from academy and industry. The organizing committee is soliciting various topics on related to NVMs including (but not limited to):

Device/Circuit design of NVMs
* Emerging Non-volatile Memory Circuit Design
* NVM Device Design
* Error correction for NVMs
* Nonvolatile Logic Circuit Design
* Low-Power NVM Circuit

NVM Architectures and Systems
* Non-volatile Registers
* Non-volatile Memory Architectures 
* Non-volatile Cache Design 
* NVM-based Neuromorphic Architectures
* NVM-based Storage 
* NVDIMM 

NVM Software  
* Operating System Support for NVM
* Compiler Optimization for NVM
* NVM-based File Systems 
* NVM-based Storage Software 
* NVM-based Databases
* NVM Controller Design

NVM Applications  
* In-memory Computing
* NVM for Big Data Analytics
* NVM in Mobile Healthcare Applications
* NVM in Wearable Applications
* NVM and the Internet of Things

The topics of NVMSA cover the research and development advances in both mainstream and emerging NVMs. The event is designed to foster interaction and presentation of early results, new ideas and speculative directions. Thus, NVMSA will combine the presentations of the papers accepted from the regular submissions as well as a number of invited talks from researchers in academia, technologists from industry, and case studies on the use of NVMs. Participating authors are invited to submit six-page manuscripts to the conference and all accepted papers will be published in the conference proceeding. Conference content will be submitted for inclusion into IEEE Xplore as well as other Abstracting and Indexing (A&I) databases. The extensions of some selected papers will be published in a special issue of The Journal of Systems Architecture: Embedded Software Design.

Important Dates
March 3:  Abstract Submission Deadline        
March 10: Paper Submission Deadline
May 25: Acceptance notification                     
June 25: Camera ready 

Call For Papers - IEEE BigDataSecurity 2015

 CALL FOR PAPERS

            BigDataSecurity 2015
            The IEEE International Symposium on Big Data Security on Cloud
   
       http://csis.pace.edu/bigdatasecurity/
             August 24-26, 2015, New York, USA

***********************************************************************************
Important Dates 
Paper submission due: May 1, 2015
Acceptance notification: June 15, 2015
Camera-ready due: July 15, 2015
Author registration: July 20. 2015
Conference: Aug. 24-26, 2015

Scope and Topics of Interest 
The emerging paradigm of cloud computing provides a new way to address the constraints of limited energy, capabilities, and resources. Researchers and practitioners have embraced cloud computing as a new approach that has the potential for a profound impact in our daily life and world economy. 
About 40% data globally would be related to cloud computing by 2020, as estimated by IDC. The large volume of data has big complexity and variety.  To avoid system fragility and defend against vulnerabilities exploration from cyber attacker, various security techniques and tools have been developed for Big Data on cloud. There are two important aspects of Big Data Security, especially in cloud computing environment. One is how to protect big data, the other is how to using big data analytic technique to enhance security of the whole system. 
The objective of BigDataSecurity 2015 is to provide a forum for scientists, engineers, and researchers to discuss and exchange their new ideas, novel results, work in progress and experience on all aspects of Big Data Security on cloud. Topics of particular interest include, but are not limited to:
    -Big data model in New Paradigms
    -Big data security
    -Big data privacy
    -Big data storage, integration, service, mining
    -Big data security applications, such as healthcare, transportation, environment, education, business, library, media, finance, etc.
    -Cyber hacking, next generation fire wall
    -Cyber monitoring, incident response
    -Database security, data center security
    -Social engineering, insider threats, advance spear phishing
    -Cyber threat intelligence
    -Security and fault tolerance for embedded or ubiquitous systems
    -Tele-health security
    -Sensor network security
    -Security policy and legal considerations
    -Cloud and networking security
    -Cloud computing and networking models
    -Virtualization for big data on cloud
    -MapReduce with cloud for big data processing
    -Heterogeneous architecture for cloud computing 
    -Dynamic resource sharing algorithm for cloud computing
    -Load balance for cloud computing 
    -Mobile cloud computing
    -Green cloud computing
    -Embedded networks and sensor network optimizations
    -Cyber Security in emergent technologies, infrastructures and applications

PAPER SUBMISSION AND PUBLICATION
Submissions should include abstract, 5-10 keywords, and the e-mail address of the corresponding author and be in PDF format. Each submission must not exceed 6 pages in the IEEE 8.5’’ x 11’’ two-column format with 10-12 point font (Template: DOC or LaTeX), including tables and figures. Each accepted paper needs at least one author to register in the conference. Each submission should be regarded as an undertaking that, should the submission be accepted, at least one of the authors must attend the conference to present the work in order that the accepted paper can be put into digital library. The final version of an accepted paper will be limited to 10 pages in IEEE proceeding format. Please submit papers in PDF format through the BigDataSecurity web site. Manuscript should be prepared following the IEEE Computer Society Press Proceedings. Author Guidelines that can be found at: http://www.computer.org/portal/pages/cscps/cps/cps_forms.html
The accepted papers have to be presented orally at the conference and will be published by IEEE Computer Society Press (indexed by EI) and included in IEEE Digital Library. Selected best papers will be recommended to the special issues of well-regarded SCI journals..

***********************************************************************************
ORGANIZING COMMITTEE

General Chair 
    Albert Zomaya, University of Sydney, Australia
Program Chair 
    Bhavani Thuraisingham, University of Texas at Dallas, USA
    Yongxin Zhu, Shanghai Jiaotong University, China
Publication Chair 
    Bin Wang, Wright State University, USA
Publicity Chair 
    Jingtong Hu, Oklahoma State University, USA
Local Chair 
    Meikang Qiu, Pace University, USA
Web Chair 
    Keke Gai, Pace University, USA
Steering Committee
    Albert Zomaya, University of Sydney, Australia
    Bhavani Thuraisingham, University of Texas at Dallas, USA
    Meikang Qiu, Pace University, USA
    Yongxin Zhu, Shanghai Jiaotong University, China

Call for Papers - 23. WSCG2015 - Conf.on Graphics, Visualization & Vision - Call for Papers-Sumission: March5, 2015

WSCG 2015 – Call for Papers
23rd Conference on Computer Graphics, Visualization and Computer Vision 2015
(http://www.wscg.eu – WSCG events)
Eurographics, ACM and ACM SIGGRAPH listed
http://www.wscg.cz

to be held at Primavera Congress Center, Pilsen, Czech Republic
(Plzen [Pilsen] - the European City of Culture 2015 and city where BEER was born)
close to Prague – the Golden European City

June 8-12, 2015.

Conference Co-Chairs
------------------------
Marina L. Gavrilova, University of Calgary, Canada
Vaclav Skala, University of West Bohemia, Czech Republic

Important Dates:
-------------------
Workshop proposal:               EXTENDED: January 20, 2015 January 8, 2015
(see WEB pages for details)
Paper submission:                  March 5, 2015
Acceptance notification:          April 14, 2015
Venue:                                  June 8-12, 2015

Download PDF version of the WSCG 2015 Call for Papers at
http://wscg.zcu.cz/wscg2015/WSCG-CfP.pdf

MAIN TOPICS
---------------
Computer graphics, scientific and medical visualization, computer vision, image processing, pattern recognition, GPU graphics, graphical human computer interfaces, geometric modelling, rendering and animation, virtual reality, haptic systems, medical imaging, graphical interaction, computational photography, data compression for graphics, image based rendering, mathematical methods for graphics and vision, physically based modelling, shape analysis & modelling & retrieval, surface and volume parameterization, parallel graphics, CAD, CAGD and GIS systems and related topics.

Other related events
-------------------------
GraVisMa – Computer Graphics, Vision and Mathematics – http://www.GraVisMa.eu
HCI-Europe – Human Computer Interfaces – Europe – http://www.HCI-Europe.eu

Publications
---------------
Accepted and presented papers will be published in WSCG proceedings with ISBN and submitted for indexing to Thomson Reuters, SCOPUS and others.

The best papers will be selected for publication in the Journal of WSCG - ISSN 1213-6972 (http://wscg.zcu.cz/JWSCG/)

ALL WSCG proceedings and Journal of WSCG since 1992 are available at http://wscg.zcu.cz/DL/wscg_DL.htm, access free – no access restriction.

Travelling
------------
The Pilsen City - the Golden European City 2015 - . is close to Prague (Praha),
approx. 80km from the Plzen city (60 mins. by a coach). To reach the Pilsen city from the Prague Airport is approx. 75 mins. by public transport (coach) – actually faster than to reach Prague central parts.

Call for new reviewers:
--------------------------
If you or colleague of yours would like to help us as a reviewer for WSCG events, please, send:
- First Name, Last Name, @mail, URL of  the proposed person home page
by @mail to skala@kiv.zcu.cz subj. WSCG - Reviewing


Feel free to contact me if you would have any question
Prof.Vaclav Skala
c/o University of West Bohemia, Faculty of Applied Sciences, Comp.Sci.Dept.
http://www.VaclavSkala.eu
skala@kiv.zcu.cz – SUBJ.: WSCG 2015



hpc-announce@mcs.anl.gov


---
This email is free from viruses and malware because avast! Antivirus protection is active.
http://www.avast.com