Dear TC6 friends,
I wish you all my best wishes for 2007!
Relax a bit during the Xmas Holidays (if you have
any), because we'll soon have to work hard to
rescue IFIP (TC6) :-)
Best regards,
Guy
--
________________________________________________________________________
Prof. Guy Leduc Phone : +32 4 366 26 98
Université de Liège Secr : +32 4 366 26 91
Réseaux Informatiques Fax : +32 4 366 29 89
Research Unit in Networking (RUN) Email: Guy.Leduc(a)ulg.ac.be
EECS Department, Institut Montefiore, B 28, B-4000 LIEGE 1, BELGIUM
http://www.run.montefiore.ulg.ac.be/People/GuyLeduc/
Interested in an open source toolbox for network traffic engineering?
Try TOTEM: http://totem.run.montefiore.ulg.ac.be/
Dear All,
I received the following greeting from a lawyer friend:
Please accept with no obligation, implied or implicit, my best wishes for an
environmentally conscious, socially responsible, low stress, non-addictive,
gender neutral celebration of the summer solstice holiday, practiced with
the most enjoyable traditions of religious persuasion or secular practices
of your choice with respect for the religious/secular persuasions and/or
traditions of others, or their choice not to practice religious or secular
traditions at all.
I also wish you a fiscally successful, personally fulfilling and medically
uncomplicated recognition of the onset of the generally accepted calendar
year 2007, but not without due respect for the calendars of choice of other
cultures whose contributions to society have helped make our country great
(not to imply that South Africa is necessarily greater than any other
country) and without regard to the race, creed, color, age, physical
ability, religious faith or sexual preference of the wishee.
By accepting this greeting, you are accepting these terms :-
This greeting is subject to clarification or withdrawal. It is freely
transferable with no alteration to the original greeting. It implies no
promise by the wisher to actually implement any of the wishes for
her/himself or others and is void where prohibited by law, and is revocable
at the sole discretion of the wisher. This wish is warranted to perform as
expected within the usual application of good tidings for a period of one
year or until the issuance of a subsequent holiday greeting, whichever comes
first, and warranty is limited to replacement of this wish or issuance of a
new wish at the sole discretion of the wisher.
Disclaimer: No trees were harmed in the sending of this message; however, a
significant number of electrons were slightly inconvenienced.
The same message from me:
Happy Christmas and a great 2007.
==================================
Koos Koen
Business School of Entrepreneurship (Pty) Ltd.
Block A, Wedgefield Office Park,
17 Muswell Road,
Bryanston. 2021.
PO Box 783003, Sandton.2146. South Africa.
Tel: +27(0)11 317 3777 Fax: +27(0)11 317 3778
Mobile +27(0)824436430 <BLOCKED::mailto:koos@bsoe.co.za>
koos(a)bsoe.co.za
===================================
---------- Forwarded message ----------
Date: Fri, 22 Dec 2006 12:51:57 -0200 (EDT)
From: Admin <adm(a)lrg.ufsc.br>
To: mycolleagues(a)grid.lrg.ufsc.br
Subject: CfP - IEEE GIIS 2007
Call for Papers
IEEE GIIS 2007
Global Information Infrastructure Symposium
Closing the Digital Divide
2-5 July, 2007; Marrakech, Morocco
http://www.giis2007.org/
Sponsored by the IEEE Communications Society,
Information infrastructure brings together information processing
applications, communications networks and services, physical and software
elements in networks, and end systems. The scope of GIIS covers the
interrelated technical, policy, and social issues implicit in the
development of national and international information infrastructures.
GIIS aims at identifying and promoting the exchange of knowledge on these
interrelated issues and to stimulate interdisciplinary symposium sessions
and workshops to discuss, built and further the use of local, regional and
global information infrastructures, with a particular focus on underserved
areas.
GIIS will provide a forum for the participants to broaden professional
contacts and for technical discussions on information infrastructure
issues.
The symposium also aims at establishing liaisons to bodies in the global
society, technical forums and international standards.
The technical issues addressed by the symposium include alternative
technologies for building the information infrastructure, broadband
access, convergence, interoperability at various levels, standard services
and user interfaces, world wide naming and addressing, and the
international mobility of persons and services. The policy issues
addressed by the symposium are those with a large technical element,
including protection of intellectual property, privacy and security, open
source software, international use of encryption technology, commercial
protocols, and standards vs. proprietary technologies. The symposium is
specifically interested in shareability, ubiquity, equal access, ease of
use, cost effectiveness, standards, and architectural openness.
The technical program of GIIS 2007 will include keynote talks, tutorials,
refereed paper presentations, workshops and multi-disciplinary panel
discussions.
Authors are invited to submit full or short papers presenting new research
related to the development of global Information and Communication
Infrastructures. All submissions must describe original research, not
published or currently under review for another conference or journal.
Areas of interest include, but are not limited to:
Networking:
----------
Next Generation Internet
Ad Hoc & Sensor Networks
Communications Switching & Routing
Cognitive Networks
Optical and Wireless Networking
Delay-tolerant Networks
Access Technologies:
-------------------
Transmission, Access and Optical Systems
Radio Communications
Cable, Satellite and Space Communications
Power Line Communications
Communication applications:
--------------------------
Multimedia Communications
Enterprise Networking
Personal Communications
Tactical Communications
Peer-to-peer & overlay networks
Home Networking
Software & services:
--------------------
Communications & Information Security
Autonomic & Adaptive Communications
Network Operations and Management
Communications Quality and Reliability
Policy and social implications:
------------------------------
Infrastructure Financing models
Social, Ethical and Legal Aspects
Information and Communication Technologies in Education, Agriculture, and
Environmental applications e-Commerce, e-Government and e-Health
Accepted papers will be published in the proceedings of the symposium. In
addition, the authors of the best symposium papers will be invited to
submit an extended version for possible publication in special issues of
International Journals.
Submission Instructions:
-----------------------
Paper submissions will be handled electronically through the JEMS
web-based system. Details about the submission process including
formatting instructions and IEEE Press templates are available at the
conference website. Accepted papers will be published in the conference
proceedings. In addition, authors of the best GIIS 2007 papers will be
invited to submit extended versions for possible publication in special
issues of International Journals
Important Dates:
---------------
Full/Short Papers Submission: February 15, 2007
Panels/Tutorials Submission: February 15, 2007
Authors Notification: April 15, 2007
Camera-Ready Due: May 15, 2007
Call for Papers
IEEE GIIS 2007
Global Information Infrastructure Symposium
Closing the Digital Divide
2-5 July, 2007; Marrakech, Morocco
http://www.giis2007.org/
Sponsored by the IEEE Communications Society,
Information infrastructure brings together information processing
applications, communications networks and services, physical and software
elements in networks, and end systems. The scope of GIIS covers the
interrelated technical, policy, and social issues implicit in the
development of national and international information infrastructures.
GIIS aims at identifying and promoting the exchange of knowledge on these
interrelated issues and to stimulate interdisciplinary symposium sessions
and workshops to discuss, built and further the use of local, regional and
global information infrastructures, with a particular focus on underserved
areas.
GIIS will provide a forum for the participants to broaden professional
contacts and for technical discussions on information infrastructure
issues.
The symposium also aims at establishing liaisons to bodies in the global
society, technical forums and international standards.
The technical issues addressed by the symposium include alternative
technologies for building the information infrastructure, broadband
access, convergence, interoperability at various levels, standard services
and user interfaces, world wide naming and addressing, and the
international mobility of persons and services. The policy issues
addressed by the symposium are those with a large technical element,
including protection of intellectual property, privacy and security, open
source software, international use of encryption technology, commercial
protocols, and standards vs. proprietary technologies. The symposium is
specifically interested in shareability, ubiquity, equal access, ease of
use, cost effectiveness, standards, and architectural openness.
The technical program of GIIS 2007 will include keynote talks, tutorials,
refereed paper presentations, workshops and multi-disciplinary panel
discussions.
Authors are invited to submit full or short papers presenting new research
related to the development of global Information and Communication
Infrastructures. All submissions must describe original research, not
published or currently under review for another conference or journal.
Areas of interest include, but are not limited to:
Networking:
----------
Next Generation Internet
Ad Hoc & Sensor Networks
Communications Switching & Routing
Cognitive Networks
Optical and Wireless Networking
Delay-tolerant Networks
Access Technologies:
-------------------
Transmission, Access and Optical Systems
Radio Communications
Cable, Satellite and Space Communications
Power Line Communications
Communication applications:
--------------------------
Multimedia Communications
Enterprise Networking
Personal Communications
Tactical Communications
Peer-to-peer & overlay networks
Home Networking
Software & services:
--------------------
Communications & Information Security
Autonomic & Adaptive Communications
Network Operations and Management
Communications Quality and Reliability
Policy and social implications:
------------------------------
Infrastructure Financing models
Social, Ethical and Legal Aspects
Information and Communication Technologies in Education, Agriculture, and
Environmental applications e-Commerce, e-Government and e-Health
Accepted papers will be published in the proceedings of the symposium. In
addition, the authors of the best symposium papers will be invited to
submit an extended version for possible publication in special issues of
International Journals.
Submission Instructions:
-----------------------
Paper submissions will be handled electronically through the JEMS
web-based system. Details about the submission process including
formatting instructions and IEEE Press templates are available at the
conference website. Accepted papers will be published in the conference
proceedings. In addition, authors of the best GIIS 2007 papers will be
invited to submit extended versions for possible publication in special
issues of International Journals
Important Dates:
---------------
Full/Short Papers Submission: February 15, 2007
Panels/Tutorials Submission: February 15, 2007
Authors Notification: April 15, 2007
Camera-Ready Due: May 15, 2007
_______________________________________________
mycolleagues mailing list
mycolleagues(a)grid.lrg.ufsc.br
http://grid.lrg.ufsc.br/mailman/listinfo/mycolleagues
================================================================
CALL FOR PAPERS
RAID 2007
10th International Symposium on
Recent Advances in Intrusion Detection 2007
September 5-7, 2007
Crowne Plaza Hotel, Gold Coast, Queensland, Australia
Hosted by:
Information Security Institute,
Queensland University of Technology
Brisbane, Australia
http://www.isi.qut.edu.au/go/raid07
================================================================
Topics:
-------
This symposium, the 10th in an annual series, brings together leading
researchers and practitioners from academia, government, and industry
to discuss issues and technologies related to intrusion detection and
defense. The Recent Advances in Intrusion Detection (RAID)
International Symposium series is intended to further advances in
intrusion defense by promoting the exchange of ideas in a broad range
of topics. As in previous years, all topics related to intrusion
detection, prevention and defense systems and technologies are within
scope, including but not limited to the following:
* Intrusion detection and prevention techniques
* High-performance intrusion detection
* Intrusion detection in special environments (e.g., mobile networks)
* IDS cooperation and event correlation
* Formal models and analysis
* Attack response, countermeasures, and intrusion tolerance
* Survivability and self-protection
* Attacks against IDS and evasion
* Insider threat detection and mitigation
* Deception systems and honeypots
* Malicious code detection and containment
* Visualization techniques
* Intrusion detection assessment and benchmarking
* IDS interoperability standards and standardization
* Vulnerability analysis and risk assessment
* Legal and social issues
Important dates:
----------------
Deadline for paper submission: March 31st, 2007
Deadline for panel submission: May 5th, 2007
Notification of acceptance or rejection: June 1st, 2007
Final paper camera ready copy: June 16th, 2007
Deadline for poster abstract submission: July 7th, 2007
Notification for poster acceptance: July 23rd, 2007
Submissions:
------------
RAID 2007 invites four types of submissions:
1. Full papers presenting mature research results: Papers accepted for
presentation will be included in the RAID 2006 proceedings
published by Springer Verlag in its Lecture Notes in Computer
Science (http://www.springer.de/comp/lncs/index.html)
series. Papers are limited to 20 pages when formatted according to
the instructions provided by Springer Verlag
(http://www.springer.de/comp/lncs/authors.html), and must include
an abstract and a list of keywords.
2. Short papers presenting original work that has not yet reached the
maturity required for a full paper. These are limited to 10 pages
using the same format required for full papers. Short papers can
describe new research results or practical experience that
demonstrates the limitations and capabilities of existing
approaches to intrusion detection and network security. They will
be reviewed by the program committee, and accepted papers will be
included in the proceedings (in short form - not expanded to full
papers - and with "Short paper" in the title) and presented orally
during the symposium (in shorter speaking slots).
3. Posters describing work in progress: submissions must consist of a
one-page abstract.
4. Panel proposals for presenting and discussing hot topics in the
field of intrusion detection systems: The panel proposals should
include both an outline of the format of the panel and a short
rationale for the panel. Panels that include time for general
discussion and questions-answers between the panelists and the
audience are preferred.
All submissions (papers, panel, and poster proposals) must be
submitted electronically, details will be provided at a later
date. Papers should list all authors and their affiliations; in case
of multiple authors, the contact author must be indicated (RAID does
not require anonymized submissions). For accepted papers, it is
required that at least one of the authors attends the conference to
present the paper. Further questions on the submission process may be
sent to the program chair. Submissions must not substantially
duplicate work that any of the authors has published elsewhere or has
submitted in parallel to a journal or to any other conference or
workshop with proceedings. Simultaneous submission of the same work to
multiple venues, submission of previously published work, and
plagiarism constitute dishonesty or fraud. RAID, like other scientific
and technical conferences and journals, prohibits these practices and
may, on the recommendation of the program chair, take action against
authors who have committed them.
Organizing Committee:
---------------------
General Chair: George Mohay (Queensland University of Technology,
Australia; g.mohay(a)qut.edu.au)
Program Chair: Christopher Kruegel (Technical University Vienna,
Austria; chris(a)seclab.tuwien.ac.at)
Publication Chair: Andrew Clark (Queensland University of Technology,
Australia; a.clark(a)qut.edu.au)
Publicity Chair: Rei Safavi-Naini (University of Wollongong,
Australia; rei(a)uow.edu.au)
Sponsorship Chair: Ming-Yuh Huang (The Boeing Company, USA;
ming-yuh.huang(a)boeing.com)
Steering Committee:
Chair: Marc Dacier (Eurecom, France)
Herve Debar (France Telecom R&D, France)
Deborah Frincke (Pacific Northwest National Lab, USA)
Ming-Yuh Huang (The Boeing Company, USA)
Erland Jonsson (Chalmers, Sweden)
Wenke Lee (Georgia Institute of Technology, USA)
Ludovic Me (Supelec, France)
Alfonso Valdes (SRI International, USA)
Giovanni Vigna (UCSB, USA)
Andreas Wespi (IBM Research, Switzerland)
S. Felix Wu (UC Davis, USA)
Diego Zamboni (IBM Research, Switzerland)
Program Committee:
Michael Behringer (Cisco Systems Inc., France)
Sungdeok Cha (Korea Advanced Institute of Science and Technology, Korea)
Andrew Clark (Queensland University of Technology, Australia)
Marc Dacier (Eurecom, France)
Herve Debar (France Telecom R&D, France)
Ulrich Flegel (University of Dortmund, Germany)
Jonathon Giffin (Georgia Tech, USA)
Thorsten Holz (University of Mannheim, Germany)
Farnam Jahanian (University of Michigan and Arbor Networks, USA)
Richard A. Kemmerer (University of California, Santa Barbara, USA)
Kwok-Yan Lam (Tsinghua University, China)
Wenke Lee (Georgia Tech, USA)
Richard Lippmann (MIT Lincoln Laboratory, USA)
Raffael Marty (ArcSight Inc., USA)
Roy Maxion (Carnegie Mellon University, USA)
Ludovic Me (Supelec, France)
George Mohay (Queensland University of Technology, Australia)
Aloysius Mok (University of Texas, Austin, USA)
Benjamin Morin (Supelec, France)
Rei Safavi-Naini (University of Wollongong, Australia)
Robin Sommer (LBNL/ICSI, USA)
Dawn Song (Carnegie Mellon University, USA)
Salvatore Stolfo (Columbia University, USA)
Toshihiro Tabata (Okayama University, Japan)
Vijay Varadharajan (Macquarie University, Australia)
Giovanni Vigna (University of California, Santa Barbara, USA)
Jianying Zhou (Institute for Infocomm Research, Singapore)
Corporate Sponsors:
-------------------
We solicit interested organizations to serve as sponsors for RAID
2007, particularly in sponsorship of student travel and other expenses
for RAID. Please contact the Sponsorship Chair for information
regarding corporate sponsorship of RAID 2007.
Dear TC6 friends
Warm Greetings from Zimbabwe
Hope you all travel safely and have a great holiday season
All the very best
Jean
**************************************************************
Scanned by MailScan Anti-Virus and Content Security Software.
Visit http://www.mwti.net for more info on eScan and MailScan.
**************************************************************
International Conference on
COMPUTATIONAL METHODS IN SYSTEMS BIOLOGY
20th and 21st September 2007
Edinburgh, Scotland
http://conferences.inf.ed.ac.uk/cmsb07/
The CMSB (Computational Methods in Systems Biology) conference series
was established in 2003 to help catalyze the convergence of modellers,
physicists, mathematicians, and theoretical computer scientists from
fields such as language design, concurrency theory, program
verification, and molecular biologists, physicians, neuroscientists
interested in a systems-level understanding of cellular physiology and
pathology.
CMSB'07 solicits original research articles (including significant
works-in-progress), surveys of current research and posters. These may
cover theoretical or applied contributions that are motivated by a
biological question and can demonstrate either actual or potential
usefulness towards answering that question. They may also cover models
of computation inspired by biological processes; the motivation may be
as much computational as biological. Particularly relevant case
studies and open issues from the biological side that demands modeling
of systems are of interest as well. The introduction of formal models
should be supported by theoretical arguments about the model and/or on
the analyses that they enable, by comparisons with other network
models, and/or by examples of representation and analysis of a
biological system.
Topics of interest include, among others:
1. Biological systems and networks: inference, properties, modeling,
dynamics, simulation and reverse engineering
2. Formal methods for drug discovery and design
3. Methods to predict biological network behavior from incomplete
information
4. Models including symbolic evolution and learning
5. Models of self-assembly
6. Detailed case-studies on how a biological question was successfully
addressed using formal models
7. Emergence of properties in complex biological systems
8. Theoretical comparisons between different formal models of cellular
processes
9. Differential, discrete and/or stochastic modeling-language frameworks
10. Quantitative formal languages
11. Biologically-inspired extensions to concurrency theory, constraint
programming, logical methods or language equivalences
12. Computer models in nano-sciences applied to biological domains
13. Definition and study of theoretical properties of
biologically-inspired formal languages
14. Biological data bases and exchange formats for biological data and
standards
History
2006 held in Trento, chaired by Corrado Priami
2005 held in Edinburgh, chaired by Gordon Plotkin.
2004 held in Paris, co-chaired by Vincent Danos and Vincent Schachter
2003 held in Trento, chaired by Corrado Priami
Paper and poster submission guidelines
Authors are invited to submit original research papers or survey
papers of no more than 15 pages in PDF format using the LNCS
templates, available at the url below
http://www.springer.com/sgw/cda/frontpage/0,11855,5-164-2-72376-0,00.html
We also accept poster proposals in the form of a text-only abstract
describing the poster contents.
Papers and posters descriptions should be sent by e-mail to
cmsb07-papers(a)inf.ed.ac.uk
The subject line should be CMSB Paper: (Title of Paper).
The body of the e-mail should contain the title, authors and
affiliations, an abstract, and the themes to which the paper/poster
refers according to the topics of interest list. If no theme is
listed, please insert some keywords.
All submissions will be reviewed by the program committee. Accepted
papers will be included in the proceedings available at the
conference. Publication as an LNBI volume by Springer is under
negotiation.
Important Dates (deadlines are strict):
Submission of papers: May, 7
Notification of paper acceptance: June, 4
Revised version of papers due: July, 2
Submission of posters: July, 10
Notification of poster acceptance: July, 30
Venue
The conference will be held in Edinburgh (Scotland) at the e-Science
Institute. The dates are 20th and 21st September 2007.
Committees
Steering Committee
* Finn Drabløs, Norwegian University of Science and Technology,
Trondheim (Norway)
* Monika Heiner, TU Cottbus (Germany)
* Patrick Lincoln, Stanford Research International (US)
* Satoru Miyano, University of Tokyo (Japan)
* Gordon Plotkin, University of Edinburgh (UK)
* Corrado Priami, The Microsoft Research -- University of Trento
Centre for Computational and Systems Biology (Italy)
* Magali Roux-Rouquié, CNRS-UPMC (France)
* Vincent Schachter, Genoscope, Evry (France)
* Adelinde Uhrmacher, University of Rostock (Germany)
Program Committee
* Alexander Bockmayr, Freie Universität Berlin (Germany)
* Muffy Calder (co-chair), University of Glasgow (UK)
* Luca Cardelli, Microsoft Research Cambridge (UK)
* Vincent Danos, CNRS, Université Denis Diderot (France)
* Pierpaolo Degano, Universitá di Pisa (Italy)
* Finn Drabløs, Norwegian University of Science and Technology,
Trondheim (Norway)
* François Fages, INRIA Rocquencourt (France)
* Anthony Finkelstein, University College London (UK)
* Stephen Gilmore (co-chair), University of Edinburgh (UK)
* David Harel, Weizmann Institute (Israel)
* Monika Heiner, TU Cottbus (Germany)
* Walter Kolch, Beatson Institute for Cancer Research (UK)
* Ina Koch, Technische Fachhochschule Berlin (Germany)
* Gethin Norman, University of Birmingham (UK)
* Corrado Priami, The Microsoft Research -- University of Trento
Centre for Computational and Systems Biology (Italy)
* Stephen Ramsey, Institute for Systems Biology, Seattle (USA)
* Adelinde Uhrmacher, University of Rostock (Germany)
Organising committee
* Muffy Calder, University of Glasgow (UK)
* Stephen Gilmore, University of Edinburgh (UK)
(Apologies if you receive multiple copies of this message)
_______________________________________________
cmsb-2007 mailing list
cmsb-2007(a)inf.ed.ac.uk
http://lists.inf.ed.ac.uk/mailman/listinfo/cmsb-2007
Dear all,
since many delegates wish PEACE for 2007 I cannot withstand from
giving you some nice wishes (for the year 1884!).
They stem from a priest in Münster (Germany)
and it is absolutely impossible to translate them into English.
Thus maybe 30 percent (or more?) of TC6 delegates will be
able to understand. I apologize.
All the best for 2007
Otto
----------------------------------------------------------------
HERR,
setze dem Überfluss Grenzen und lasse die Grenzen überflüssig werden!
Lasse die Leute kein falsches Geld machen und auch das Geld keine
falschen Leute!
Nimm den Ehefrauen das letzte Wort und erinnere die Ehemänner an ihr erstes!
Schenke unseren Freunden mehr Wahrheit und der Wahrheit mehr Freunde!
Bessere solche Beamte, Geschäfts- und Arbeitsleute, die wohl tätig, aber
nicht wohltätig sind.
Gib den Regierenden ein gutes Deutsch und den Deutschen eine gute Regierung!
HERR,
sorge dafür, dass wir alle in den Himmel kommen, aber nicht sofort!
(Neujahrsgebet des Pfarrers der Lamberti-Gemeinde zu Münster aus dem
Jahre 1883)