Dear all,
please find enclosed a budget planning and a
financial estimate for IFIP TC6 in 2007. These numbers had to be given to IFIP
before July 7 in order to include them in the general financial planning
which will be discussed at IFIP General Assembly in Santiago de Chile.
With respect to event proceeds and royalties I'm rather pessimistic:
More and more event are co-organised by IFIP (in such cases IEEE becomes
the main sponsor very often)
and royalties from sold books will disappear very soon.
The TC6 funded expenses (best paper awards, student travel grants,
tutorials in developing countries) are very similar to the respective cost
in recent years. You will see that we will end up in a deficit if all
conferences really ask for their BPA's etc.
Please check the calculation and inform me if some
items have been forgotten or if some entries might be cancelled.
The budget will have to be discussed and hopefully approved
at our next meeting in Paris (Sept. 29+30, 2006).
Best regards
Otto
_________________________________________________________________
IEEE SECON 2006
Student Travel Grant Opportunity
Sponsored by National Science Foundation (NSF)
Application Deadline: August 1, 2006
Decision Notification Date: August 15, 2006
URL: http://www.ieee-secon.org/2006/travelgrants.html
_________________________________________________________________
The IEEE SECON 2006 organizing committee is pleased to announce the
availability of Student Travel Grants, sponsored by the IEEE Communication
Society (ComSoc) and National Science Foundation (NSF). Applications are
invited from qualified graduate students studying outside and in U.S.
institutions. Around fifteen to twenty awards are expected.
1. From IEEE Communications Society (ComSoc-STG): About 4-5 Student and
Discretionary Travel Grants are expected:
* Who is eligible: ONLY Student Authors or Co-Authors from outside U.S.
* Deadline for Grant Submission: August 1, 2006
* Decision Notification: August 15, 2006
* Grant Amount: Maximum of US $1,000
2. Sponsored by U.S. National Science Foundation (NSF-STG): About 10-15
Student Travel Awards are expected:
* Who is eligible: Only Bonafide Graduate Students, currently enrolled
in a Graduate Program in the United States. Priority will be given
to student authors or co-authors. Students from under-represented
groups (including women and minorities) are strongly encouraged to
apply.
* Deadline for Grant Submission: August 1, 2006
* Decision Notification: August 15, 2006
* Grant Amount: Maximum of US $1,000
How to Apply:
1. Registration at EDAS: go to http://edas.info and click "Travel grants"
and select one of SECON 2006.
2. Send an application to Prof. Wenye Wang at wwang(a)eos.ncsu.edu.
An application should include
a. A letter from the student
The letter from the student should include: a brief summary of research interests and
accomplishments to date; a description of areas reflected in the SECON 2006 program that would
impact the student's research, and why the conference attendance is important to the student.
b. An application form
c. The student's vita
d. Supporting letter from the student's graduate advisor
The student's advisor's recommendation letter to the committee should include: degree program of
the student; confirmation that the student is qualified applicant for either ComSoc-STG or NSF-STG;
the suitability of the SECON 2006 program material to the student's research area; ways this
particular student would benefit from attendance at the conference; and the strengths and potential
contributions of the student.
What Does NSF-STG Provide:
For students who are more than two hours driving distance (non-local),
the grant will cover the following expenses (up to a maximum of US
$1000):
* Economy airfare, on a US-based carrier, up to $450
* lodging for up to three nights (up to $160 per night)
* per-diem ($46 per day for up to 3 days)
For students who are less than two hours driving distance (local), the
grant will cover the following expenses (up to a maximum of US $450):
* lodging for up to two nights (up to $160 per night)
* mileage reimbursement at standard established rates
* per-diem ($46 per day for up to 3 days)
What Are Allowable Expenses:
All payments for travel awards covered by this grant must be reimbursement only after the conference
is over. All expenses must have an original receipt. For the airfare, a US Flag Carrier must be
used and the original ticket stub included with the request (e-tickets can obtain a receipt at
check-in), otherwise the expense is unallowable and unreimbursable. In addition, expenses for
alcoholic beverages are unallowable.
For NSF-STG, a completed W-9 form is required (available at
http://www.ece.ncsu.edu/netwis/W9-Form.doc).
(Apologies if you receive this call multiple times.)
***********************************************************************
CALL FOR POSTERS and DEMOS
*** NEW DEADLINE: July 16, 2006, 5 pm EDT***
IEEE SECON 2006
The Third IEEE International Conference on
Sensors, Mesh and Ad Hoc Communications and Networks
http://www.ieee-secon.org/2006/
Sponsored by IEEE Communications Society (www.comsoc.org)
Technically Co-Sponsored by AFCEA (www.afcea.org)
September 25-28, 2006
Reston, Virginia, USA (Near Washington DC's Dulles airport)
************************************************************************
To provide a forum for discussion and personal interaction between
presenter and participants, IEEE SECON 2006 will include poster and
demonstration sessions: works in progress, industry demonstrations of
new applications and techniques, practical implementations, military,
industrial and commercial developments, research testbeds and
demonstrations, recent research/implementation results, upcoming
research challenges, future directions, and novel approaches in the
fields of sensor, mesh and ad hoc communications and networks. One of
the key goals of this conference is to foster collaboration between
industry, government agencies and academia. Hence, participation of
researchers/developers from industry or governement agencies and
posters/demonstrations reporting joint work are especially encouraged.
Topics considered for posters and demo are, but not limited
to:
* New architectures and protocols to support
communication, localization, time synchronization,
routing, data dissemination, and other distributed
services in heterogeneous, large-scale distributed,
mesh networks and sensor networks
* Novel algorithms and theories for management,
supervisory control, and monitoring of distributed ad
hoc networks, and techniques for the interpretation
and use of sensor data in decision-making processes
* Modeling and performance evaluation of large-scale
distributed ad hoc and sensor networks, practical
implementations and deployments, and real-world
experiences
* Theories and models on fundamental information and
communication aspects of wireless mesh and sensor
networks
* Mechanisms for authenticated, secure communication and
data dissemination in sensor and mesh networks
* Algorithms and protocols to support quality of service
in mesh and sensor networks, including admission
control, resource allocation and fairness, and
capacity planning
* Integration of sensors into engineered systems,
including novel techniques for on-sensor renewable
power sources, mechanisms for on-sensor
self-calibration and self-testing, and efficient
schemes to maximize accuracy and minimize false alarms
* Hardware platforms incorporating multiple sensors,
computation, actuation, and wireless interfaces
* Software platforms, middleware, and tools for mesh and
sensor network applications development, deployment,
and management
Submissions should be in the form of a proposal describing the main
contributions of the poster/demo and the merits of the proposed ideas.
If available, preliminary results can also be included. Proposals will
be evaluated mainly based on their potential to stimulate interesting
discussions, exchange of ideas and promote collaborations.
A prize will be awarded to the best demo by a jury composed of academic
and/or venture capital participants.
Submissions should not be more than three pages (preferably IEEE
conference format, 2-column) in length. Demonstration submissions should
include the space requirements and/or any other equipment-specific
requirements. The documents must contain the authors' names,
affiliations, and contact information and the designated corresponding
author.
Accepted authors of posters/demos will have a space in the poster/demo
session room to display their posters or exhibit their demos and
describe their work in discussions with interested attendees.
IEEE Communications Society policy states that all accepted SECON 2006
posters/demos must have at least one registration at the regular rate.
For authors co-authoring multiple posters/demos, one regular
registration is valid for up to three presentations.
Submission will be accepted until Sunday July 16 2006, 5 pm EDT for
demos and for posters. Please send the submission material to the
poster/demo chairs in pdf format, and make sure to include the first
author name and either POSTER or DEMO in the name of the pdf file:
Stefano Basagni Cedric Westphal
Northeastern University Nokia
basagni(a)ece.neu.edu cedric.westphal(a)nokia.com
Notification of Poster/Demo decisions: August 7, 2006. Accepted
Poster/Demo Presenters MUST register by August 31, 2006.
************************************************************************
Dear all,
as agreed upon in Coimbra I have made the following actions:
- inviting Pedro Cuenca (Spain) + Jozef Woniak (Poland)
to submit proposals for 6.8 and to present the ideas
at the occasion of the next meeting in Paris
- inviting Josep Sole Pareta (Spain) + Ioannis Tomkos (Poland)
to submit proposals for 6.10 and to present the ideas
at the occasion of the next meeting in Paris.
Thanks a lot to Ramon Puigjaner and to Jan Slavik who
established the first contacts.
Josep and Ioannis have already agreed to come to Paris.
For 6.8 we had a suggestion for a third candidate (Mario Gerla
or somebody else from the US scene); Guy Pujolle promised
to establsih a contact. No response received yet.
Guy Pujolle has started the nomination phase for a new
chairman of 6.2 (as you knw, Guy has become the TC6
delegate of France as successor of Samir Tohme).
Another topic is Networking 2008 (as you know, Networking
2007 will be held in Atlanta).
We had initially suggested to have Networking 2008 in London.
In the last meeting, however, it was decided to leave that
decision open. Condidates should be invited to present
their concepts in September in Paris.
Guy Pujolle promised to ask Erol Gelenbe (London) about that.
No response received thus far.
I took the responsibility to contact Francis Lee (Singapore)
who had submitted a bid for 2007 not knowing that the
decision for Atlanta was already made long ago.
Thus I wrote a message to Francis Lee.
He reacted prompty saying that he is still very interested
but that he has to discuss that in more detail with
the organisation committee.
Best regards
Otto
Dear all,
until now (approx. four hours since sending my corresonding
message) only one -but very detailed and constructive - answer
has been obtained concerning the IFIP strategy document.
We need an earlier deadine since
Basie von Solms leaves for Europe already on June 6 and needs
the comments by June 5.
Thus either you send your comments directly to him
or send it to me *** until June 1 ***. (June 4 + 5 are holidays
in catholic countries).
Best regards
Otto
IEEE Wireless Communications and Networking Conference (WCNC 2007)
11 – 15 March 2007 / Hong Kong / http://www.ieee-wcnc.org
CALL FOR PAPERS: DEADLINE DATE OF 20 SEPTEMBER 2006
IEEE Wireless Communications and Networking Conference (WCNC) is one of the world's foremost international technical conferences for engineers and researchers at the forefront of development and deployment of wireless technologies.
In 2007, for the first time ever, WCNC will be held outside North America in Asia's world city, Hong Kong.
IMPORTANT DATES
Full paper submissions: 20 September 2006
Notification of acceptance: 8 December 2006
Camera ready submission: 5 January 2007
CALL FOR PROPOSALS
The WCNC 2007 organizing committee invites you to submit proposals for tutorials, technical papers and Technology/Business Applications Panels.
Deadline: 20 September 2006
ORGANIZATION
General Chairs Technical Program Chair
Khaled B. Letaief, Chih-Lin I Ross D. Murch
For more WCNC 2007 details & updates, visit: http://www.ieee-wcnc.org
FCS-ARSPA'06
Joint Workshop on
Foundations of Computer Security
and
Automated Reasoning for Security Protocol Analysis
co-located with LICS'06 as part of FLoC'06
Seattle, August 15 - 16, 2006
http://www.easychair.org/FLoC-06/FCS-ARSPA.html
******************************
*** CALL FOR PARTICIPATION ***
******************************
Overview
Computer security is an established field of computer science of both
theoretical and practical significance. In recent years, there has been
increasing interest in logic-based foundations for various methods in
computer security, including the formal specification, analysis and
design of security protocols and their applications, the formal
definition of various aspects of security such as access control
mechanisms, mobile code security and denial-of-service attacks, and the
modeling of information flow and its application to confidentiality
policies, system composition, and covert channel analysis.
The workshop FCS-ARSPA'06 is the fusion of two workshops. The workshop
FCS continues a tradition, initiated with the Workshops on Formal
Methods and Security Protocols (FMSP) in 1998 and 1999, then with the
Workshop on Formal Methods and Computer Security (FMCS) in 2000, and
finally with the LICS satellite Workshop on Foundations of Computer
Security (FCS) in 2002 through 2005, of bringing together formal methods
and the security community. The ARSPA workshop is the third in a series
of successful workshops on Automated Reasoning for Security Protocol
Analysis, bringing together researchers and practitioners from both the
security and the formal methods communities, from academia and industry,
who are working on developing and applying automated reasoning
techniques and tools for the formal specification and analysis of
security protocols.
The aim of the joint workshop FCS-ARSPA'06 is to provide a forum for
continued activity in these areas, to bring computer security
researchers in closer contact with the LICS community, and to give LICS
attendees an opportunity to talk to experts in computer security.
INVITED SPEAKERS
================
- Andy Gordon (Microsoft Research)
Provable Implementations of Security Protocols
(Lics invited talk)
- Martin Abadi (University of California at Santa Cruz)
Access Control in a Core Calculus of Dependency
ACCEPTED PAPERS
===============
- Veronique Cortier, Graham Steel
On the Decidability of a Class of XOR-based Key-management APIs
- Mathieu Jaume, Charles Morisset
Towards a formal specification of access control
- Amit Walvekar, Manasi Kelkar, Melanie Smith, and Rose Gamble
Determining Conflicts in Interdomain Mappings for Access Control
- Massimo Benerecetti, Nicola Cuomo, and Adriano Peron
Timed HLPSL for specification and verification of time sensitive protocols
- Matthias Anlauff, Dusko Pavlovic, Richard Waldinger, and Stephen Westfold
Proving Authentication Properties in the Protocol Derivation Assistant
- Long Nguyen, Bill Roscoe
Efficient group authentication protocols based on human interaction
- Alan Jeffrey, Ruy Ley-Wild
Dynamic Model Checking of C Cryptographic Protocol Implementations
- Jonathan Millen, Joshua Guttman, John Ramsdell, Justin Sheehy, and
Brian Sniffen
Call by Contract for Cryptographic Protocols
- DongGook Park, Colin Boyd, Byoungcheon Lee, and Hwankoo Kim
Responsibility and Credit: New Members of the Authentication Family?
- Romain Janvier, Yassine Lakhnech, and Laurent Mazare'
Relating the Symbolic and Computational Models of Security Protocols
Using Hashes
- Philippe Balbiani, Yannick Chevalier, and mounira kourjieh
Reasoning about Actions and Obligations
- Prateek Gupta, Vitaly Shmatikov
Key confirmation and adaptive corruptions in the protocol security logic
- Johannes Borgstroem, Simon Kramer, and Uwe Nestmann
Calculus of Cryptographic Communication
- Aybek Mukhamedov, Mark Ryan
On Asynchronous Multi-party Contract-Signing
- Chamseddine Talhi, Nadia Tawbi, and Mourad Debbabi
Execution Monitoring Enforcement Under Memory-Limitation Constraints
- A. Prasad Sistla, Min Zhou
Analysis of Dynamic Policies
Further information about registration and accomodation can be found on
the workshop's webpage
http://www.easychair.org/FLoC-06/FCS-ARSPA.html
We hope to see you all in Seattle!
Pierpaolo Degano, Ralf Kuesters, Luca Vigano`, Steve Zdancewic
(FCS-ARSPA'06 co-chairs)
Dear all,
since some of you ask about the meeting dates... here they come:
Special TC-6 meeting 2006/2 on Developing Country Problems; TC-6;
25 August 2006; Santiago de Chile, Chile;
TC-6 meeting 2006/2;
29 + 30 September, 2006, Paris (France).
See also the invitation for Autonomic Networking.
Best regards
Otto
------------------
Message received from Guy Pujolle:
Dear TC6 member,
We would like to invite you to participate in the Autonomic Networking
Conference, 27-29 September 2006, Paris, France. We are expecting a very
great event with top-level keynote speakers and an outstanding program.
Please visit http://www.autonomic-net.org for more info.
The IFIP TC6 meeting will be held on the 29 and 30 of September.
Best regards,
Guy.
Dear All,
I would be most grateful if you would share this announcement
with those who may have interest in submitting paper(s) or participating in UbiSafe-07.
Kind regards,
/Daniel
----------------
Daniel N. Xiong,
Publicity Chair, UbiSafe-07
Japan Advanced Inst. of Science & Technology
Asahidai, Nomi, Ishikawa, 923-1211, JAPAN
----------------
CALL FOR PAPERS
The 2007 IEEE International Symposium on Ubisafe Computing (UbiSafe-07)
Niagara Falls, Canada, May 21-23, 2007
http://www.ubisafe.org/2007/ or http://www.cs.okstate.edu/ubisafe07
In conjunction with AINA-07: http://www.aina-conference.org/2007/
IMPORTANT DEADLINES:
Paper Submission: November 30, 2006
Author Notification: January 22, 2007
Camera-Ready Papers: February 17, 2007
SYMPOSIUM INFORMATION:
Computers are now available anytime, anywhere, by different means, and
distributed unobtrusively throughout the everyday environments in which
physical objects/artifacts embedded with invisible computers are sensible and
networked locally and globally. Such "any" computers open tremendous
opportunities to provide numerous novel services/applications in both real
world and cyber spaces, and exist ubiquitously in our daily life, working,
learning, traveling, entertainment, medicine, etc. Although it is yet unclear
what exactly the real-cyber integrated worlds would be, there is no doubt that
they must be safe.
UbiSafe emphasizes the SAFE aspects for ubiquitous, pervasive, AmI, mobile,
universal, embedded, wearable, augmented, invisible, hidden, context-aware,
sentient, proactive, autonomic, or whatever it is called, computing. UbiSafe
computing is focused on theories and technologies for ubiquitous artifacts to
function safely for different purposes; for ubiquitous systems to work safely
in various situations; and for ubiquitous environments to behave safely with
all people. A series of challenges exist to let people benefit from ubiquitous
services, and simultaneously guarantee their safety in making ubiquitous safe
artifacts, systems, and environments.
The UbiSafe-07 Symposium provides a forum for engineers and scientists in
academia, industry, and government to address all safety related profound
challenges including technical, social, legal and ethical issues, and to
present and discuss their ideas, theories, technologies, systems, tools,
applications, work in progress and experience on all aspects of UbiSafe
computing.
Topics of particular interest include, but are not limited to:
* Fundamentals
- UbiSafe concepts, definitions, basic elements, models, frameworks and
methodologies, human-centric paradigms,
multi-disciplinary/inter-disciplinary/trans-disciplinary approaches, semantics,
ontologies, UbiSafe requirements and formal specifications and validations,
information assurance, etc.
* Technologies
- Security and privacy protection, reliability and fault tolerance, risk
analysis, uncertainty and exception handling, socially intelligent agents,
intuitive/natural user interface, interaction design, context-awareness,
intelligent computing, service-oriented computing, hardware, software,
middleware, etc.
* Systems
- Embedded systems, wearable systems, augmented systems, context-based systems,
communication systems, safety-critical systems, survivable systems, persistent
systems, autonomous/autonomic systems, proactive systems, network
infrastructure, sensor networks, etc.
* Applications
- Smart objects, smart environments, information appliance and artifacts,
everyday gadgets, robots, safety care, healthcare, medical care and services,
working, learning, traveling, entertainment, case studies, etc.
* Measures and Assessments
- UbiSafe attributes and measures for safety, trust, faith, amenity, easiness,
comfort, satisfaction and worryness, UbiSafe levels and relations, UbiSafe
quality, assessment criteria and authority, subjective and objective assessment
standards, evaluation methodologies, testing, measuring and monitoring tools,
etc.
* Human Factors and Social Issues
- Human and social aspects of UbiSafe, UbiSafe sources and factors, social
rules, regulations and laws, human factors, human behavior analysis, modeling
of human feelings, traditional and cultural issues, ethical issues, etc.
SUBMISSION INFORMATION:
Submit full papers not exceeding 20 pages in PDF format (IEEE Computer Society
Proceedings Manuscripts style: two columns, single-spaced), including figures
and references, using 10 fonts, and number each page. You can download the IEEE
CS Proceedings Author Guidelines from the following web site
ftp://pubftp.computer.org/press/outgoing/proceedings/. UbiSafe-07 submission
web site is at http://ehpclab.stfx.ca/~ubisafe07/.
PAPER PUBLICATION:
Authors of accepted papers will receive guidelines on preparing and submitting
the final manuscript(s) together with the notification of acceptance. The
proceedings will be published by IEEE Computer Society Press. Authors of
accepted papers, or at least one of them, are required to register and present
their work at the conference, otherwise their papers will be removed from the
digital library after the conference.
Distinguished papers, after further revisions, will be published in the Journal
of Autonomic and Trusted Computing (JoATC), and the Journal of Ubiquitous
Computing and Intelligence (JUCI). A set of high quality papers of the
conference, after further revisions, also will be published in an edited book
published by IDEA Publishing Group, USA.
GENERAL INFORMATION:
ADVISORY CHAIRS:
Jingde Cheng, Saitama University, Japan
Jianhua Ma, Hosei University, Japan
GENERAL CHAIRS:
Laurence T. Yang, St. Francis Xavier University, Canada
Vipin Chaudhary, Wayne State University, USA
Runhe Huang, Hosei University, Japan
PROGRAM CHAIRS:
Qiangfu Zhao, The University of Aizu, Japan
Qun Jin, Waseda University, Japan
Xiaolin (Andy) Li, Oklahoma State University, USA
PROGRAM VICE CHAIRS:
Evi Syukur, Monash University, Australia
Geyong Min, University of Bradford, UK
Zhiwen Yu, Nagoya University, Japan
PUBLICITY CHAIRS:
Guojun Wang, Central South University, China
Daniel N. Xiong, JAIST, Japan
Weisong Shi, Wayne State University, USA
Emmanuelle Anceaume, IRISA, France
PROGRAM COMMITTEE MEMBERS:
TBD
For further information please email to: ubisafe07(a)googlegroups.com
Dear All,
I would be most grateful if you would share this announcement
with those who may have interest in submitting paper(s) or participating in UbiSafe-07.
Kind regards,
/Daniel
----------------
Daniel N. Xiong,
Publicity Chair, UbiSafe-07
Japan Advanced Inst. of Science & Technology
Asahidai, Nomi, Ishikawa, 923-1211, JAPAN
----------------
CALL FOR PAPERS
The 2007 IEEE International Symposium on Ubisafe Computing (UbiSafe-07)
Niagara Falls, Canada, May 21-23, 2007
http://www.ubisafe.org/2007/ or http://www.cs.okstate.edu/ubisafe07
In conjunction with AINA-07: http://www.aina-conference.org/2007/
IMPORTANT DEADLINES:
Paper Submission: November 30, 2006
Author Notification: January 22, 2007
Camera-Ready Papers: February 17, 2007
SYMPOSIUM INFORMATION:
Computers are now available anytime, anywhere, by different means, and
distributed unobtrusively throughout the everyday environments in which
physical objects/artifacts embedded with invisible computers are sensible and
networked locally and globally. Such "any" computers open tremendous
opportunities to provide numerous novel services/applications in both real
world and cyber spaces, and exist ubiquitously in our daily life, working,
learning, traveling, entertainment, medicine, etc. Although it is yet unclear
what exactly the real-cyber integrated worlds would be, there is no doubt that
they must be safe.
UbiSafe emphasizes the SAFE aspects for ubiquitous, pervasive, AmI, mobile,
universal, embedded, wearable, augmented, invisible, hidden, context-aware,
sentient, proactive, autonomic, or whatever it is called, computing. UbiSafe
computing is focused on theories and technologies for ubiquitous artifacts to
function safely for different purposes; for ubiquitous systems to work safely
in various situations; and for ubiquitous environments to behave safely with
all people. A series of challenges exist to let people benefit from ubiquitous
services, and simultaneously guarantee their safety in making ubiquitous safe
artifacts, systems, and environments.
The UbiSafe-07 Symposium provides a forum for engineers and scientists in
academia, industry, and government to address all safety related profound
challenges including technical, social, legal and ethical issues, and to
present and discuss their ideas, theories, technologies, systems, tools,
applications, work in progress and experience on all aspects of UbiSafe
computing.
Topics of particular interest include, but are not limited to:
* Fundamentals
- UbiSafe concepts, definitions, basic elements, models, frameworks and
methodologies, human-centric paradigms,
multi-disciplinary/inter-disciplinary/trans-disciplinary approaches, semantics,
ontologies, UbiSafe requirements and formal specifications and validations,
information assurance, etc.
* Technologies
- Security and privacy protection, reliability and fault tolerance, risk
analysis, uncertainty and exception handling, socially intelligent agents,
intuitive/natural user interface, interaction design, context-awareness,
intelligent computing, service-oriented computing, hardware, software,
middleware, etc.
* Systems
- Embedded systems, wearable systems, augmented systems, context-based systems,
communication systems, safety-critical systems, survivable systems, persistent
systems, autonomous/autonomic systems, proactive systems, network
infrastructure, sensor networks, etc.
* Applications
- Smart objects, smart environments, information appliance and artifacts,
everyday gadgets, robots, safety care, healthcare, medical care and services,
working, learning, traveling, entertainment, case studies, etc.
* Measures and Assessments
- UbiSafe attributes and measures for safety, trust, faith, amenity, easiness,
comfort, satisfaction and worryness, UbiSafe levels and relations, UbiSafe
quality, assessment criteria and authority, subjective and objective assessment
standards, evaluation methodologies, testing, measuring and monitoring tools,
etc.
* Human Factors and Social Issues
- Human and social aspects of UbiSafe, UbiSafe sources and factors, social
rules, regulations and laws, human factors, human behavior analysis, modeling
of human feelings, traditional and cultural issues, ethical issues, etc.
SUBMISSION INFORMATION:
Submit full papers not exceeding 20 pages in PDF format (IEEE Computer Society
Proceedings Manuscripts style: two columns, single-spaced), including figures
and references, using 10 fonts, and number each page. You can download the IEEE
CS Proceedings Author Guidelines from the following web site
ftp://pubftp.computer.org/press/outgoing/proceedings/. UbiSafe-07 submission
web site is at http://ehpclab.stfx.ca/~ubisafe07/.
PAPER PUBLICATION:
Authors of accepted papers will receive guidelines on preparing and submitting
the final manuscript(s) together with the notification of acceptance. The
proceedings will be published by IEEE Computer Society Press. Authors of
accepted papers, or at least one of them, are required to register and present
their work at the conference, otherwise their papers will be removed from the
digital library after the conference.
Distinguished papers, after further revisions, will be published in the Journal
of Autonomic and Trusted Computing (JoATC), and the Journal of Ubiquitous
Computing and Intelligence (JUCI). A set of high quality papers of the
conference, after further revisions, also will be published in an edited book
published by IDEA Publishing Group, USA.
GENERAL INFORMATION:
ADVISORY CHAIRS:
Jingde Cheng, Saitama University, Japan
Jianhua Ma, Hosei University, Japan
GENERAL CHAIRS:
Laurence T. Yang, St. Francis Xavier University, Canada
Vipin Chaudhary, Wayne State University, USA
Runhe Huang, Hosei University, Japan
PROGRAM CHAIRS:
Qiangfu Zhao, The University of Aizu, Japan
Qun Jin, Waseda University, Japan
Xiaolin (Andy) Li, Oklahoma State University, USA
PROGRAM VICE CHAIRS:
Evi Syukur, Monash University, Australia
Geyong Min, University of Bradford, UK
Zhiwen Yu, Nagoya University, Japan
PUBLICITY CHAIRS:
Guojun Wang, Central South University, China
Daniel N. Xiong, JAIST, Japan
Weisong Shi, Wayne State University, USA
Emmanuelle Anceaume, IRISA, France
PROGRAM COMMITTEE MEMBERS:
TBD
For further information please email to: ubisafe07(a)googlegroups.com