| |||||||||||||||
SI Personal and Ubiquous Computing 2010 : Special Issue User-Driven RFID Applications and Challenges, Journal of Personal and Ubiquitous Computing (Springer) | |||||||||||||||
Link: http://lasecwww.epfl.ch/~katerina/CFP/CFP_RFID.pdf | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Call for Papers
Journal of Personal and Ubiquitous Computing (Springer) Special Theme on "User-Driven RFID Applications and Challenges" -------------------------------------------------------------------- *****Overview***** Radio Frequency Identification (RFID) systems are emerging as one of the most pervasive computing technologies due to their low cost and their broad applicability. RFID communication is fast, convenient and its application can substantially save time, improve services, reduce labor cost, thwart product counterfeiting and theft and maintain quality standards. Common applications range from highway toll collection, supply chain management, public transportation, controlling building access, animal tracking to developing smart home appliances and remote keyless entry for automobiles. While RFID technology provides promising benefits such as inventory visibility and business process automation, some significant challenges need to be overcome before these benefits can be realized. One important issue is how to process and manage RFID data, which is typically in large volume, noisy and unreliable, time-dependent, dynamically changing, and of varying ownership. Another issue is how to seamlessly integrate low-level RFID data into (existing) enterprise information infrastructures (e.g., upper-level business processes). Finally, RFID systems present a number of inherent vulnerabilities with serious potential security implications. Indeed, given the ability of inexpensively tagging and thus monitoring a large number of items and/or people, RFID raises some serious security and privacy concerns. RFID systems are vulnerable to a broad range of malicious attacks ranging from passive eavesdropping to active interference. This special issue aims at presenting the latest developments, trends, and research challenges and solutions for RFID Technology. Topics of interest include, but are not limited to: - Innovative RFID-enabled applications. - RFID and physical user interfaces. - RFID security & privacy. - Case studies and field trials. - Next generation RFID technologies. - Behaviour analysis and situation awareness. - RFID case studies, field trials, industrial applications. - Data management issues in RFID applications. - Integrated RFID and Sensor networks. - Web services and RFID. - Performance evaluation of RFID systems and applications. *****Submission Guidelines***** Papers submitted to this special issue for possible publication must be original and must not be under consideration for publication in any other journal or conference. Papers in the issue are expected to be substantially extended and revised from conference or workshop versions. ******Important Dates****** - Manuscript submission deadline: 15th of October 2010 - Reviews due: 15th of December 2010 - Revised papers due: 31st of January 2011 - Final Decision: 28th of February 2011 - Camera-ready papers due: 14th of March 2011 - Tentative Publication date: Summer/Fall issue, 2011 ******Guest Editors****** Dr. Katerina Mitrokotsa School of Computer & Communication Sciences, Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland katerina.mitrokotsa@epfl.ch Dr. Michael Sheng School of Computer Science The University of Adelaide, Australia qsheng@cs.adelaide.edu.au Dr. Sherali Zeadally Department of Computer Science and Information Technology, University of the District of Columbia, USA szeadally@udc.edu Dr. Zakaria Maamar College of Information Technology, Zayed University, U.A.E zakaria.maamar@zu.ac.ae |
|