| |||||||||||||||
UbiSafe 2011 : The 3rd IEEE International Symposium on UbiSafe Computing | |||||||||||||||
Link: http://trust.csu.edu.cn/conference/UbiSafe2011/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Introduction
Computers are now available anytime, anywhere, by different means, and distributed unobtrusively throughout the everyday environments in which physical objects/artifacts embedded with invisible computers are sensible and networked locally and globally. Such "any" computers open tremendous opportunities to provide numerous novel services/applications in both real world and cyber spaces, and exist ubiquitously in our daily life, working, learning, traveling, entertainment, medicine, etc. Although it is yet unclear what exactly the real-cyber integrated worlds would be, there is no doubt that they must be safe. The 3rd IEEE International Symposium on Ubisafe Computing (UbiSafe-11) will be held in conjunction with "The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11)". It follows the success of UbiSafe-09 in Chengdu, China. It aims at bringing together researchers and practitioners in the world working on theories and technologies for ubiquitous artifacts to function safely for different purposes; for ubiquitous systems to work safely in various situations; and for ubiquitous environments to behave safely with all people. Scope and Interests IEEE UbiSafe-11 is an international symposium for presenting and discussing emerging ideas and trends in aspects of UbiSafe computing, but are not limited to: (1) Fundamentals UbiSafe concepts, definitions, basic elements, models, frameworks and methodologies, human-centric paradigms, multi-disciplinary/inter-disciplinary/trans-disciplinary approaches, semantics, ontologies, UbiSafe requirements and formal specifications and validations, information assurance, etc. (2) Technologies Security and privacy protection, reliability and fault tolerance, risk analysis, uncertainty and exception handling, socially intelligent agents, intuitive/natural user interface, interaction design, context-awareness, intelligent computing, service-oriented computing, hardware, software, middleware, etc. (3) Systems Embedded systems, wearable systems, augmented systems, context-based systems, communication systems, safety-critical systems, survivable systems, persistent systems, autonomous/autonomic systems, proactive systems, network infrastructure, sensor networks, etc. (4) Applications Smart objects, smart environments, information appliance and artifacts, everyday gadgets, robots, safety care, healthcare, medical care and services, working, learning, traveling, entertainment, case studies, etc. (5) Measures and Assessments UbiSafe attributes and measures for safety, trust, faith, amenity, easiness, comfort, satisfaction and worryness, UbiSafe levels and relations, UbiSafe quality, assessment criteria and authority, subjective and objective assessment standards, evaluation methodologies, testing, measuring and monitoring tools, etc. (6) Human Factors and Social Issues Human and social aspects of UbiSafe, UbiSafe sources and factors, social rules, regulations and laws, human factors, human behavior analysis, modeling of human feelings, traditional and cultural issues, ethical issues, etc. Submission and Publication Information The accepted papers from this symposium will be published by IEEE Computer Society in IEEE TrustCom-11 conference proceedings (indexed by EI Compendex and ISTP). Papers should be written in English conforming to the IEEE conference proceedings format (8.5" x 11", Two-Column). Papers should be submitted through the paper submission system at the symposium website. Each paper is limited to 6 pages (or 10 pages with the over length charge). Distinguished papers, after further revisions, will be invited for possible publication in special issues of prestige international journals indexed by SCI and EI (pending). Submitting a paper to the symposium means that, if the paper is accepted, at least one author should attend the symposium and present the paper. For no-show authors, their papers will be removed from the digital library after the symposium and their affiliations will be notified. Important Dates (1) Paper submission due: June 30, 2011 (2) Notification of decision: August 30, 2011 (3) Camera-ready papers due: September 30, 2011 General Co-Chairs Hsiao-Hwa Chen, National Cheng Kung University, Taiwan Zhigang Chen, Central South University, China Athanasios V. Vasilakos, National Technical University of Athens, Greece Program Co-Chairs Hamid Sharif, University of Nebraska-Lincoln, USA Guojun Wang, Central South University, China Xiaolin (Andy) Li, University of Florida, USA Program Committee TBD Publicity Co-Chairs Gregorio Martinez, University of Murcia, Spain Lei Shu, Osaka University, Japan Xiaolong Jin, Institute of Computing Technology, Chinese Academy of Sciences, China Steering Committee Vipin Chaudhary, University at Buffalo, SUNY, USA Jingde Cheng, Saitama University, Japan Yuanshun Dai, University of Tennessee, USA Thomas Grill, Johannes Kepler Univ. Linz, Austria Runhe Huang, Hosei University, Japan Ismail Khalil, Johannes Kepler Univ. Linz, Austria Qun Jin, Waseda University, Japan Xiaolin (Andy) Li, University of Florida, USA Jianhua Ma, Hosei University, Japan Laurence T. Yang, St. Francis Xavier University, Canada Qiangfu Zhao, The University of Aizu, Japan Webmasters Qian Li, Central South University, China Xiaofei Xing, Central South University, China Contact Please email inquiries concerning IEEE UbiSafe 2011 to: Prof. Guojun Wang: csgjwang AT gmail DOT com and the symposium organizers: ubisafe2011 AT gmail DOT com Homepage: http://trust.csu.edu.cn/faculty/~csgjwang/ |
|