posted by user: stjoa || 4230 views || tracked by 11 users: [display]

DAWAM 2010 : The Fifth International Workshop Dependability Aspects on Data Warehousing and Mining applications

FacebookTwitterLinkedInGoogle

Link: http://www.dawam.ares-conference.eu
 
When Feb 15, 2010 - Feb 18, 2010
Where Krakow, Poland
Abstract Registration Due Nov 14, 2009
Submission Deadline Oct 15, 2009
Notification Due Nov 1, 2009
Final Version Due Nov 14, 2009
Categories    dependability   data mining   pseudonymization and encryptio   trust management, and security
 

Call For Papers

******************************************************************************************************************

The Fifth International Workshop Dependability Aspects on Data Warehousing and Mining applications (DAWAM 2010)

******************************************************************************************************************


http://www.dawam.ares-conference.eu

To be held in conjunction with the Fifth International Conference on Availability, Reliability and Security (ARES 2010 – http://www.ares-conference.eu).

February 15th – 18th, 2010
Andrzej Frycz Modrzewski Cracow College
Krakow, Poland

The rapid growth of information technologies has brought tremendous opportunities for data sharing, integration, and analysis across multiple distributed, heterogeneous data sources. In the past decade, data warehousing and mining are the well-known technologies used for data analysis and knowledge discovery in vast domain of applications.

Data mining technology has emerged as a means of identifying patterns and trends from large quantities of data. Data mining has used a data warehousing model of gathering all data into a central site, then running an algorithm against that data.

A growing attention has been paid to the study, development and application of data warehousing and mining. Nevertheless, dependability aspects in these applications such as availability, reliability, integrity, privacy, and security issues are still being investigated. For example, in data warehousing applications, privacy considerations may prevent the approach of collecting data into the centralized warehouse because each data source has different privacy policy. Furthermore, the complexity of security increases as different sources of information are combined. Reliable, consistent and trustworthy of information are also significant requirements in data warehousing applications. Data mining has been shown to be beneficial in confronting various types of attacks to computer systems such as fraud detection, intrusion prevention. In some applications, e.g. clinic information system, government management, business competitive information, it is required to apply the mining algorithms without observing the confidential data values thus demands the privacy preservation. There are also many challenging issues that need further investigation in the context of data mining from both privacy and security perspectives such as mining of imbalanced data, bioinformatics data, streaming data, ubiquitous computing data, grid computing data etc.

Starting from the beginning of the ARES conference in 2006, the DAWAM workshop (workshop on "Dependability Aspects on Data Warehousing and Mining applications"),like ARES, will reach the 5th year in 2010. Previous DAWAM workshops were held at Vienna University of Technology, Austria on April 20-22, 2006 (DAWAM 2006), April 10-13, 2007 (DAWAM 2007), Polytechnic University of Catalonia, Barcelona, Spain, March 4-7, 2008 (DAWAM 2008), Fukuoka, Japan, March 16-19, 2009 (DAWAM 2009). This year, DAWAM 2009 will be held at Krakow, Poland, February, 15th - 18th 2010.

The goals of this workshop are to bring together users, engineers and researchers (from industry and academy) alike to present their recent work, discuss and identify problems, synergize different views of techniques and policies, and brainstorm future research directions on various dependability aspects of data warehousing and data mining applications. We strongly encourage researchers and practitioners with interest in the areas of reliability, availability, privacy and security, databases, data warehousing, data mining, and statistics to submit their experience, and/or research results.

******************************************************************************************************************
TOPICS
******************************************************************************************************************


Topics related to any of dependability aspects in data warehousing and mining, theory, systems and applications are of interest. These include, but are not limited to the following areas:
- Dependability and fault tolerance

- High Availability and Disaster Recovery

- Survivability of evaluative systems

- Reliability and Robustness Issues

- Accuracy and reliability of responses

- Reliable and Failure Tolerant Business Process Integration

- Reliable Event Management and Data Stream Processing

- Failure Tolerant and trustworthy Sensor Networks

- Highly available data warehouses for business processes integration

- Handling different or incompatible formats, and erroneous data

- Secure Information integration

- Private Information retrieval

- Privacy and security policies and social impact of data mining

- Privacy preserving data integration

- Access control techniques and secure data models

- Encryption & Authentication

- Pseudonymization and Encryption

- Anonymization and pseudonymization

- Trust management, and security

- Security in Aggregation and Generalization

- User Profile Based Security

- Secure multi-party computation

- Secondary use of personal data, clinic data, credit record

- Fraud and misuse detection

- Intrusion detection and tolerance

- Data mining applications for terrorist detection

- Private queries by a (semi-trusted) third party

- Query authentication, logging, auditing, access control and authorization policies

******************************************************************************************************************
IMPORTANT DATES
******************************************************************************************************************
Submission Deadline October 15th, 2009
Author Notification November 01st, 2009
Author Registration November 14th, 2009
Proceedings Version November 14th, 2009
Conference/Workshop February 15th, - 18th 2010

******************************************************************************************************************

SUBMISSION GUIDELINES
******************************************************************************************************************

The submission guidelines valid for the DAWAM workshop are the same as for the ARES conference. They can be found at:

http://www.ares-conference.eu/conf/index.php/submission-guidelines

You can also prepare your paper in PDF file and send it to the workshop co-chairs:
Prof. Bhavani Thuraisingham, The University of Texas at Dallas, USA (bhavani[dot]thuraisingham[at]utdallas[dot]edu)
Dr. Nguyen Manh Tho, Institute of Software Technology, Vienna University of Technology, Austria (tho[at]ifs[dot]tuwien[dot]ac[dot]at)


Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper at the workshop.

Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance.

All accepted papers will be published as ISBN proceedings published by the IEEE Computer Society - Conference Publishing Services (CPS).

Like in the previous years, a selected number of DAWAM 2010 best papers will be nominated to be published as special issues in appropriate journals such as International Journal of Business Intelligence and Data Mining (IJBIDM), Journal of automatic and trusted computing (JoATC).

******************************************************************************************************************
Workshop Organizer Co-chairs
******************************************************************************************************************
Bhavani Thuraisingham, Prof.
Director of the Cyber Security Research Center
Erik Jonsson School of Engineering and Computer Science
The University of Texas at Dallas, USA
bhavani[dot]thuraisingham[at]utdallas[dot]edu

Nguyen Manh Tho, Ph.D. (main contact)
Institute of Software Technique and Interactive System,
Vienna University of Technology,
Favoriten strasse 9-11/188
A1040 Vienna, Austria
tho[at]ifs[dot]tuwien[dot]ac[dot]at

******************************************************************************************************************
Program Committee (to be confirmed and extended)
******************************************************************************************************************
Jemal Abawajy, Deakin University, Australia
Mikhail Atallah, Purdue University, USA
Davide Balzarotti, University of California, USA
Barbara Carminati, University of Insubria at Varese, Italy
Pawan Chowdhary, IBM T J Watson Research Center, USA
Hervé Debar, France Télécom R&D, France
Josep Domingo-Ferrer, Rovira i Virgili University of Tarragona, Spain
Ulrich Flegel, SAP Research CEC Karlsruhe, Germany
Jimmy Huang, York University, Canada
Kwok-Yan Lam, Tsinghua University, China
Xue Li, The University of Queensland, Australia
Zongwei Luo, University of Hong Kong, China
Nasrullah Memon, Aalborg University, Denmark
Taneli Mielikäinen, Nokia Research Center Palo Alto, USA
Anirban Mondal, University of Tokyo, Japan
Tho-Manh Nguyen, Vienna University of Technology, Austria
Torsten Priebe, Capgemini Consulting Österreich AG, Austria
Raghav Rao, SUNY at Buffalo, USA
Yucel Saygin, Sabanci University, Turkey
Josef Schiefer, Senactive IT-Dienstleistungs GmbH, Austria
Ben Soh, La Trobe University, Australia
Toshihiro Tabata, Okayama University, Japan
David Taniar, Monash University, Australia
Bhavani Thuraisingham, The University of Texas at Dallas, USA
Vassilios S. Verykios, University of Thessaly, Greece
Duminda Wijesekera, George Mason University, USA
Yang Yanjiang, Singapore Management University, Singapore
Justin Zhan, Carnegie Mellon University, USA

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
ICDM 2024   IEEE International Conference on Data Mining
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
CSITEC 2025   11th International Conference on Computer Science, Information Technology
AMLDS 2025   IEEE--2025 International Conference on Advanced Machine Learning and Data Science
PAKDD 2025   29th Pacific-Asia Conference on Knowledge Discovery and Data Mining
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
CETA--EI 2025   2025 4th International Conference on Computer Engineering, Technologies and Applications (CETA 2025)
COIT 2025   5th International Conference on Computing and Information Technology
SEAS 2025   14th International Conference on Software Engineering and Applications