| |||||||||||||||
ICCGI 2012 : The Seventh International Multi-Conference on Computing in the Global Information Technology | |||||||||||||||
Link: http://www.iaria.org/conferences2012/ICCGI12.html | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The Seventh International Conference on Computing in the Global Information Technology (ICCGI 2012) continues a series of international events covering a large spectrum of topics related to global knowledge concerning computation, technologies, mechanisms, cognitive patterns, thinking, communications, user-centric approaches, nanotechnologies, and advanced networking and systems. The conference topics focus on challenging aspects in the next generation of information technology and communications related to the computing paradigms (mobile computing, database computing, GRID computing, multi-agent computing, autonomic computing, evolutionary computation) and communication and networking and telecommunications technologies (mobility, networking, bio-technologies, autonomous systems, image processing, Internet and web technologies), towards secure, self-defendable, autonomous, privacy-safe, and context-aware scalable systems.
This conference intends to expose the scientists to the latest developments covering a variety of complementary topics, aiming to enhance one’s understanding of the overall picture of computing in the global information technology. The integration and adoption of IPv6, also known as the Next Generation of the Internet Protocol is happening throughout the World at this very moment. To maintain global competitiveness, governments are mandating, encouraging or actively supporting the adoption of IPv6 to prepare their respective economies for the future communication infrastructures. Business organizations are increasingly mindful of the IPv4 address space depletion and see within IPv6 a way to solve pressing technical problems while IPv6 technology continues to evolve beyond IPv4 capabilities. Communications equipment manufacturers and applications developers are actively integrating IPv6 in their products based on market demands. IPv6 continues to represent a fertile area of technology innovation and investigation. IPv6 is opening the way to new successful research projects. Leading edge Internet Service Providers are guiding the way to a new kind of Internet where any-to-any reachability is not a vivid dream but a notion of reality in production IPv6 networks that have been commercially deployed. National Research and Educational Networks together with internationally known hardware vendors, Service Providers and commercial enterprises have generated a great amount of expertise in designing, deploying and operating IPv6 networks and services. This knowledge can be leveraged to accelerate the deployment of the protocol worldwide. ICCGI 2012 comprises a series of independent tracks that complement the challenges on various facets of computation, systems solutions, knowledge processing, system implementation, and communications and networking technologies. Industrial systems Evolutionary computation Autonomic and autonomous systems Bio-technologies Knowledge data systems Mobile and distance education Intelligent techniques, logics, and systems Knowledge processing Information technologies Internet and web technologies Digital information processing Cognitive science and knowledge agent-based systems Mobility and multimedia systems Systems performance Networking and telecommunications Software development and deployment Knowledge virtualization Systems and networks on the chip Context-aware systems Networking technologies Security in network, systems, and applications Knowledge for global defense Information Systems [IS] IPv6 Today - Technology and deployment Modeling Optimization Complexity We solicit both academic, research, and industrial contributions. We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals. Industrial presentations are not subject to the format and content constraints of regular submissions. We expect short and long presentations that express industrial position and status. Tutorials on specific related topics and panels on challenging areas are encouraged. The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. All topics and submission formats are open to both research and industry contributions. Industrial systems Control theory and systems Fault-tolerance and reliability Data engineering Enterprise computing and evaluation Electrical and electronics engineering Economic decisions and information systems Advanced robotics Virtual reality systems Industrial systems and applications Industrial and financial systems Industrial control electronics Industrial IT solutions Evolutionary computation Algorithms, procedures, mechanisms and applications Computer architecture and systems Computational sciences Computation in complex systems Computer and communication systems Computer networks Computer science theory Computation and computer security Computer simulation Digital telecommunications Distributed and parallel computing Computation in embedded and real-time systems Soft computing User-centric computation Autonomic and autonomous systems Automation and autonomous systems Theory of Computing Autonomic computing Autonomic networking Network computing Protecting computing Theories of agency and autonomy Multi-agent evolution, adaptation and learning Adjustable and self-adjustable autonomy Pervasive systems and computation Computing with locality principles GRID networking and services Pervasive computing Cluster computing and performance Artificial intelligence Computational linguistics Cognitive technologies Decision making Evolutionary computation Expert systems Computational biology Bio-technologies Models and techniques for biometric technologies Bioinformatics Biometric security Computer graphics and visualization Computer vision and image processing Computational biochemistry Finger, facial, iris, voice, and skin biometrics Signature recognition Multimodal biometrics Verification and identification techniques Accuracy of biometric technologies Authentication smart cards and biometric metrics Performance and assurance testing Limitations of biometric technologies Biometric card technologies Biometric wireless technologies Biometric software and hardware Biometric standards Knowledge data systems Data mining and Web mining Knowledge databases and systems Data warehouse and applications Data warehousing and information systems Database performance evaluation Semantic and temporal databases Database systems Databases and information retrieval Digital library design Meta-data modeling Mobile and distance education Human computer interaction Educational technologies Computer in education Distance learning E-learning Mobile learning Cognitive support for learning Internet-based education Impact of ICT on education and society Group decision making and software Habitual domain and information technology Computer-mediated communications Immersing authoring Contextual and cultural challenges in user mobility Intelligent techniques, logics, and systems Intelligent agent technologies Intelligent and fuzzy information processing Intelligent computing and knowledge management Intelligent systems and robotics Fault-tolerance and reliability Fuzzy logic & systems Genetic algorithms Haptic phenomena Graphic recognition Neural networks Symbolic and algebraic computation Modeling, simulation and analysis of business processes and systems Knowledge processing Knowledge representation models Knowledge languages Cognitive science Knowledge acquisition Knowledge engineering Knowledge processing under uncertainty Machine intelligence Machine learning Making decision through Internet Networking knowledge plan Information technologies Information technology and organizational behavior Agents, data mining and ontologies Information retrieval systems Information and network security Information ethics and legal evaluations Optimization and information technology Organizational information systems Information fusion Information management systems Information overload Information policy making Information security Information systems Information discovery Internet and web technologies Internet and WWW-based computing Web and Grid computing Internet service and training IT and society IT in education and health Management information systems Visualization and group decision making Web based language development Web search and decision making Web service ontologies Scientific web intelligence Online business and decision making Business rule language E-Business E-Commerce Online and collaborative work Social eco-systems and social networking Social decisions on Internet Computer ethics Digital information processing Mechatronics Natural language processing Medical imaging Image processing Signal processing Speech processing Video processing Pattern recognition Pattern recognition models Graphics & computer vision Medical systems and computing Cognitive science and knowledge agent-based systems Cognitive support for e-learning and mobile learning Agents and cognitive models Agents & complex systems; computational ecosystems Agent architectures; perception, action & planning in agents Agent communication: languages, semantics, pragmatics & protocols Agent-based electronic commerce and trading systems Multi-agent constraint satisfaction Agent programming languages, development environments and testbeds Computational complexity in autonomous agents Multi-agent planning and cooperation Logics and formal models of for agency verification Nomadic agents Negotiation, auctions, persuasion Privacy and security issues in multi-agent systems Mobility and multimedia systems Mobile communications Multimedia and visual programming Multimedia and decision making Multimedia systems Mobile multimedia systems User-centered mobile applications Designing for the mobile devices Contextual user mobility Mobile strategies for global market Interactive television and mobile commerce Systems performance Performance evaluation Performance modeling Performance of parallel computing Reasoning under uncertainty Reliability and fault-tolerance Performance instrumentation Performance monitoring and corrections Performance in entity-dependable systems Real-time performance and near-real time performance evaluation Performance in software systems Performance and hybrid systems Measuring performance in embedded systems Networking and telecommunications Telecommunication and Networking Telecommunication Systems and Evaluation Multiple Criteria Decision Making in Information Technology Network and Decision Making Networks and Security Communications protocols (SIP/H323/MPLS/IP) Specialized networks (GRID/P2P/Overlay/Ad hoc/Sensor) Advanced services (VoIP/IPTV/Video-on-Demand Network and system monitoring and management Feature interaction detection and resolution Policy-based monitoring and managements systems Traffic modeling and monitoring Traffic engineering and management Self-monitoring, self-healing and self-management systems Man-in-the-loop management paradigm Software development and deployment Software requirements engineering Software design, frameworks, and architectures Software interactive design Formal methods for software development, verification and validation Neural networks and performance Patterns/Anti-patterns/Artifacts/Frameworks Agile/Generic/Agent-oriented programming Empirical software evaluation metrics Software vulnerabilities Reverse engineering Software reuse Software security, reliability and safety Software economics Software testing and debugging Tracking defects in the OO design Distributed and parallel software Programming languages Declarative programming Real-time and embedded software Open source software development methodologies Software tools and deployment environments Software Intelligence Software Performance and Evaluation Knowledge virtualization Modeling techniques, tools, methodologies, languages Model-driven architectures (MDA) Service-oriented architectures (SOA) Utility computing frameworks and fundamentals Enabled applications through virtualization Small-scale virtualization methodologies and techniques Resource containers, physical resource multiplexing, and segmentation Large-scale virtualization methodologies and techniques Management of virtualized systems Platforms, tools, environments, and case studies Making virtualization real On-demand utilities Adaptive enterprise Managing utility-based systems Development environments, tools, prototypes Systems and networks on the chip Microtechnology and nanotechnology Real-time embedded systems Programming embedded systems Controlling embedded systems High speed embedded systems Designing methodologies for embedded systems Performance on embedded systems Updating embedded systems Wireless/wired design of systems-on-the-chip Testing embedded systems Technologies for systems processors Migration to single-chip systems Context-aware systems Context-aware autonomous entities Context-aware fundamental concepts, mechanisms, and applications Modeling context-aware systems Specification and implementation of awareness behavioral contexts Development and deployment of large-scale context-aware systems and subsystems User awareness requirements Design techniques for interfaces and systems Methodologies, metrics, tools, and experiments for specifying context-aware systems Tools evaluations, Experiment evaluations Networking technologies Next generation networking Network, control and service architectures Network signalling, pricing and billing Network middleware Telecommunication networks architectures On-demand networks, utility computing architectures Next generation networks [NGN] principles Storage area networks [SAN] Access and home networks High-speed networks Optical networks Peer-to-peer and overlay networking Mobile networking and systems MPLS-VPN, IPSec-VPN networks GRID networks Broadband networks Security in network, systems, and applications IT in national and global security Formal aspects of security Systems and network security Security and cryptography Applied cryptography Cryptographic protocols Key management Access control Anonymity and pseudonymity management Security management Trust management Protection management Certification and accreditation Virii, worms, attacks, spam Intrusion prevention and detection Information hiding Legal and regulatory issues Knowledge for global defense Business continuity and availability Risk assessment Aerospace computing technologies Systems and networks vulnerabilities Developing trust in Internet commerce Performance in networks, systems, and applications Disaster prevention and recovery IT for anti-terrorist technology innovations (ATTI) Networks and applications emergency services Privacy and trust in pervasive communications Digital rights management User safety and protection Information Systems [IS] Management Information Systems Decision Support Systems Innovation and IS Enterprise Application Integration Enterprise Resource Planning Business Process Change Design and Development Methodologies and Frameworks Iterative and Incremental Methodologies Agile Methodologies IS Standards and Compliance Issues Risk Management in IS Design and Development Research Core Theories Conceptualisations and Paradigms in IS Research Ontological Assumptions in IS Research IS Research Constraints, Limitations and Opportunities IS vs Computer Science Research IS vs Business Studies IPv6 Today - Technology and deployment IP Upgrade - An Engineering Exercise or a Necessity? Worldwide IPv6 Adoption - Trends and Policies IPv6 Programs, from Research to Knowledge Dissemination IPv6 Technology - Practical Information Advanced Topics and Latest Developments in IPv6 IPv6 Deployment Experiences and Case Studies IPv6 Enabled Applications and Devices Modeling Continuous and Discrete Models Optimal Models Complex System Modeling Individual-Based Models Modeling Uncertainty Compact Fuzzy Models Modeling Languages Real-time modeling Peformance modeling Optimization Multicriteria Optimization Multilervel Optimization Goal Programming Optimization and Efficiency Optimization-based decisions Evolutionary Optimization Self-Optimization Extreme Optimization Combinatorial Optimization Disccrete Optimization Fuzzy Optimization Lipschitzian Optimization Non-Convex Optimization Convexity Continuous Optimization Interior point methods Semidefinite and Conic Programming Complexity Complexity Analysis Computational Complexity Complexity Reduction Optimizing Model Complexity Communication Complexity Managing Complexity Modeling Complexity in Social Systems Low-complexity Global Optimization Software Development for Modeling and Optimization Industrial applications INSTRUCTION FOR THE AUTHORS Authors of selected papers will be invited to submit extended versions to one of the IARIA Journals. Publisher: XPS (Xpert Publishing Services) Archived: ThinkMindTM Digital Library (free access) Submitted for indexing: - ISI Thompson Conference Proceedings Citation Index (CPCI) - Elsevier's EI Compendex Database, EI’s Engineering Information Index - DBLP, IET INSPEC, and other relevant specialized indexes. - Other indexes are being considered Important deadlines:Submission (full paper) February 5, 2012 Notification March 23, 2012 Registration April 7, 2012 Camera ready April 7, 2012 Only .pdf or .doc files will be accepted for paper submission. All received submissions will be acknowledged via an automated system. Regular Papers (up to 6-10 page article) Final author manuscripts will be 8.5" x 11", not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Helpful information for paper formatting can be found on the here. Your paper should also comply with the additional editorial rules. Once you receive the notification of paper acceptance, you will be provided by the publisher an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance. Work in Progress (short paper up to 4 pages long) Work-in-progress contributions are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as work in progress. Authors should submit a four-page (maximum) text manuscript in IEEE double-column format including the authors' names, affiliations, email contacts. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings. For more details, see the Work in Progress explanation page Posters (poster or collection of 6 to 8 slides, including industrial presentations) Posters are intended for ongoing research projects, concrete realizations, or industrial applications/projects presentations. Acceptance will be decided based on a 1-2 page abstract and/or 6-8 .pdf slide deck submitted through the conference submission website. The poster may be presented during sessions reserved for posters, or mixed with presentation of articles of similar topic. The slides must have comprehensive comments. One big Poster and/or the associated slides should be used for discussions, once on the conference site. For more details, see the Posters explanation page. Ideas (2 page proposal of novel idea) This category is dedicated to new ideas in their early stage. Contributions might refer to PhD dissertation, testing new approaches, provocative and innovative ideas, out-of-the-box, and out-of-the-book thinking, etc. Acceptance will be decided based on a maximum 2 page submission through the conference submission website. The contributions for Ideas will be presented in special sessions, where more debate is intended. The Idea contribution must be comprehensive, focused, very well supported (details might miss, obviously). A 6-8 slide deck should be used for discussions, once on the conference site. For more details, see the Ideas explanation page. Technical marketing/business/positioning presentations The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will not be published in the conference’s CD Proceedings. Presentations' slide decks will be posted on the IARIA's site. Please send your presentations to petre@iaria.org. Tutorials Tutorials provide overviews of current high interest topics. Proposals should be for three hour tutorials. Proposals must contain the title, the summary of the content, and the biography of the presenter(s). The tutorials' slide decks will be posted on the IARIA's site. Please send your proposals to petre@iaria.org Panel proposals The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies. The panel's slide deck will be posted on the IARIA's site. For more information, petre@iaria.org Workshop proposals We welcome workshop proposals on issues complementary to the topics of this conference. Your requests should be forwarded to petre@iaria.org. |
|