posted by user: ehoefig || 4601 views || tracked by 9 users: [display]

METHOD 2013 : The 2nd IEEE International Workshop on Methods for Establishing Trust with Open Data

FacebookTwitterLinkedInGoogle

Link: http://compsac.cs.iastate.edu/method2013.php
 
When Jul 22, 2013 - Jul 26, 2013
Where Kyoto, Japan
Submission Deadline Apr 3, 2013
Notification Due Apr 26, 2013
Final Version Due May 5, 2013
Categories    opendata   trust   security   privacy
 

Call For Papers

---------------------------------------------------------------
The 2nd IEEE International Workshop on
Methods for Establishing Trust with Open Data
METHOD 2013

http://compsac.cs.iastate.edu/method2013.php

July 22-26, 2013 - Kyoto, Japan
(co-located with IEEE COMPSAC 2013)

Submission Deadline EXTENDED: 3rd April 2013
---------------------------------------------------------------

Aims and Scope
---------------
There are many forums where activists and political stakeholders discuss the topics of Trust and Open Data, but we found that our research community lacks a platform for researchers and engineers to exchange views using a more technical perspective. The METHOD workshops provide a forum for both groups to discuss approaches, theories, and concrete technical means required to establish trust in information that is processed, collected, managed, and provided using open data principles.

Trust is a highly complex concept that depends on a person’s background and personality. Without human help and input, an algorithm can hardly calculate an appropriate measure of trustworthiness for a given piece of information. But, what machines and algorithms can very well do, is to prepare information in a way that makes it easier for humans to come to a substantiated decision about its trustworthiness. One way of doing this is to try to make the handling of open data more comprehensible to the people involved.
Therefore, METHOD 2013 will focus on the transparency of processes involved with open data. The workshop will be a venue for presenting and discussing novel research ideas, as well as technical applications.

Topics
---------------
We invite authors to submit original papers that are relevant to both of the core topics of this workshop: Open Data and Trust Research. Contributions from the following fields are especially welcome:

- Provenance of open data
- Information quality & trustworthiness
- Data source attribution
- Integrity of information
- Transparency and verification of information flows
- Modeling trust in data-centric applications
- Trust representation and derivation from open data
- Attestation for data services and operations
- Trust management in the semantic web
- Community-based accountability
- Trustworthiness of user ratings and recommender systems
- Privacy preservation
- Detection and containment of privacy leaks
- De-identification of data
- Traceable data publishing and re-use
- Data fusion and conflict resolution
- Usage of meta-data for establishing trust
- Software architectures for transparent management of open data

Important Dates
-----------------------
03 April 2013 Deadline for paper submission
26 April 2013 Notification of acceptance
05 May 2013 Camera-ready and registration

Papers must be submitted electronically via the METHOD 2013 submission page found at http://myreview.cs.iastate.edu/METHOD2013/. Follow the IEEE Computer Society Press Proceedings Author Guidelines to prepare your papers: http://www.computer.org/portal/web/cscps/submission (use the A4 template). All papers will be carefully reviewed by at least three reviewers. Papers can be submitted as regular papers (six pages), and the acceptance will depend on reviewer feedback. Accepted papers will be published in the workshop proceedings of the IEEE Computer Software and Applications Conference (COMPSAC 2013) by the IEEE CS Press. At least one of the authors of each accepted paper must register as a full participant of the workshop to have the paper published in the proceedings. Each accepted paper must be presented in person by an author.

Program Committee
-------------------------
Daniel Dietrich, Open Knowledge Foundation, Germany
Rino Falcone, Institute of Cognitive Sciences and Technologies, Italy
Matthias Fluegge, Fraunhofer FOKUS, Germany
Olaf Hartig, University of Waterloo, Canada
Vincent Huang, Ericsson Research, Sweden
Tomas Knap, Charles University Prague, Czech Republic
Jean-Francois Lalande, ENSI de Bourges, France
Zhendong Ma, Austrian Institute of Technology, Austria
Eric Mannens, Gent University, Belgium
Florian Marienfeld, Fraunhofer FOKUS, Germany
Sjouke Mauw, University of Luxembourg, Luxembourg
Uwe Nestmann, Technische Universitaet Berlin, Germany
Miquel Oliver, Universitat Pompeu Fabra, Spain
Rene Rahn, Freie Universitaet Berlin, Germany
Waltraut Ritter, Knowledge Dialogues and City University, Hong Kong
Florian Skopik, Austrian Institute of Technology, Austria
Peng Zhang, Xi'an University of Posts and Telecommunications, China

Organisation
--------------------
Edzard Hoefig, Freie Universitaet Berlin, Germany; edzard.hoefig@fu-berlin.de
Ina Schieferdecker, Fraunhofer FOKUS, Germany; ina.schieferdecker@fokus.fraunhofer.de

_______________________________________________
METHOD 2013
http://compsac.cs.iastate.edu/method2013.php

Related Resources

ICDM 2024   IEEE International Conference on Data Mining
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
IEEE BigData 2024   2024 IEEE International Conference on Big Data
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
AIKE 2024   7th IEEE International Conference on Artificial Intelligence and Knowledge Engineering
BDCAT 2024   IEEE/ACM Int’l Conf. on Big Data Computing, Applications, and Technologies
CSW 2024   2024 3rd International Conference on Cyber Security
HiPC 2024   31st IEEE International Conference on High Performance Computing, Data, and Analytics
SI on ATD&IS III 2024   Special Issue on Advanced Technologies in Data and Information Security III, Applied Sciences, MDPI