UbiSafe 2012 - 4th IEEE International Symposium on UbiSafe Computing (IEEE UbiSafe-12)
Topics/Call fo Papers
4th IEEE International Symposium on UbiSafe Computing
(IEEE UbiSafe-12)
Venue & Dates: Liverpool, UK, 25-27 June, 2012
http://trust.csu.edu.cn/conference/ubisafe2012/
In Conjunction with
The 11th IEEE International Conference on Trust, Security and Privacy
in Computing and Communications (IEEE TrustCom 2012),
Liverpool, UK, 25-27 June, 2012
http://scim.brad.ac.uk/~hmibrahi/TrustCom2012/
Introduction
Computers are now available anytime, anywhere, by different means, and
distributed unobtrusively throughout everyday environments in which
physical objects/artifacts embedded with invisible computers are
sensible and networked locally and globally. Such "any" computers open
tremendous opportunities to provide numerous novel
services/applications in both real world and cyber spaces, and exist
ubiquitously in our daily life, working, learning, traveling,
entertainment, medicine, etc. Although it is yet unclear what exactly
the real-cyber integrated worlds would be, there is no doubt that they
must be safe.
The 4th IEEE International Symposium on Ubisafe Computing (UbiSafe-12)
will be held in conjunction with "The 11th IEEE International
Conference on Trust, Security and Privacy in Computing and
Communications (IEEE TrustCom-12)". It follows the success of
UbiSafe-11 in Changsha, China. It aims at bringing together
researchers and practitioners in the world working on theories and
technologies for ubiquitous artifacts to function safely for different
purposes; for ubiquitous systems to work safely in various situations;
and for ubiquitous environments to behave safely with all people.
Scope and Interests
IEEE UbiSafe-12 is an international symposium for presenting and
discussing emerging ideas and trends in aspects of UbiSafe computing,
but are not limited to:
(1) Fundamentals
UbiSafe concepts, definitions, basic elements, models, frameworks and
methodologies, human-centric paradigms,
multi-disciplinary/inter-disciplinary/trans-disciplinary approaches,
semantics, ontologies, UbiSafe requirements and formal specifications
and validations, information assurance, etc.
(2) Technologies
Security and privacy protection, reliability and fault tolerance, risk
analysis, uncertainty and exception handling, socially intelligent
agents, intuitive/natural user interface, interaction design,
context-awareness, intelligent computing, service-oriented computing,
hardware, software, middleware, etc.
(3) Systems
Embedded systems, wearable systems, augmented systems, context-based
systems, communication systems, safety-critical systems, survivable
systems, persistent systems, autonomous/autonomic systems, proactive
systems, network infrastructure, sensor networks, etc.
(4) Applications
Smart objects, smart environments, information appliance and
artifacts, everyday gadgets, robots, safety care, healthcare, medical
care and services, working, learning, traveling, entertainment, case
studies, etc.
(5) Measures and Assessments
UbiSafe attributes and measures for safety, trust, faith, amenity,
easiness, comfort, satisfaction and worry, UbiSafe levels and
relations, UbiSafe quality, assessment criteria and authority,
subjective and objective assessment standards, evaluation
methodologies, testing, measuring and monitoring tools, etc.
(6) Human Factors and Social Issues
Human and social aspects of UbiSafe, UbiSafe sources and factors,
social rules, regulations and laws, human factors, human behavior
analysis, modeling of human feelings, traditional and cultural issues,
ethical issues, etc.
Submission and Publication Information
The accepted papers from this symposium will be published by IEEE
Computer Society in IEEE TrustCom-12 conference proceedings (indexed
by EI Compendex). Papers should be written in English conforming to
the IEEE conference proceedings format (8.5" x 11", Two-Column).
Papers should be submitted through the paper submission system at the
symposium website. Each paper is limited to 6 pages (or 8 pages with
the over length charge). Distinguished papers, after further
revisions, will be published in special issues indexed by SCI and EI.
Submitting a paper to the symposium means that, if the paper is
accepted, at least one author should attend the symposium and present
the paper.
Important Dates
(1) Submission Deadline: 01 March, 2012
(2) Authors Notification: 08 April, 2012
(3) Final Manuscript Due: 08 May, 2012
(4) Registration Due: 08 May, 2012
(5) Conference Dates: 25-27 June, 2012
General Co-Chairs
Athanasios V. Vasilakos, National Technical University of Athens, Greece
Wenbin Jiang, Huazhong University of Science and Technology, China
Program Co-Chairs
Gregorio Martinez, University of Murcia, Spain
Ryan K. L. Ko, HP Labs, Singapore
Program Committee (In alphabetical order)
Please check the website for the full list.
Publicity Co-Chairs
Scott Fowler, Linkoping University, Sweden
Fang Qi, Central South University, China
Steering Committee
Vipin Chaudhary, University at Buffalo, SUNY, USA
Jingde Cheng, Saitama University, Japan
Yuanshun Dai, University of Tennessee, USA
Thomas Grill, Johannes Kepler Univ. Linz, Austria
Runhe Huang, Hosei University, Japan
Qun Jin, Waseda University, Japan
Ismail Khalil, Johannes Kepler Univ. Linz, Austria
Xiaolin (Andy) Li, University of Florida, USA
Jianhua Ma, Hosei University, Japan
Guojun Wang, Central South University, China
Laurence T. Yang, St. Francis Xavier University, Canada
Qiangfu Zhao, The University of Aizu, Japan
Webmaster
Xiaoxiao Zheng, Central South University, China
Contact
Please email inquiries concerning IEEE UbiSafe 2012 to:
Prof. Guojun Wang: csgjwang AT gmail DOT com
and the symposium organizers: UbiSafe2012 AT gmail DOT com
Homepage: http://trust.csu.edu.cn/faculty/~csgjwang/
(IEEE UbiSafe-12)
Venue & Dates: Liverpool, UK, 25-27 June, 2012
http://trust.csu.edu.cn/conference/ubisafe2012/
In Conjunction with
The 11th IEEE International Conference on Trust, Security and Privacy
in Computing and Communications (IEEE TrustCom 2012),
Liverpool, UK, 25-27 June, 2012
http://scim.brad.ac.uk/~hmibrahi/TrustCom2012/
Introduction
Computers are now available anytime, anywhere, by different means, and
distributed unobtrusively throughout everyday environments in which
physical objects/artifacts embedded with invisible computers are
sensible and networked locally and globally. Such "any" computers open
tremendous opportunities to provide numerous novel
services/applications in both real world and cyber spaces, and exist
ubiquitously in our daily life, working, learning, traveling,
entertainment, medicine, etc. Although it is yet unclear what exactly
the real-cyber integrated worlds would be, there is no doubt that they
must be safe.
The 4th IEEE International Symposium on Ubisafe Computing (UbiSafe-12)
will be held in conjunction with "The 11th IEEE International
Conference on Trust, Security and Privacy in Computing and
Communications (IEEE TrustCom-12)". It follows the success of
UbiSafe-11 in Changsha, China. It aims at bringing together
researchers and practitioners in the world working on theories and
technologies for ubiquitous artifacts to function safely for different
purposes; for ubiquitous systems to work safely in various situations;
and for ubiquitous environments to behave safely with all people.
Scope and Interests
IEEE UbiSafe-12 is an international symposium for presenting and
discussing emerging ideas and trends in aspects of UbiSafe computing,
but are not limited to:
(1) Fundamentals
UbiSafe concepts, definitions, basic elements, models, frameworks and
methodologies, human-centric paradigms,
multi-disciplinary/inter-disciplinary/trans-disciplinary approaches,
semantics, ontologies, UbiSafe requirements and formal specifications
and validations, information assurance, etc.
(2) Technologies
Security and privacy protection, reliability and fault tolerance, risk
analysis, uncertainty and exception handling, socially intelligent
agents, intuitive/natural user interface, interaction design,
context-awareness, intelligent computing, service-oriented computing,
hardware, software, middleware, etc.
(3) Systems
Embedded systems, wearable systems, augmented systems, context-based
systems, communication systems, safety-critical systems, survivable
systems, persistent systems, autonomous/autonomic systems, proactive
systems, network infrastructure, sensor networks, etc.
(4) Applications
Smart objects, smart environments, information appliance and
artifacts, everyday gadgets, robots, safety care, healthcare, medical
care and services, working, learning, traveling, entertainment, case
studies, etc.
(5) Measures and Assessments
UbiSafe attributes and measures for safety, trust, faith, amenity,
easiness, comfort, satisfaction and worry, UbiSafe levels and
relations, UbiSafe quality, assessment criteria and authority,
subjective and objective assessment standards, evaluation
methodologies, testing, measuring and monitoring tools, etc.
(6) Human Factors and Social Issues
Human and social aspects of UbiSafe, UbiSafe sources and factors,
social rules, regulations and laws, human factors, human behavior
analysis, modeling of human feelings, traditional and cultural issues,
ethical issues, etc.
Submission and Publication Information
The accepted papers from this symposium will be published by IEEE
Computer Society in IEEE TrustCom-12 conference proceedings (indexed
by EI Compendex). Papers should be written in English conforming to
the IEEE conference proceedings format (8.5" x 11", Two-Column).
Papers should be submitted through the paper submission system at the
symposium website. Each paper is limited to 6 pages (or 8 pages with
the over length charge). Distinguished papers, after further
revisions, will be published in special issues indexed by SCI and EI.
Submitting a paper to the symposium means that, if the paper is
accepted, at least one author should attend the symposium and present
the paper.
Important Dates
(1) Submission Deadline: 01 March, 2012
(2) Authors Notification: 08 April, 2012
(3) Final Manuscript Due: 08 May, 2012
(4) Registration Due: 08 May, 2012
(5) Conference Dates: 25-27 June, 2012
General Co-Chairs
Athanasios V. Vasilakos, National Technical University of Athens, Greece
Wenbin Jiang, Huazhong University of Science and Technology, China
Program Co-Chairs
Gregorio Martinez, University of Murcia, Spain
Ryan K. L. Ko, HP Labs, Singapore
Program Committee (In alphabetical order)
Please check the website for the full list.
Publicity Co-Chairs
Scott Fowler, Linkoping University, Sweden
Fang Qi, Central South University, China
Steering Committee
Vipin Chaudhary, University at Buffalo, SUNY, USA
Jingde Cheng, Saitama University, Japan
Yuanshun Dai, University of Tennessee, USA
Thomas Grill, Johannes Kepler Univ. Linz, Austria
Runhe Huang, Hosei University, Japan
Qun Jin, Waseda University, Japan
Ismail Khalil, Johannes Kepler Univ. Linz, Austria
Xiaolin (Andy) Li, University of Florida, USA
Jianhua Ma, Hosei University, Japan
Guojun Wang, Central South University, China
Laurence T. Yang, St. Francis Xavier University, Canada
Qiangfu Zhao, The University of Aizu, Japan
Webmaster
Xiaoxiao Zheng, Central South University, China
Contact
Please email inquiries concerning IEEE UbiSafe 2012 to:
Prof. Guojun Wang: csgjwang AT gmail DOT com
and the symposium organizers: UbiSafe2012 AT gmail DOT com
Homepage: http://trust.csu.edu.cn/faculty/~csgjwang/
Other CFPs
- Fourth International Workshop on Data Quality in Integration Systems (DQIS)
- First International Workshop on Data Management for Emerging Network Infrastructures (DaMEN)
- 2nd International Workshop on Social Networks and Social Media Mining on the Web (SNSMW)
- International Workshop on Flash-based Database Systems (FlashDB)
- 1st International Workshop on Graph-structured Data Bases (GDB 2011)
Last modified: 2012-01-16 20:43:38