COMPUTE 2013 - The 6th ACM India Computing Conference Theme: Next Generation Information, Computing and Security
Topics/Call fo Papers
Compute, is a peer reviewed conference series held in India under the aegis of ACM India. Every year it is hosted by one of the ACM Chapters in India. We are pleased to have VIT ACM student chapter host Compute 2013, the sixth in the series, at VIT University, Tamil nadu. The dates shall be 22nd to 24th August 2013. The previous Compute proceedings have been published in Digital Library (e.g see
http://dl.acm.org/citation.cfm?id=2459118&coll=DL&... for Compute 2012 proceedings).
Compute’2013 is the first such convention being held in the state of Tamil Nadu. The convention is being organized by ACM VIT Student Chapter. This two-day convention shall include workshops and tutorials, technical sessions of technical paper presentations and panel discussions spread over two-days. Compute’2013 will also mark the completion of two decades of computing and allied disciplines at VIT and almost three decades of the institute itself. School of Information Technology & Engineering will usher into the 5th year of its establishment
Call for Papers
It is now widely recognized that applied research has a key role to play in computer science is moving beyond the academia into the business domain, more specifically with practitioner perspective of technology absorption, and innovation. The aim of this conference is to bring together researchers, practitioners, technology market movers, and thought leaders, with a view to advance the state of the art, and the state of the practice in applied research, which is a catalyst in leveraging of Computer Science by enterprises and consumer businesses. In context of complexity of today’s information needs, computing needs and security needs, this conference intends to explore the practical implications and desiderata for dealing with complexity of next generation information, computing and security needs for enterprises and consumers alike.
In context of information, complexity arises from proliferation and diversification of information sources, information formats, information access media, penetration of mobility and trends like BYOD, coupled with large amounts of unstructured data, and need for real time analytics on both classical structured content and unstructured content, and finally enhanced role of social computing as a source of information and analytics. From a business perspectives these trends of mobility, social, and analytics are changing the way both information is produced as well as consumed.
In context of computing, the focus has shifted from classical high performance models to scale out models and elastic models like cloud computing, leveraging commodity hardware. Accordingly even software innovations like map reduce which offer a common man approach to building scalable software applications and algorithms thereof. Hence today we are witness a new era of scalable computing, wherein cloud based delivery has become the default mode of delivering solutions. Even from a perspective of high performance systems based on Map Reduce like Hadoop, etc have become mainstream as opposed to classical scale up models.
From a security perspective, the complexity of security has increased via the increasing penetration of mobiles into workforce, trends like BYOD, coupled with enhanced need for providing services via web for cloud based services, and lastly the need for leveraging public social platforms for useful information alongside enterprise information. The resultant heightened attack surface, and newer threat models are a cause of concern and need to be investigated especially in context of providing enterprises confidence in carrying out their business transactions.
The conference shall provide a forum to discuss diverse contemporary research and practitioner perspectives covering this theme. We invite both research and practitioner oriented submissions in the broad areas of contemporary information management, scalable computing and security covering topics (not restricted to ) as below:
Information Management
Structured-unstructured information integration
Search in both enterprise and internet context
Data management for Big Data
Data velocity
Databases and Related Topics
NoSQL databases
Real ? time Business Intelligence and Data Warehousing
Data Mining
Text mining
Image mining / Processing
Video Analytics
BYOD
Enterprise Mobility
Mobile Information Management
Social Information Mining
Text summarization
Information Standards
Anywhere anytime access to Information (mobility, pervasive computing)
Multi-channel and Pervasive Information access (including mobility)
Machine Learning
Information Accessibility/Usability (especially for Web)
Semantic Web, Web 3.0, and Semantic Technologies
Web 2.0, and Rich Internet Applications
Social Network Analytics
Scalable Computing
? Cloud based delivery
o IaaS
o PaaS
o SaaS
? Map reduce and applications
? Hadoop and its Variants
? Algorithms for Hadoop and Map Reduce
? Parallel Computing
? Performance and Benchmarking techniques
? HPC applications
? Grid computing
? Fabric Computing
? Models for MultiTenancy
? Power management for HPC
? Application Migration to Cloud
? Automated Parallelization
? Hybrid Cloud Models
Next Generation Security
? Cloud security
? Mobile Application Security
? Web application Security
? Information Security Models for Enterprises
? Applied Cyptography
? BYOD security
? Data Privacy
? Confidentiality
? Security in context of Social Computing
? Infrastructure Security
? Identity Management for Web and Social Platforms
.
Types of Submissions: Original and un-published contributions on the convention theme are invited from academia, research organizations and industry. While original research contributions are clearly welcome, we also welcome industry experience reports of successful deployments of latest techniques/algorithms/practices with detailed analysis of the deployment data. Original insights from the deployments are crucial to get acceptance. The selected contributions will be divided into the following broad and tentative technical tracks:
-Scalable Computing Paradigms
-Next Generation Information Management
-Next Generation Security
Submission Guidelines: Authors are asked to submit original, unpublished research papers that are not being considered for publication in any other forum. The authors can submit upto a maximum of 8 ACM conference pages (about 4000 words). The conference format specifications and templates can be found at: http://www.acm.org/sigs/pubs/proceed/template.html At least one author is required to attend the conference and present the paper. We are working to get a single volume of proceedings encompassing papers in all the tracks to be published in the digital library of ACM. Papers to be submitted via the online submission system at easychair link .Submissions will be judged on correctness, originality, significance, quality of presentation, and relevance to the convention.
Important Deadlines:
- Submission of Abstract : June 10, 2013
- Submission of Paper : June 15, 2013
- Notification of Acceptance : July 25, 2013
- Registration of Authors : August 10, 2013
- Submission of Camera-ready Papers : August 10, 2013
Call for Pre-Convention Workshop/Tutorial Proposals: The proposals for workshops/tutorials are invited on any of the major areas connected to the CFP but not limited to:
-Cloud Computing
-Big data
-Business Analytics
-Natural Language Processing
-Web Application Security
-Social Information Management
http://dl.acm.org/citation.cfm?id=2459118&coll=DL&... for Compute 2012 proceedings).
Compute’2013 is the first such convention being held in the state of Tamil Nadu. The convention is being organized by ACM VIT Student Chapter. This two-day convention shall include workshops and tutorials, technical sessions of technical paper presentations and panel discussions spread over two-days. Compute’2013 will also mark the completion of two decades of computing and allied disciplines at VIT and almost three decades of the institute itself. School of Information Technology & Engineering will usher into the 5th year of its establishment
Call for Papers
It is now widely recognized that applied research has a key role to play in computer science is moving beyond the academia into the business domain, more specifically with practitioner perspective of technology absorption, and innovation. The aim of this conference is to bring together researchers, practitioners, technology market movers, and thought leaders, with a view to advance the state of the art, and the state of the practice in applied research, which is a catalyst in leveraging of Computer Science by enterprises and consumer businesses. In context of complexity of today’s information needs, computing needs and security needs, this conference intends to explore the practical implications and desiderata for dealing with complexity of next generation information, computing and security needs for enterprises and consumers alike.
In context of information, complexity arises from proliferation and diversification of information sources, information formats, information access media, penetration of mobility and trends like BYOD, coupled with large amounts of unstructured data, and need for real time analytics on both classical structured content and unstructured content, and finally enhanced role of social computing as a source of information and analytics. From a business perspectives these trends of mobility, social, and analytics are changing the way both information is produced as well as consumed.
In context of computing, the focus has shifted from classical high performance models to scale out models and elastic models like cloud computing, leveraging commodity hardware. Accordingly even software innovations like map reduce which offer a common man approach to building scalable software applications and algorithms thereof. Hence today we are witness a new era of scalable computing, wherein cloud based delivery has become the default mode of delivering solutions. Even from a perspective of high performance systems based on Map Reduce like Hadoop, etc have become mainstream as opposed to classical scale up models.
From a security perspective, the complexity of security has increased via the increasing penetration of mobiles into workforce, trends like BYOD, coupled with enhanced need for providing services via web for cloud based services, and lastly the need for leveraging public social platforms for useful information alongside enterprise information. The resultant heightened attack surface, and newer threat models are a cause of concern and need to be investigated especially in context of providing enterprises confidence in carrying out their business transactions.
The conference shall provide a forum to discuss diverse contemporary research and practitioner perspectives covering this theme. We invite both research and practitioner oriented submissions in the broad areas of contemporary information management, scalable computing and security covering topics (not restricted to ) as below:
Information Management
Structured-unstructured information integration
Search in both enterprise and internet context
Data management for Big Data
Data velocity
Databases and Related Topics
NoSQL databases
Real ? time Business Intelligence and Data Warehousing
Data Mining
Text mining
Image mining / Processing
Video Analytics
BYOD
Enterprise Mobility
Mobile Information Management
Social Information Mining
Text summarization
Information Standards
Anywhere anytime access to Information (mobility, pervasive computing)
Multi-channel and Pervasive Information access (including mobility)
Machine Learning
Information Accessibility/Usability (especially for Web)
Semantic Web, Web 3.0, and Semantic Technologies
Web 2.0, and Rich Internet Applications
Social Network Analytics
Scalable Computing
? Cloud based delivery
o IaaS
o PaaS
o SaaS
? Map reduce and applications
? Hadoop and its Variants
? Algorithms for Hadoop and Map Reduce
? Parallel Computing
? Performance and Benchmarking techniques
? HPC applications
? Grid computing
? Fabric Computing
? Models for MultiTenancy
? Power management for HPC
? Application Migration to Cloud
? Automated Parallelization
? Hybrid Cloud Models
Next Generation Security
? Cloud security
? Mobile Application Security
? Web application Security
? Information Security Models for Enterprises
? Applied Cyptography
? BYOD security
? Data Privacy
? Confidentiality
? Security in context of Social Computing
? Infrastructure Security
? Identity Management for Web and Social Platforms
.
Types of Submissions: Original and un-published contributions on the convention theme are invited from academia, research organizations and industry. While original research contributions are clearly welcome, we also welcome industry experience reports of successful deployments of latest techniques/algorithms/practices with detailed analysis of the deployment data. Original insights from the deployments are crucial to get acceptance. The selected contributions will be divided into the following broad and tentative technical tracks:
-Scalable Computing Paradigms
-Next Generation Information Management
-Next Generation Security
Submission Guidelines: Authors are asked to submit original, unpublished research papers that are not being considered for publication in any other forum. The authors can submit upto a maximum of 8 ACM conference pages (about 4000 words). The conference format specifications and templates can be found at: http://www.acm.org/sigs/pubs/proceed/template.html At least one author is required to attend the conference and present the paper. We are working to get a single volume of proceedings encompassing papers in all the tracks to be published in the digital library of ACM. Papers to be submitted via the online submission system at easychair link .Submissions will be judged on correctness, originality, significance, quality of presentation, and relevance to the convention.
Important Deadlines:
- Submission of Abstract : June 10, 2013
- Submission of Paper : June 15, 2013
- Notification of Acceptance : July 25, 2013
- Registration of Authors : August 10, 2013
- Submission of Camera-ready Papers : August 10, 2013
Call for Pre-Convention Workshop/Tutorial Proposals: The proposals for workshops/tutorials are invited on any of the major areas connected to the CFP but not limited to:
-Cloud Computing
-Big data
-Business Analytics
-Natural Language Processing
-Web Application Security
-Social Information Management
Other CFPs
- 2013 International Conference on Advanced Computing and Applications
- 14th Conference of the European Chapter of the Association for Computational Linguistics
- ??International Workshop on 3D Multimedia for Mobile and 3D-MMWN Wireless Networks (3D-MMWN 2013)
- The 2nd International Workshop on Community Networks and Bottom-up-Broadband(CNBuB 2013)
- The 2013 International Workshop on GReen Optimized Wireless Networks (GROWN-2013)
Last modified: 2013-04-29 20:49:21