sac 2011 - The 26th ACM Symposium on Applied Computing
Topics/Call fo Papers
SAC 2011rThe 26th Annual ACM Symposium on Applied ComputingrMarch 21 ? 25, 2011, TaiChung, TaiwanrComputtter Forensiiics Trackr(http://comp.uark.edu/~bpanda/sac2011cfp.pdf)r
CALL FOR PAPERSrSAC 2011rFor the past twenty-five years the ACM Symposium on Applied Computing (SAC) has been a primaryrinternational forum for applied computer scientists, computer engineers and application developers torgather, present their work, and interact. SAC 2011 is sponsored by the ACM Special Interest Group onrApplied Computing (SIGAPP) and is hosted by the Tunghai University in TaiChung, Taiwan. SACrproceedings are published by ACM and are available through ACM's Digital Library. For morerinformation on SAC 2011, please visit: http://www.acm.org/conferences/sac/sac2011.rComput... Forensics TrackrWith the exponential growth of computer users, the number of criminal activities that involves computersrhas increased tremendously. The field of Computer Forensics has gained considerable attention in the pastrfew years. It is clear that in addition to law enforcement agencies and legal personnel, the involvement ofrcomputer savvy professionals is vital for any digital incident investigation. Unfortunately, there are notrmany well-qualified computer crime investigators available to meet this demand. An approach to solverthis problem is to develop state-of-the-art research and development tools for practitioners in addition torcreating awareness among computer users.rThe primary goal of this track will be to provide a forum for researchers, practitioners, and educatorsrinterested in Computer Forensics in order to advance research and educational methods in this increasinglyrchallenging field. We expect that people from academia, industry, government, and law enforcement willrshare their previously unpublished ideas on research, education, and practice through this track. We solicitroriginal, previously unpublished papers in the following general (non-exhaustive) list of topics.r? Incident Response and Live Data Analysisr? Operating System and Application Analysisr? File System Analysisr? Network Evidence Collectionr? Network Forensicsr? Data Hiding and Recoveryr? Digital Image Forensicsr? Event Reconstruction and Trackingr? Forensics in Untrusted Environmentsr? Hardware Assisted Forensicsr? Legal, Ethical and Privacy Issuesr? Attributing Malicious Cyber Activityr? Design for Forensic Evaluationr? Visualization for ForensicsrImportant DatesrPaper Submission: August 31, 2010 Author Notification: October 12, 2010rCamera-Ready Copy Due: November 2, 2010rPaper Submission GuidelinesrAll papers will be fully refereed and undergo a blind review process. All submissions should representroriginal and previously unpublished works that are currently not under review in any workshop,rconference, or journal. Also, a paper cannot be submitted to more than one track. Both basic and appliedrresearch papers are welcome. Electronic submission in PDF format is required. Hardcopy and faxrsubmissions will not be accepted.rAuthor(s) name(s) and address(es) must not appear in the paper body. Any self-reference should be in therthird person. Use the template at downloads from http://www.acm.org/conferences/sac/sac2011. Papersrcan not be more than 8 pages long and accepted papers over 6 pages will be assessed page fees of $80 perradditional page. The program committee may reject papers that exceed this length on the grounds ofrlength alone.rFor each submitted paper, full paper cover information including the paper title, abstract, list of keywords,rand list of authors with full names and postal address, telephone numbers, fax numbers, and e-mailraddresses must be completed in the submission system. Note: At least one of the authors of the acceptedrpaper must register for the conference and present the paper or it will not be published in the ACM digitalrlibrary or special issue.rA few key words should be provided. A paper cannot be sent to more than one track. Original manuscriptsrshould be submitted in electronic format through the START Conference manager web site:rhttps://www.softconf.com/b/sac11-tp/rTrack ChairsrLorie M. LiebrockrNew Mexico TechrEmail: liebrock-AT-cs.nmt.edurBrajendra PandarUniversity of ArkansasrEmail: bpanda-AT-uark.edurRobert L. HutchinsonrSandia National LaboratoriesrEmail: rlhutch-AT-sandia.govrTrack Program CommitteerSudhir Aggarwal (Florida State University)rRon Dodge (United States Military Academy)rDavid Duggan (Sandia National Laboratories)rJoe Giordano (Utica College)rYong Guan (Iowa State University)rWarren Harrison (Portland State University)rWayne Jansen (National Institute of Standardsrand Technology)rNasir Memon (Polytechnic University)rKara Nance (University of Alaska Fairbanks)rGilbert Peterson (Air Force Inst. of Technology)rDanny Quist (Los Alamos National Laboratory)rIndrajit Ray (Colorado State University)rWei Ren (China University of Geosciences)rMarc Rogers (Purdue University)rAvinash Srinivasan (Bloomsburg Univeristy)rCraig Valli (Edith Cowan University)rYanjun Zuo (University of North Dakota)
CALL FOR PAPERSrSAC 2011rFor the past twenty-five years the ACM Symposium on Applied Computing (SAC) has been a primaryrinternational forum for applied computer scientists, computer engineers and application developers torgather, present their work, and interact. SAC 2011 is sponsored by the ACM Special Interest Group onrApplied Computing (SIGAPP) and is hosted by the Tunghai University in TaiChung, Taiwan. SACrproceedings are published by ACM and are available through ACM's Digital Library. For morerinformation on SAC 2011, please visit: http://www.acm.org/conferences/sac/sac2011.rComput... Forensics TrackrWith the exponential growth of computer users, the number of criminal activities that involves computersrhas increased tremendously. The field of Computer Forensics has gained considerable attention in the pastrfew years. It is clear that in addition to law enforcement agencies and legal personnel, the involvement ofrcomputer savvy professionals is vital for any digital incident investigation. Unfortunately, there are notrmany well-qualified computer crime investigators available to meet this demand. An approach to solverthis problem is to develop state-of-the-art research and development tools for practitioners in addition torcreating awareness among computer users.rThe primary goal of this track will be to provide a forum for researchers, practitioners, and educatorsrinterested in Computer Forensics in order to advance research and educational methods in this increasinglyrchallenging field. We expect that people from academia, industry, government, and law enforcement willrshare their previously unpublished ideas on research, education, and practice through this track. We solicitroriginal, previously unpublished papers in the following general (non-exhaustive) list of topics.r? Incident Response and Live Data Analysisr? Operating System and Application Analysisr? File System Analysisr? Network Evidence Collectionr? Network Forensicsr? Data Hiding and Recoveryr? Digital Image Forensicsr? Event Reconstruction and Trackingr? Forensics in Untrusted Environmentsr? Hardware Assisted Forensicsr? Legal, Ethical and Privacy Issuesr? Attributing Malicious Cyber Activityr? Design for Forensic Evaluationr? Visualization for ForensicsrImportant DatesrPaper Submission: August 31, 2010 Author Notification: October 12, 2010rCamera-Ready Copy Due: November 2, 2010rPaper Submission GuidelinesrAll papers will be fully refereed and undergo a blind review process. All submissions should representroriginal and previously unpublished works that are currently not under review in any workshop,rconference, or journal. Also, a paper cannot be submitted to more than one track. Both basic and appliedrresearch papers are welcome. Electronic submission in PDF format is required. Hardcopy and faxrsubmissions will not be accepted.rAuthor(s) name(s) and address(es) must not appear in the paper body. Any self-reference should be in therthird person. Use the template at downloads from http://www.acm.org/conferences/sac/sac2011. Papersrcan not be more than 8 pages long and accepted papers over 6 pages will be assessed page fees of $80 perradditional page. The program committee may reject papers that exceed this length on the grounds ofrlength alone.rFor each submitted paper, full paper cover information including the paper title, abstract, list of keywords,rand list of authors with full names and postal address, telephone numbers, fax numbers, and e-mailraddresses must be completed in the submission system. Note: At least one of the authors of the acceptedrpaper must register for the conference and present the paper or it will not be published in the ACM digitalrlibrary or special issue.rA few key words should be provided. A paper cannot be sent to more than one track. Original manuscriptsrshould be submitted in electronic format through the START Conference manager web site:rhttps://www.softconf.com/b/sac11-tp/rTrack ChairsrLorie M. LiebrockrNew Mexico TechrEmail: liebrock-AT-cs.nmt.edurBrajendra PandarUniversity of ArkansasrEmail: bpanda-AT-uark.edurRobert L. HutchinsonrSandia National LaboratoriesrEmail: rlhutch-AT-sandia.govrTrack Program CommitteerSudhir Aggarwal (Florida State University)rRon Dodge (United States Military Academy)rDavid Duggan (Sandia National Laboratories)rJoe Giordano (Utica College)rYong Guan (Iowa State University)rWarren Harrison (Portland State University)rWayne Jansen (National Institute of Standardsrand Technology)rNasir Memon (Polytechnic University)rKara Nance (University of Alaska Fairbanks)rGilbert Peterson (Air Force Inst. of Technology)rDanny Quist (Los Alamos National Laboratory)rIndrajit Ray (Colorado State University)rWei Ren (China University of Geosciences)rMarc Rogers (Purdue University)rAvinash Srinivasan (Bloomsburg Univeristy)rCraig Valli (Edith Cowan University)rYanjun Zuo (University of North Dakota)
Other CFPs
- Mosharaka International Conference on Communications and Signal Processing (MIC-CSP2011)
- Mosharaka International Conference on Communications, Propagation, and Electronics (MIC-CPE2011)
- Special Issue on Embedded Computing Systems: Techniques and Trends
- Special Issue on: High Performance Computation on Hardware Accelerators"
- The 4th International Web Rule Symposium (RuleML 2010)
Last modified: 2010-08-24 14:14:40