
From alejandro.canovas.cp46700@gmail.com  Thu Feb  3 14:50:53 2011
Return-Path: <alejandro.canovas.cp46700@gmail.com>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 631873A6B37 for <sam@core3.amsl.com>; Thu,  3 Feb 2011 14:50:53 -0800 (PST)
X-Quarantine-ID: <O6woY16Gk2Rr>
X-Virus-Scanned: amavisd-new at amsl.com
X-Amavis-Alert: BAD HEADER, Non-encoded 8-bit data (char E1 hex): From: Alejandro C\341novas Solbes<al[...]
X-Spam-Flag: NO
X-Spam-Score: -2.911
X-Spam-Level: 
X-Spam-Status: No, score=-2.911 tagged_above=-999 required=5 tests=[AWL=-0.471, BAYES_20=-0.74, GB_I_INVITATION=-2, MIME_8BIT_HEADER=0.3]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O6woY16Gk2Rr for <sam@core3.amsl.com>; Thu,  3 Feb 2011 14:50:50 -0800 (PST)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.9]) by core3.amsl.com (Postfix) with ESMTP id 9C8FA3A6B22 for <sam@irtf.org>; Thu,  3 Feb 2011 14:50:49 -0800 (PST)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id p13Ms8UR007550 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Thu, 3 Feb 2011 23:54:08 +0100
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id p13Ms7Hj014552 for <sam@irtf.org>; Thu, 3 Feb 2011 23:54:08 +0100
Received: from JLLORET (vpn035.vpns.upv.es [158.42.244.35]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id p13Ms628002021 for <sam@irtf.org>; Thu, 3 Feb 2011 23:54:07 +0100
Date: Thu, 3 Feb 2011 23:54:07 +0100
Message-Id: <201102032254.p13Ms628002021@smtp.upv.es>
From: Alejandro Cánovas Solbes<alejandro.canovas.cp46700@gmail.com>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] Deadline Extension: ICCGI 2011 || June 19-24, 2011 - Luxembourg
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Feb 2011 22:50:53 -0000

Deadline Extension: ICCGI 2011 || June 19-24, 2011 - Luxembourg

INVITATION:

=================
Note that the submission deadline has been extended to February 28, 2011.
Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results.
=================


============== ICCGI 2011 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

ICCGI 2011, The Sixth International Multi-Conference on Computing in the Global Information Technology

June 19-24, 2011 - Luxembourg

General page: http://www.iaria.org/conferences2011/ICCGI11.html

Call for Papers: http://www.iaria.org/conferences2011/CfPICCGI11.html

Submission deadline: February 28, 2011

Technical Co-Sponsors:
- University Politehnica of Bucharest
- University of Nicosia
- University of Surrey
- Université Lille Nord
- Institut de Recherche d'Hydro-Québec - Varennes
- Illinois State University
- HCL America
- Intel, USA
Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org

Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.

All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html

ICCGI 2011 Topics (topics and submission details: see CfP on the site)

Industrial systems
Control theory and systems; Fault-tolerance and reliability; Data engineering; Enterprise computing and evaluation; Electrical and electronics engineering; Economic decisions and information systems; Advanced robotics; Virtual reality systems; Industrial systems and applications; Industrial and financial systems; Industrial control electronics; Industrial IT solutions

Evolutionary computation
Algorithms, procedures, mechanisms and applications; Computer architecture and systems; Computational sciences; Computation in complex systems; Computer and communication systems; Computer networks; Computer science theory; Computation and computer security; Computer simulation; Digital telecommunications; Distributed and parallel computing; Computation in embedded and real-time systems; Soft computing; User-centric computation

Autonomic and autonomous systems
Automation and autonomous systems; Theory of Computing; Autonomic computing; Autonomic networking; Network computing; Protecting computing; Theories of agency and autonomy; Multi-agent evolution, adaptation and learning; Adjustable and self-adjustable autonomy; Pervasive systems and computation; Computing with locality principles; GRID networking and services; Pervasive computing; Cluster computing and performance; Artificial intelligence Computational linguistics; Cognitive technologies; Decision making; Evolutionary computation; Expert systems; Computational biology

Bio-technologies
Models and techniques for biometric technologies; Bioinformatics; Biometric security; Computer graphics and visualization; Computer vision and image processing; Computational biochemistry; Finger, facial, iris, voice, and skin biometrics; Signature recognition; Multimodal biometrics; Verification and identification techniques; Accuracy of biometric technologies; Authentication smart cards and biometric metrics; Performance and assurance testing; Limitations of biometric technologies; Biometric card technologies; Biometric wireless technologies; Biometric software and hardware; Biometric standards

Knowledge data systems
Data mining and Web mining; Knowledge databases and systems; Data warehouse and applications; Data warehousing and information systems; Database performance evaluation; Semantic and temporal databases; Database systems Databases and information retrieval; Digital library design; Meta-data modeling

Mobile and distance education
Human computer interaction; Educational technologies; Computer in education; Distance learning; E-learning; Mobile learning Cognitive support for learning; Internet-based education; Impact of ICT on education and society; Group decision making and software; Habitual domain and information technology; Computer-mediated communications; Immersing authoring; Contextual and cultural challenges in user mobility

Intelligent techniques, logics, and systems
Intelligent agent technologies; Intelligent and fuzzy information processing; Intelligent computing and knowledge management; Intelligent systems and robotics; Fault-tolerance and reliability; Fuzzy logic & systems; Genetic algorithms; Haptic phenomena; Graphic recognition; Neural networks; Symbolic and algebraic computation; Modeling, simulation and analysis of business processes and systems

Knowledge processing
Knowledge representation models; Knowledge languages; Cognitive science; Knowledge acquisition; Knowledge engineering; Knowledge processing under uncertainty; Machine intelligence; Machine learning; Making decision through Internet; Networking knowledge plan

Information technologies
Information technology and organizational behavior; Agents, data mining and ontologies; Information retrieval systems; Information and network security; Information ethics and legal evaluations; Optimization and information technology; Organizational information systems; Information fusion; Information management systems; Information overload; Information policy making; Information security; Information systems; Information discovery

Internet and web technologies
Internet and WWW-based computing; Web and Grid computing; Internet service and training; IT and society; IT in education and health; Management information systems; Visualization and group decision making; Web based language development; Web search and decision making; Web service ontologies; Scientific web intelligence; Online business and decision making; Business rule language; E-Business; E-Commerce; Online and collaborative work; Social eco-systems and social networking; Social decisions on Internet; Computer ethics

Digital information processing
Mechatronics; Natural language processing; Medical imaging; Image processing; Signal processing; Speech processing; Video processing; Pattern recognition; Pattern recognition models; Graphics & computer vision; Medical systems and computing

Cognitive science and knowledge agent-based systems
Cognitive support for e-learning and mobile learning; Agents and cognitive models; Agents & complex systems; computational ecosystems; Agent architectures, perception, action & planning in agents; Agent communication: languages, semantics, pragmatics & protocols; Agent-based electronic commerce and trading systems Multi-agent constraint satisfaction; Agent programming languages, development environments and testbeds; Computational complexity in autonomous agents; Multi-agent planning and cooperation; Logics and formal models of for agency verification; Nomadic agents; Negotiation, auctions, persuasion; Privacy and security issues in multi-agent systems

Mobility and multimedia systems
Mobile communications; Multimedia and visual programming; Multimedia and decision making; Multimedia systems; Mobile multimedia systems; User-centered mobile applications; Designing for the mobile devices; Contextual user mobility; Mobile strategies for global market; Interactive television and mobile commerce

Systems performance
Performance evaluation; Performance modeling; Performance of parallel computing; Reasoning under uncertainty; Reliability and fault-tolerance; Performance instrumentation; Performance monitoring and corrections; Performance in entity-dependable systems; Real-time performance and near-real time performance evaluation; Performance in software systems; Performance and hybrid systems; Measuring performance in embedded systems

Networking and telecommunications
Telecommunication and Networking; Telecommunication Systems and Evaluation; Multiple Criteria Decision Making in Information Technology; Network and Decision Making; Networks and Security; Communications protocols (SIP/H323/MPLS/IP); Specialized networks (GRID/P2P/Overlay/Ad hoc/Sensor); Advanced services (VoIP/IPTV/Video-on-Demand; Network and system monitoring and management; Feature interaction detection and resolution; Policy-based monitoring and managements systems; Traffic modeling and monitoring; Traffic engineering and management; Self-monitoring, self-healing and self-management systems; Man-in-the-loop management paradigm

Software development and deployment
Software requirements engineering; Software design, frameworks, and architectures; Software interactive design; Formal methods for software development, verification and validation; Neural networks and performance; Patterns/Anti-patterns/Artifacts/Frameworks; Agile/Generic/Agent-oriented programming; Empirical software evaluation metrics; Software vulnerabilities; Reverse engineering; Software reuse; Software security, reliability and safety; Software economics; Software testing and debugging; Tracking defects in the OO design; Distributed and parallel software; Programming languages; Declarative programming; Real-time and embedded software; Open source software development methodologies; Software tools and deployment environments; Software Intelligence; Software Performance and Evaluation

Knowledge virtualization
Modeling techniques, tools, methodologies, languages; Model-driven architectures (MDA); Service-oriented architectures (SOA); Utility computing frameworks and fundamentals; Enabled applications through virtualization; Small-scale virtualization methodologies and techniques; Resource containers, physical resource multiplexing, and segmentation; Large-scale virtualization methodologies and techniques; Management of virtualized systems; Platforms, tools, environments, and case studies; Making virtualization real; On-demand utilities Adaptive enterprise; Managing utility-based systems; Development environments, tools, prototypes

Systems and networks on the chip
Microtechnology and nanotechnology; Real-time embedded systems; Programming embedded systems; Controlling embedded systems; High speed embedded systems; Designing methodologies for embedded systems; Performance on embedded systems; Updating embedded systems; Wireless/wired design of systems-on-the-chip; Testing embedded systems; Technologies for systems processors; Migration to single-chip systems

Context-aware systems
Context-aware autonomous entities; Context-aware fundamental concepts, mechanisms, and applications; Modeling context-aware systems; Specification and implementation of awareness behavioral contexts; Development and deployment of large-scale context-aware systems and subsystems; User awareness requirements Design techniques for interfaces and systems; Methodologies, metrics, tools, and experiments for specifying context-aware systems; Tools evaluations, Experiment evaluations

Networking technologies
Next generation networking; Network, control and service architectures; Network signalling, pricing and billing; Network middleware; Telecommunication networks architectures; On-demand networks, utility computing architectures; Next generation networks [NGN] principles; Storage area networks [SAN]; Access and home networks; High-speed networks; Optical networks; Peer-to-peer and overlay networking; Mobile networking and systems; MPLS-VPN, IPSec-VPN networks; GRID networks; Broadband networks

Security in network, systems, and applications
IT in national and global security; Formal aspects of security; Systems and network security; Security and cryptography; Applied cryptography; Cryptographic protocols; Key management; Access control; Anonymity and pseudonymity management; Security management; Trust management; Protection management; Certification and accreditation; Virii, worms, attacks, spam; Intrusion prevention and detection; Information hiding; Legal and regulatory issues

Knowledge for global defense
Business continuity and availability; Risk assessment; Aerospace computing technologies; Systems and networks vulnerabilities; Developing trust in Internet commerce; Performance in networks, systems, and applications; Disaster prevention and recovery; IT for anti-terrorist technology innovations (ATTI); Networks and applications emergency services; Privacy and trust in pervasive communications; Digital rights management; User safety and protection

Information Systems [IS]
Management Information Systems; Decision Support Systems; Innovation and IS; Enterprise Application Integration; Enterprise Resource Planning; Business Process Change; Design and Development Methodologies and Frameworks; Iterative and Incremental Methodologies; Agile Methodologies; IS Standards and Compliance Issues; Risk Management in IS Design and Development; Research Core Theories; Conceptualisations and Paradigms in IS; Research Ontological Assumptions in IS Research; IS Research Constraints, Limitations and Opportunities; IS vs Computer Science Research; IS vs Business Studies

IPv6 Today - Technology and deployment
IP Upgrade - An Engineering Exercise or a Necessity?; Worldwide IPv6 Adoption - Trends and Policies; IPv6 Programs, from Research to Knowledge Dissemination; IPv6 Technology - Practical Information; Advanced Topics and Latest Developments in IPv6; IPv6 Deployment Experiences and Case Studies; IPv6 Enabled Applications and Devices

Modeling
Continuous and Discrete Models; Optimal Models; Complex System Modeling; Individual-Based Models; Modeling Uncertainty; Compact Fuzzy Models; Modeling Languages; Real-time modeling; Peformance modeling

Optimization
Multicriteria Optimization; Multilervel Optimization; Goal Programming; Optimization and Efficiency; Optimization-based decisions; Evolutionary Optimization; Self-Optimization; Extreme Optimization; Combinatorial Optimization; Disccrete Optimization; Fuzzy Optimization; Lipschitzian Optimization; Non-Convex Optimization; Convexity; Continuous Optimization; Interior point methods; Semidefinite and Conic Programming

Complexity
Complexity Analysis; Computational Complexity; Complexity Reduction; Optimizing Model Complexity; Communication Complexity; Managing Complexity; Modeling Complexity in Social Systems; Low-complexity Global Optimization; Software Development for Modeling and Optimization; Industrial applications

ICCGI Advisory Chairs
Emmanuel Chaput, ENSEEIHT / IRIT-CNRS, France
Constantin Paleologu, University Politehnica of Bucharest, Romania
Tibor Gyires, Illinois State University, USA
Luc Vouligny, Institut de Recherche d'Hydro-Québec - Varennes, Canada
Hermann Kaindl, TU-Wien, Austria

ICCGI Industry/Research Chairs
Krishna Murthy, HCL America, USA
Jean Johnson, The Inclusion Trust - Takeley, UK
John Terzakis, Intel, USA
Yasushi Kambayashi, Nippon Institute of Technology, Japan
Mary Luz Mouronte López, Ericsson S.A., Spain


ICCGI Special Area Chairs

- Evolutionary Computation
Liviu Panait, Google Inc., USA

- Autonomic/Autonomous Systems
Ani Calinescu, Oxford University, UK

- Knowledge/Cognition
Constandinos Mavromoustakis, University of Nicosia, Cyprus

- e-Learning/Mobility
José Rouillard, Université Lille Nord, France

- Industrial systems
Marius Minea, University Politehnica of Bucharest, Romania

- Digital eco-systems
Amir r Razavi, University of Surrey - Guildford, UK

Committee: http://www.iaria.org/conferences2011/ComICCGI11.html

From jlloret@dcom.upv.es  Fri Feb  4 12:07:44 2011
Return-Path: <jlloret@dcom.upv.es>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5D2273A6A26 for <sam@core3.amsl.com>; Fri,  4 Feb 2011 12:07:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.158
X-Spam-Level: 
X-Spam-Status: No, score=-2.158 tagged_above=-999 required=5 tests=[AWL=0.441,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WrR4nOLGr-8d for <sam@core3.amsl.com>; Fri,  4 Feb 2011 12:07:43 -0800 (PST)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.9]) by core3.amsl.com (Postfix) with ESMTP id C736D3A69A9 for <sam@irtf.org>; Fri,  4 Feb 2011 12:07:42 -0800 (PST)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id p14KB676013911 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Fri, 4 Feb 2011 21:11:06 +0100
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id p14KB6TD007108 for <sam@irtf.org>; Fri, 4 Feb 2011 21:11:06 +0100
Received: from JLLORET (gnd2g38-8.wi-fi.upv.es [158.42.38.8]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id p14KB6Ip030789 for <sam@irtf.org>; Fri, 4 Feb 2011 21:11:06 +0100
Date: Fri, 4 Feb 2011 21:11:06 +0100
Message-Id: <201102042011.p14KB6Ip030789@smtp.upv.es>
From: Jaime Lloret Mauri<jlloret@dcom.upv.es>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] IEEE DCOSS 2011: Submission deadline extended to Feb. 11, 2011
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Feb 2011 20:07:44 -0000

-----------------------------------------------------------------------
         Our apologies if you receive duplicates of this posting.
    Please feel free to distribute it to those who might be interested.
  -----------------------------------------------------------------------


  ************************************************************************
  *                           CALL FOR PAPERS                            *
  *                                                                      *
  *                           IEEE DCOSS 2011                            *
  *                                                                      *
  *  The 7th IEEE International Conference on Distributed Computing in   *
  *                           Sensor Systems                             *
  *                        http://www.dcoss.org                          *
  *                                                                      *
  *                          July 27-29, 2011                            *
  *                          Barcelona, Spain                            *    
  *                                                                      *
  ************************************************************************


Distributed sensor systems have become a highly active research area
due to their potential for providing diverse new capabilities. Such
systems allow intelligent dense monitoring of physical environments.
The focus of this conference is on distributed computing issues in
largescale networked sensor systems (including algorithms, applications,
systematic design techniques and tools, and in-network signal and
information processing).

Authors are invited to submit original unpublished manuscripts that
demonstrate current research on computational aspects of distributed
sensor systems. Topics of interest include but are not limited to:

    * Machine-to-Machine
    * Sensors in Smart Grid Systems
    * Green Networks and Systems
    * Computation and programming models
    * Energy models, minimization, awareness
    * Distributed collaborative information processing
    * Detection and tracking
    * Theoretical performance analysis: complexity, correctness, scalability
    * Abstractions for modular design
    * Fault tolerance and security
    * Languages, operating systems
    * Task allocation, reprogramming and reconfiguration
    * Dynamic resource management
    * Scalable, heterogeneous architectures (node and system-level)
    * Middleware interfaces, communication and processing primitives
    * Design, simulation and optimization tools for deployment and operation
    * Design automation and application synthesis techniques
    * Closed-loop control for sensing and actuation
    * Case studies: lessons from real world deployments
    * Network coding and compression


IMPORTANT DATES
Paper submission: Feb. 11, 2011
Notification:     March 25, 2011
Camera-ready:     April 11, 2011


General Co-Chair
Ivan Stojmenovic, University of Ottawa, Canada
Mischa Dohler, Centre Tecnologic de Telecom. de Catalunya,Spain

Technical Program Chair
Adam Dunkels, Swedish Institute of Computer Science,Sweden

Program Vice Chairs
Algorithms and Performance Analysis: 
    Suman Nath, Microsoft, USA
Systems and Applications: 
    Jaime Lloret, Polytechnic University of Valencia, Spain 
Signal Processing and Information Theory: 
    Michael Rabbat, McGill University, Canada

Workshop Chair
Sotiris Nikoletseas, University of Patras and CTI, Greece 

Poster Chair
Joel Rodrigues, Institute of Telecomm., Univ. of Beira Interior, Portugal 

Work-in-progress Chair
Verikoukis Christos, Centre Tecnologic de Telecom. de Catalunya, Spain 

Exhibition Chair
Ignasi Vilajosana, Worldsensing, Spain

Demo Chair
Simon Duquennoy, Swedish Institute of Computer Science, Sweden 

Submission Chair
Sushmita Ruj, University of Ottawa, Canada

Finance Chair
David Gregoratti, Centre Tecnologic de Telecom. de Catalunya, Spain

Proceedings Chair
Rafael Falcon, University of Ottawa, Canada 

Publicity Co-Chairs
Jiming Chen, Zhejiang University, China
Xu Li, INRIA Lille-Nord Europe, France

Local Arrangement Chair
Jesus Alonso-Zarate, Centre Tecnologic de Telecom. de Catalunya, Spain 

Web Chair
Marcio Almeida, University of Ottawa, Canada 

From schmidt@informatik.haw-hamburg.de  Mon Feb  7 05:58:22 2011
Return-Path: <schmidt@informatik.haw-hamburg.de>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 006A83A6936 for <sam@core3.amsl.com>; Mon,  7 Feb 2011 05:58:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.649
X-Spam-Level: 
X-Spam-Status: No, score=-99.649 tagged_above=-999 required=5 tests=[BAYES_50=0.001, HELO_EQ_DE=0.35, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J1ucpL+Fhejy for <sam@core3.amsl.com>; Mon,  7 Feb 2011 05:58:20 -0800 (PST)
Received: from mail2.rz.htw-berlin.de (mail2.rz.htw-berlin.de [141.45.10.102]) by core3.amsl.com (Postfix) with ESMTP id C15FC3A6909 for <sam@irtf.org>; Mon,  7 Feb 2011 05:58:20 -0800 (PST)
Envelope-to: sam@irtf.org
Received: from g231109218.adsl.alicedsl.de ([92.231.109.218] helo=[192.168.178.36]) by mail2.rz.htw-berlin.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.72 (FreeBSD)) (envelope-from <schmidt@informatik.haw-hamburg.de>) id 1PmRZx-000HP2-0Z; Mon, 07 Feb 2011 14:56:33 +0100
Message-ID: <4D4FFA8D.5070007@informatik.haw-hamburg.de>
Date: Mon, 07 Feb 2011 14:58:37 +0100
From: "Thomas C. Schmidt" <schmidt@informatik.haw-hamburg.de>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20101207 Lightning/1.0b2 Thunderbird/3.1.7
MIME-Version: 1.0
To: sam <sam@irtf.org>
Content-Type: text/plain; charset=ISO-8859-15; format=flowed
Content-Transfer-Encoding: 8bit
X-HTW-SPAMINFO: this message was scanned by eXpurgate (http://www.eleven.de)
X-HTW-DELIVERED-TO: sam@irtf.org
Subject: [SAM] IETF80 - SAM Meeting in Prague
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Feb 2011 13:58:22 -0000

Hi all,

we've requested a two hour meeting slot for Prague. Please let us know 
about your presentation plans and slot requests.

As discussed earlier, we also want to encourage demos of running 
prototypes etc.

Hope to see you in Prague!

John & Thomas
-- 

Prof. Dr. Thomas C. Schmidt
° Hamburg University of Applied Sciences                   Berliner Tor 7 °
° Dept. Informatik, Internet Technologies Group    20099 Hamburg, Germany °
° http://www.haw-hamburg.de/inet                   Fon: +49-40-42875-8452 °
° http://www.informatik.haw-hamburg.de/~schmidt    Fax: +49-40-42875-8409 °

From alejandro.canovas.cp46700@gmail.com  Tue Feb  8 00:57:14 2011
Return-Path: <alejandro.canovas.cp46700@gmail.com>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 33E763A6CDD for <sam@core3.amsl.com>; Tue,  8 Feb 2011 00:57:14 -0800 (PST)
X-Quarantine-ID: <EmxwjCnEeAjw>
X-Virus-Scanned: amavisd-new at amsl.com
X-Amavis-Alert: BAD HEADER, Non-encoded 8-bit data (char E1 hex): From: Alejandro C\341novas Solbes<al[...]
X-Spam-Flag: NO
X-Spam-Score: -2.537
X-Spam-Level: 
X-Spam-Status: No, score=-2.537 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, GB_I_INVITATION=-2, MIME_8BIT_HEADER=0.3, MISSING_SUBJECT=1.762]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EmxwjCnEeAjw for <sam@core3.amsl.com>; Tue,  8 Feb 2011 00:57:12 -0800 (PST)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.9]) by core3.amsl.com (Postfix) with ESMTP id 1A6D53A6CB9 for <sam@irtf.org>; Tue,  8 Feb 2011 00:57:11 -0800 (PST)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id p188vGcW018685 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Tue, 8 Feb 2011 09:57:16 +0100
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id p188vGOG028762 for <sam@irtf.org>; Tue, 8 Feb 2011 09:57:16 +0100
Received: from JLLORET (vpn057.vpns.upv.es [158.42.244.57]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id p188vFuX024510 for <sam@irtf.org>; Tue, 8 Feb 2011 09:57:15 +0100
Date: Tue, 8 Feb 2011 09:57:15 +0100
Message-Id: <201102080857.p188vFuX024510@smtp.upv.es>
From: Alejandro Cánovas Solbes<alejandro.canovas.cp46700@gmail.com>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] (no subject)
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Feb 2011 08:57:14 -0000

INVITATION:

=================
Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results.
=================

============== IMMM 2011 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

IMMM 2011: The First International Conference on Advances in Information Mining and Management
July 17-22, 2011 - Bournemouth, UK

General page: http://www.iaria.org/conferences2011/IMMM11.html
Call for Papers: http://www.iaria.org/conferences2011/CfPIMMM11.html

Submission deadline: March 1, 2011

Technical Co-Sponsors:
- The Bournemouth & Poole College
- Bournemouth University
- Cisco Systems, Inc.
- Linköpings Universitet, Sweden
- IN2 search interfaces development Ltd., UK
- High Performance Computing Center Stuttgart / Universität Stuttgart, Germany
Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org

Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.

All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html

IMMM 2011 Topics (topics and submission details: see CfP on the site)

Mining mechanisms and methods
Data mining algorithms; Media adaptive mining; Agent-based mining; Content-based mining; Context-aware mining; Automation of data extraction; Data mining at a large; Domain-driven data mining; Graph-based data mining; Multilabel information; Multimodal mining; Cloud-based mining; Mining using neurocomputing techniques

Mining support
Querying for mining; Questions for digital investigation; Similarity search; User-generated content; Visualizing data mining; Internationalization and localization techniques for profile/context-based visualization

Type of information mining
Concept mining; Process mining; Concept mining; Knowledge mining; Knowledge discovery; Mining image and video; Mining patterns; Opinion mining; Graph mining; Ontology mining; Semantic annotations and mining; Document mining; Spatial mining; Speech mining; Text mining; Web mining; XML data mining

Pervasive information retrieval
Context and location information retrieval; Mobile information retrieval; Geo-information retrieval; Context-aware information retrieval; Access-driven information retrieval; Location-specific information retrieval; Spacial information retrieval; Semantic-driven retrieval

Automated retrieval and mining
Automated information extraction; Agent-based data mining and information discovery; Agent-based knowledge; Datamining-based agents and multi-agent systems; Agent-mining intelligent applications and systems; Automated retrieval of multimedia streams; Automated retrieval from multimedia archives; Automated copyright infringement detection and watermarking; Automated content summarization; Automatic concept detection, categorization, and genre detection; Automatic speech recognition; Automated cross-media linking

Mining features
Multilingual data mining; Multimedia mining; String processing and data mining; Mining association rules; Mining social relationships; Mining linked data; Mining sequential episodes from time series; Mining time-dependent data; Un-supervised data mining; Semi-structured data; Mining location-sensitive data; Concept-drift in data mining

Information mining and management
Data cleaning; Data updating; Segmentation and clustering; Mining transient information; Warehousing; Web syndication; Data filtering and aggregation; Optimal pruning; Data summarization; Knowledge injection, discovery and classification; Uncertainty removal; Managing incompleteness

Mining from specific sources
Bio data mining; Climate data mining; Data mining in medicine and pharmacology; Data mining in special networks (grids, sensors, etc.); Data management for mobile systems; Data management for sensors; Data mining and management for wireless systems; Dynamic network discovery; Mining from multiple sources; Mining personal semantic data; Mining from social networks; Mining from deep web; Mining from Wikipedia

Data management in special environments
Data management in sensor and mobile ad hoc networks; Data management in mobile peer-to-peer networks; Data management for mobile applications; Data management in mobile/temporal social networks; Management of community sensing/participatory sensing data; Managing pervasive data, sensor data streams and user devices; Managing mobile semantic data; Manging data-intensive mobile computing; Management of real-time data; Managing security data streams; Managing Mobile Web 2.0 data; Managing data in mobile clouds; Data replication, migration and dissemination in mobile environments; Web data processing and security on mobile devices; Resource advertising and discovery techniques

Mining evaluation
Statistics on mining; Ranking of mining results; Provenance; Privacy issues; Patterns for mining; Credibility on data mining; Performance of mining information; Data mining and computational intelligence; Intelligent data understanding; Intelligent data analysis

Mining tools and applications
Data mining applications; Data mining tools and enabling software; Interoperability of information mining tools; Applications for large-scale mining; Content segmentation tools (e.g., shot and semantic scene segmentation); Evaluation methods for TV and radio content analysis tools; Tools for data sets and standard resources

IMMM General Chairs
Philip Davis, Bournemouth and Poole College - Bournemouth, UK
David Newell, Bournemouth University - Bournemouth, UK

IMMM Advisory Chairs
Petre Dini, Concordia University, Canada & IARIA, USA
Andreas Holzinger, Institute for Medical Informatics, Statistics and Documentation (IMI) / Medical University Graz (MUG), Austria
Kuan-Ching Li, Providence University, Taiwan

IMMM Industry Liaison Chairs
George Ioannidis, IN2 search interfaces development Ltd., UK
Johannes Meinecke, SAP AG / SAP Research Center Dresden, Germany

IMMM Special Area Chairs on Data Management
Robert Wrembel, Poznan University of Technology, Poland

IMMM Special Area Chair on Special Mining
Yulan He, Knowledge Media Institute / The Open University, UK

IMMM Special Area Chair on Semantic Data Handling
Stefan Brüggemann, OFFIS - Institute for Information Technology, Germany

IMMM Special Area Chair on Databases
Lena Strömbäck, Linköpings Universitet, Sweden

IMMM Special Area Chair on Cloud-based Mining
Roland Kübert, High Performance Computing Center Stuttgart / Universität Stuttgart, Germany

IMMM Publicity Chairs
Zaher Al Aghbari, University of Sharjah, UAE
Alejandro Canovas Solbes, Polytechnic University of Valencia, Spain
Program Committee
http://www.iaria.org/conferences2011/ComIMMM11.html
====================

From alejandro.canovas.cp46700@gmail.com  Tue Feb  8 01:13:23 2011
Return-Path: <alejandro.canovas.cp46700@gmail.com>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 376233A7083 for <sam@core3.amsl.com>; Tue,  8 Feb 2011 01:13:23 -0800 (PST)
X-Quarantine-ID: <AmHmucqI7vtP>
X-Virus-Scanned: amavisd-new at amsl.com
X-Amavis-Alert: BAD HEADER, Non-encoded 8-bit data (char E1 hex): From: Alejandro C\341novas Solbes<al[...]
X-Spam-Flag: NO
X-Spam-Score: -3.418
X-Spam-Level: 
X-Spam-Status: No, score=-3.418 tagged_above=-999 required=5 tests=[AWL=0.881,  BAYES_00=-2.599, GB_I_INVITATION=-2, MIME_8BIT_HEADER=0.3]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AmHmucqI7vtP for <sam@core3.amsl.com>; Tue,  8 Feb 2011 01:13:21 -0800 (PST)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.9]) by core3.amsl.com (Postfix) with ESMTP id 3DEBD3A6DDB for <sam@irtf.org>; Tue,  8 Feb 2011 01:13:21 -0800 (PST)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id p189DQaN022934 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Tue, 8 Feb 2011 10:13:26 +0100
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id p189DRHR008891 for <sam@irtf.org>; Tue, 8 Feb 2011 10:13:27 +0100
Received: from JLLORET (vpn057.vpns.upv.es [158.42.244.57]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id p189DQn9002725 for <sam@irtf.org>; Tue, 8 Feb 2011 10:13:26 +0100
Date: Tue, 8 Feb 2011 10:13:26 +0100
Message-Id: <201102080913.p189DQn9002725@smtp.upv.es>
From: Alejandro Cánovas Solbes<alejandro.canovas.cp46700@gmail.com>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] CfP: IMMM 2011 || July 17-22, 2011 - Bournemouth, UK
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Feb 2011 09:13:23 -0000

INVITATION:

=================
Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results.
=================

============== IMMM 2011 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

IMMM 2011: The First International Conference on Advances in Information Mining and Management
July 17-22, 2011 - Bournemouth, UK

General page: http://www.iaria.org/conferences2011/IMMM11.html
Call for Papers: http://www.iaria.org/conferences2011/CfPIMMM11.html

Submission deadline: March 1, 2011

Technical Co-Sponsors:
- The Bournemouth & Poole College
- Bournemouth University
- Cisco Systems, Inc.
- Linköpings Universitet, Sweden
- IN2 search interfaces development Ltd., UK
- High Performance Computing Center Stuttgart / Universität Stuttgart, Germany
Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org

Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.

All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html

IMMM 2011 Topics (topics and submission details: see CfP on the site)

Mining mechanisms and methods
Data mining algorithms; Media adaptive mining; Agent-based mining; Content-based mining; Context-aware mining; Automation of data extraction; Data mining at a large; Domain-driven data mining; Graph-based data mining; Multilabel information; Multimodal mining; Cloud-based mining; Mining using neurocomputing techniques

Mining support
Querying for mining; Questions for digital investigation; Similarity search; User-generated content; Visualizing data mining; Internationalization and localization techniques for profile/context-based visualization

Type of information mining
Concept mining; Process mining; Concept mining; Knowledge mining; Knowledge discovery; Mining image and video; Mining patterns; Opinion mining; Graph mining; Ontology mining; Semantic annotations and mining; Document mining; Spatial mining; Speech mining; Text mining; Web mining; XML data mining

Pervasive information retrieval
Context and location information retrieval; Mobile information retrieval; Geo-information retrieval; Context-aware information retrieval; Access-driven information retrieval; Location-specific information retrieval; Spacial information retrieval; Semantic-driven retrieval

Automated retrieval and mining
Automated information extraction; Agent-based data mining and information discovery; Agent-based knowledge; Datamining-based agents and multi-agent systems; Agent-mining intelligent applications and systems; Automated retrieval of multimedia streams; Automated retrieval from multimedia archives; Automated copyright infringement detection and watermarking; Automated content summarization; Automatic concept detection, categorization, and genre detection; Automatic speech recognition; Automated cross-media linking

Mining features
Multilingual data mining; Multimedia mining; String processing and data mining; Mining association rules; Mining social relationships; Mining linked data; Mining sequential episodes from time series; Mining time-dependent data; Un-supervised data mining; Semi-structured data; Mining location-sensitive data; Concept-drift in data mining

Information mining and management
Data cleaning; Data updating; Segmentation and clustering; Mining transient information; Warehousing; Web syndication; Data filtering and aggregation; Optimal pruning; Data summarization; Knowledge injection, discovery and classification; Uncertainty removal; Managing incompleteness

Mining from specific sources
Bio data mining; Climate data mining; Data mining in medicine and pharmacology; Data mining in special networks (grids, sensors, etc.); Data management for mobile systems; Data management for sensors; Data mining and management for wireless systems; Dynamic network discovery; Mining from multiple sources; Mining personal semantic data; Mining from social networks; Mining from deep web; Mining from Wikipedia

Data management in special environments
Data management in sensor and mobile ad hoc networks; Data management in mobile peer-to-peer networks; Data management for mobile applications; Data management in mobile/temporal social networks; Management of community sensing/participatory sensing data; Managing pervasive data, sensor data streams and user devices; Managing mobile semantic data; Manging data-intensive mobile computing; Management of real-time data; Managing security data streams; Managing Mobile Web 2.0 data; Managing data in mobile clouds; Data replication, migration and dissemination in mobile environments; Web data processing and security on mobile devices; Resource advertising and discovery techniques

Mining evaluation
Statistics on mining; Ranking of mining results; Provenance; Privacy issues; Patterns for mining; Credibility on data mining; Performance of mining information; Data mining and computational intelligence; Intelligent data understanding; Intelligent data analysis

Mining tools and applications
Data mining applications; Data mining tools and enabling software; Interoperability of information mining tools; Applications for large-scale mining; Content segmentation tools (e.g., shot and semantic scene segmentation); Evaluation methods for TV and radio content analysis tools; Tools for data sets and standard resources

IMMM General Chairs
Philip Davis, Bournemouth and Poole College - Bournemouth, UK
David Newell, Bournemouth University - Bournemouth, UK

IMMM Advisory Chairs
Petre Dini, Concordia University, Canada & IARIA, USA
Andreas Holzinger, Institute for Medical Informatics, Statistics and Documentation (IMI) / Medical University Graz (MUG), Austria
Kuan-Ching Li, Providence University, Taiwan

IMMM Industry Liaison Chairs
George Ioannidis, IN2 search interfaces development Ltd., UK
Johannes Meinecke, SAP AG / SAP Research Center Dresden, Germany

IMMM Special Area Chairs on Data Management
Robert Wrembel, Poznan University of Technology, Poland

IMMM Special Area Chair on Special Mining
Yulan He, Knowledge Media Institute / The Open University, UK

IMMM Special Area Chair on Semantic Data Handling
Stefan Brüggemann, OFFIS - Institute for Information Technology, Germany

IMMM Special Area Chair on Databases
Lena Strömbäck, Linköpings Universitet, Sweden

IMMM Special Area Chair on Cloud-based Mining
Roland Kübert, High Performance Computing Center Stuttgart / Universität Stuttgart, Germany

IMMM Publicity Chairs
Zaher Al Aghbari, University of Sharjah, UAE
Alejandro Canovas Solbes, Polytechnic University of Valencia, Spain
Program Committee
http://www.iaria.org/conferences2011/ComIMMM11.html
====================

From sandra.sendra.upv@gmail.com  Tue Feb 15 23:31:02 2011
Return-Path: <sandra.sendra.upv@gmail.com>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2CCED3A6DD1 for <sam@core3.amsl.com>; Tue, 15 Feb 2011 23:31:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.599
X-Spam-Level: 
X-Spam-Status: No, score=-4.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, GB_I_INVITATION=-2]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zi9rGz1jGQ4C for <sam@core3.amsl.com>; Tue, 15 Feb 2011 23:31:02 -0800 (PST)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.9]) by core3.amsl.com (Postfix) with ESMTP id 9BF573A6DCC for <sam@irtf.org>; Tue, 15 Feb 2011 23:31:01 -0800 (PST)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id p1G7VS9b023915 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Wed, 16 Feb 2011 08:31:28 +0100
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id p1G7VR9Y012928 for <sam@irtf.org>; Wed, 16 Feb 2011 08:31:28 +0100
Received: from JLLORET (gnd2g38-105.wi-fi.upv.es [158.42.38.105]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id p1G7VRJs026688 for <sam@irtf.org>; Wed, 16 Feb 2011 08:31:27 +0100
Date: Wed, 16 Feb 2011 08:31:27 +0100
Message-Id: <201102160731.p1G7VRJs026688@smtp.upv.es>
From: Sandra Sendra<sandra.sendra.upv@gmail.com>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] Deadline extension | SOTICS 2011 || July 17-22, 2011 - Bournemouth, UK
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Feb 2011 07:31:02 -0000

INVITATION:

=================
Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results.
=================

============== SOTICS 2011 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

SOTICS 2011: The First International Conference on Social Eco-Informatics
July 17-22, 2011 - Bournemouth, UK

General page: http://www.iaria.org/conferences2011/SOTICS11.html
Call for Papers: http://www.iaria.org/conferences2011/CfPSOTICS11.html

Submission deadline: March 10, 2011

Technical Co-Sponsors:
- The Bournemouth & Poole College
- Bournemouth University
- San Jose State university, USA
- University of Sunderland
- Cisco Systems, Inc.
Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org

Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.

All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html

SOTICS 2011 Topics (topics and submission details: see CfP on the site)

Digital resource domains
Social networks; Digital computing; Digital health care; Digital mapping; Digital human faces; Digital libraries; Eco-informatics; Micro-contribution by masses

Social evaluation and metrics
Metric on quality of experience and satisfaction; Social mobility; Social interactions; Social learning; Social media; Social models; Mutual social credentials

Social applications
On-line entertainment; Games and citizens; Social networking and social software; Tagging and micro-blogging; Collaborative filtering and tagging; Social simulation (mobility, groupware, etc.); Very large social networks; Deep web social information; Blogs and mini-blogs; E-books

Social mobility
Social mobile networks with the Web 2.0; Mobile social architecture and services; Open service capabilities; Open exposure of telco capabilities; Open Web APIs, SOA and SDP; Interworking strategies; Mobile terminals as sources for User-generated content; Architecture and services for user-generated content; Auto-description and metadata synthesis for telecom-generated for user-generated content; Social mobile networks; User behavior profiling; Social connections (social graphs, contacts, etc); Services and architectures/solutions for social mobile services

Mechanisms for social services
eSociety; Accessibility; Social education; Social opinion; Digital eco-systems; Ecology and social justice; eGovernments; Digital economy; eCommerce; Digital cities; Tourism; Democracy and social groups; Patent laws; Social tools; Web enterprises and services

Challenges in social environments
Computational thinking; Natural language processing; eImpact on children knowledge and abilities; Opinion and sentiment analysis; Computing and philosophy; Threats in social networks; Trusted computing; Reputation systems; Pervasive social computing; Real-time ubiquitous social semantic; Social creativity; Social trust; Ethics

SOTICS General Chairs 
Philip Davis, Bournemouth and Poole College - Bournemouth, UK
David Newell, Bournemouth University - Bournemouth, UK 

SOTICS Advisory Chairs 
Petre Dini, Concordia University, Canada & IARIA, USA
Magdalini Eirinaki, San Jose State University, USA 
Krzysztof Juszczyszyn, Wroc 2;aw University of Technology, Poland
Ulrike Lucke, University of Potsdam, Germany 

SOTICS Special Area Chairs on Social Networks 
Feng Gao, Microsoft Corporation, USA
Lynne Hall, University of Sunderland, UK 

SOTICS Special Area Chairs on eGovernment 
Jennifer Watkins, Los Alamos National Laboratory, USA 

SOTICS Special Area Chairs on Digital Cities 
Tom Erickson, IBM T. J. Watson Research Center, USA 

SOTICS Special Area Chairs on Digital Libraries 
Paolo Garza, Politecnico di Milano, Italy 

SOTICS Special Area Chairs on Media 
Claus Atzenbeck, German University in Cairo, Egypt 

SOTICS Publicity Chairs 
Nima Dokoohaki, Royal Institute of Technology (KTH) - Stockholm, Sweden
Christine Langeron, Hubert Curien Laboratory, Lyon University, France
Sandra Sendra Compte, Polytechnic University of Valencia, Spain

Program Committee:
http://www.iaria.org/conferences2011/ComSOTICS11.html
====================

From alejandro.canovas.cp46700@gmail.com  Wed Feb 16 00:15:17 2011
Return-Path: <alejandro.canovas.cp46700@gmail.com>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9F0E03A6DD5 for <sam@core3.amsl.com>; Wed, 16 Feb 2011 00:15:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.155
X-Spam-Level: 
X-Spam-Status: No, score=-4.155 tagged_above=-999 required=5 tests=[AWL=0.444,  BAYES_00=-2.599, GB_I_INVITATION=-2]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M2T3lI2peZLi for <sam@core3.amsl.com>; Wed, 16 Feb 2011 00:15:15 -0800 (PST)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.9]) by core3.amsl.com (Postfix) with ESMTP id 00B523A6C90 for <sam@irtf.org>; Wed, 16 Feb 2011 00:15:14 -0800 (PST)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id p1G8Ffca032459 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Wed, 16 Feb 2011 09:15:41 +0100
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id p1G8FfW3004167 for <sam@irtf.org>; Wed, 16 Feb 2011 09:15:42 +0100
Received: from JLLORET (gnd2g38-33.wi-fi.upv.es [158.42.38.33]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id p1G8FeLV013943 for <sam@irtf.org>; Wed, 16 Feb 2011 09:15:41 +0100
Date: Wed, 16 Feb 2011 09:15:41 +0100
Message-Id: <201102160815.p1G8FeLV013943@smtp.upv.es>
From: Alejandro Canovas Solbes<alejandro.canovas.cp46700@gmail.com>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] Deadline extension | IMMM 2011 || July 17-22, 2011 - Bournemouth, UK
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Feb 2011 08:15:17 -0000

INVITATION:

=================
Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results.
=================

============== IMMM 2011 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

IMMM 2011: The First International Conference on Advances in Information Mining and Management
July 17-22, 2011 - Bournemouth, UK

General page: http://www.iaria.org/conferences2011/IMMM11.html
Call for Papers: http://www.iaria.org/conferences2011/CfPIMMM11.html

Submission deadline: March 10, 2011

Technical Co-Sponsors:
- The Bournemouth & Poole College
- Bournemouth University
- Cisco Systems, Inc.
- Linköpings Universitet, Sweden
- IN2 search interfaces development Ltd., UK
- High Performance Computing Center Stuttgart / Universität Stuttgart, Germany
Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org

Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.

All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html

IMMM 2011 Topics (topics and submission details: see CfP on the site)

Mining mechanisms and methods
Data mining algorithms; Media adaptive mining; Agent-based mining; Content-based mining; Context-aware mining; Automation of data extraction; Data mining at a large; Domain-driven data mining; Graph-based data mining; Multilabel information; Multimodal mining; Cloud-based mining; Mining using neurocomputing techniques

Mining support
Querying for mining; Questions for digital investigation; Similarity search; User-generated content; Visualizing data mining; Internationalization and localization techniques for profile/context-based visualization

Type of information mining
Concept mining; Process mining; Concept mining; Knowledge mining; Knowledge discovery; Mining image and video; Mining patterns; Opinion mining; Graph mining; Ontology mining; Semantic annotations and mining; Document mining; Spatial mining; Speech mining; Text mining; Web mining; XML data mining

Pervasive information retrieval
Context and location information retrieval; Mobile information retrieval; Geo-information retrieval; Context-aware information retrieval; Access-driven information retrieval; Location-specific information retrieval; Spacial information retrieval; Semantic-driven retrieval

Automated retrieval and mining
Automated information extraction; Agent-based data mining and information discovery; Agent-based knowledge; Datamining-based agents and multi-agent systems; Agent-mining intelligent applications and systems; Automated retrieval of multimedia streams; Automated retrieval from multimedia archives; Automated copyright infringement detection and watermarking; Automated content summarization; Automatic concept detection, categorization, and genre detection; Automatic speech recognition; Automated cross-media linking

Mining features
Multilingual data mining; Multimedia mining; String processing and data mining; Mining association rules; Mining social relationships; Mining linked data; Mining sequential episodes from time series; Mining time-dependent data; Un-supervised data mining; Semi-structured data; Mining location-sensitive data; Concept-drift in data mining

Information mining and management
Data cleaning; Data updating; Segmentation and clustering; Mining transient information; Warehousing; Web syndication; Data filtering and aggregation; Optimal pruning; Data summarization; Knowledge injection, discovery and classification; Uncertainty removal; Managing incompleteness

Mining from specific sources
Bio data mining; Climate data mining; Data mining in medicine and pharmacology; Data mining in special networks (grids, sensors, etc.); Data management for mobile systems; Data management for sensors; Data mining and management for wireless systems; Dynamic network discovery; Mining from multiple sources; Mining personal semantic data; Mining from social networks; Mining from deep web; Mining from Wikipedia

Data management in special environments
Data management in sensor and mobile ad hoc networks; Data management in mobile peer-to-peer networks; Data management for mobile applications; Data management in mobile/temporal social networks; Management of community sensing/participatory sensing data; Managing pervasive data, sensor data streams and user devices; Managing mobile semantic data; Manging data-intensive mobile computing; Management of real-time data; Managing security data streams; Managing Mobile Web 2.0 data; Managing data in mobile clouds; Data replication, migration and dissemination in mobile environments; Web data processing and security on mobile devices; Resource advertising and discovery techniques

Mining evaluation
Statistics on mining; Ranking of mining results; Provenance; Privacy issues; Patterns for mining; Credibility on data mining; Performance of mining information; Data mining and computational intelligence; Intelligent data understanding; Intelligent data analysis

Mining tools and applications
Data mining applications; Data mining tools and enabling software; Interoperability of information mining tools; Applications for large-scale mining; Content segmentation tools (e.g., shot and semantic scene segmentation); Evaluation methods for TV and radio content analysis tools; Tools for data sets and standard resources

IMMM General Chairs
Philip Davis, Bournemouth and Poole College - Bournemouth, UK
David Newell, Bournemouth University - Bournemouth, UK

IMMM Advisory Chairs
Petre Dini, Concordia University, Canada & IARIA, USA
Andreas Holzinger, Institute for Medical Informatics, Statistics and Documentation (IMI) / Medical University Graz (MUG), Austria
Kuan-Ching Li, Providence University, Taiwan

IMMM Industry Liaison Chairs
George Ioannidis, IN2 search interfaces development Ltd., UK
Johannes Meinecke, SAP AG / SAP Research Center Dresden, Germany

IMMM Special Area Chairs on Data Management
Robert Wrembel, Poznan University of Technology, Poland

IMMM Special Area Chair on Special Mining
Yulan He, Knowledge Media Institute / The Open University, UK

IMMM Special Area Chair on Semantic Data Handling
Stefan Brüggemann, OFFIS - Institute for Information Technology, Germany

IMMM Special Area Chair on Databases
Lena Strömbäck, Linköpings Universitet, Sweden

IMMM Special Area Chair on Cloud-based Mining
Roland Kübert, High Performance Computing Center Stuttgart / Universität Stuttgart, Germany

IMMM Publicity Chairs
Zaher Al Aghbari, University of Sharjah, UAE
Alejandro Canovas Solbes, Polytechnic University of Valencia, Spain

Program Committee
http://www.iaria.org/conferences2011/ComIMMM11.html
====================

From sandra.sendra.upv@gmail.com  Thu Feb 17 23:16:23 2011
Return-Path: <sandra.sendra.upv@gmail.com>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BA56B3A6D70 for <sam@core3.amsl.com>; Thu, 17 Feb 2011 23:16:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.855
X-Spam-Level: 
X-Spam-Status: No, score=-3.855 tagged_above=-999 required=5 tests=[AWL=-0.745, BAYES_05=-1.11, GB_I_INVITATION=-2]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nei9JY0zOMp9 for <sam@core3.amsl.com>; Thu, 17 Feb 2011 23:16:23 -0800 (PST)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.9]) by core3.amsl.com (Postfix) with ESMTP id 0F8AB3A6D67 for <sam@irtf.org>; Thu, 17 Feb 2011 23:16:22 -0800 (PST)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id p1I7GsQs016760 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Fri, 18 Feb 2011 08:16:54 +0100
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id p1I7GsNW010821 for <sam@irtf.org>; Fri, 18 Feb 2011 08:16:55 +0100
Received: from JLLORET (gnd2g38-131.wi-fi.upv.es [158.42.38.131]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id p1I7Gr8q002240 for <sam@irtf.org>; Fri, 18 Feb 2011 08:16:53 +0100
Date: Fri, 18 Feb 2011 08:16:53 +0100
Message-Id: <201102180716.p1I7Gr8q002240@smtp.upv.es>
From: Sandra Sendra<sandra.sendra.upv@gmail.com>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] Deadline extension: INFOCOMP 2011 || July 17-22, 2011 - Bournemouth, UK
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Feb 2011 07:16:23 -0000

INVITATION:

=================
Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results.
=================


============== INFOCOMP 2011 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

INFOCOMP 2011: The First International Conference on Advanced Communications and Computation
July 17-22, 2011 - Bournemouth, UK

General page: http://www.iaria.org/conferences2011/INFOCOMP11.html

Call for Papers: http://www.iaria.org/conferences2011/CfPINFOCOMP11.html

Submission deadline: March 10, 2011

Technical Co-Sponsors:
- The Bournemouth & Poole College
- University of Muenster
- Bournemouth University
- NASA
- IBM
- Leibniz Universitaet Hannover
- Norddeutscher Verbund fuer Hoch - und Hoechstleistungsrechnen
- Leibniz Supercomputing Centre
- San Diego Supercomputer Center
- Computation Institute
- University of California at San Diego
- SARA Computing and Networking Services
- German Aerospace Center
- christmann informationstechnik + medien GmbH & Co. KG
- Jülich Supercomputing Centre
- Umea University
- Dubna International University
- Korea Institute of Science and Technology Information (KISTI)
- All-Russian Research Institute of Geological, Geophysical and Geochemical Systems (VNIIGeosystem)
- Cisco Systems, Inc.
Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org

Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.

All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html

INFOCOMP 2011 Topics (topics and submission details: see CfP on the site)

Large scale and fast computation
Developments in information and computing systems; Grid computing; Cloud computing; Pervasive/ubiquitous computing; Services computing and Opportunistic computing; High Performance Computing (HPC); Fast data processing; Real-time processing; Fast switching and routing protocols; Parallelization of algorithms and applications; Energy-efficient High Performance Computing; Large scale data visualization; Tools for parallelization; Programming languages and parallel algorithms; Highly performance codes; MPI, OpenMP; Optimization; Innovative architectures

Networks/systems communications
Cross-layer design and optimization; Cyber-physical systems and networks; Data centers, virtualization, and cloud networks; Delay/disruption tolerant networks; Future Internet broadband services; Fast networks / InfiniBand architectures for future interactive multicore applications; Sensor networks and embedded systems; Ad hoc mobile networks; Access technologies; P2P networks; Optical networks; Cellular and broadband wireless networks; Mobility models and mobile networks; Multicast, broadcast and anycast; Multimedia protocols and networking; Software defined radio and cognitive radio networking; Content-based network service; Certification, public key infrastructures, data integrity; Privacy and anonymity

Networks/systems measurement, control and management
Networks/systems measurement, simulation and emulation; Network-, system-, and application-management; Congestion control and capacity planning; Dynamic spectrum management; Addressing and location management; Quality of Service (QoS) and Quality of Experience (QoE); Quality of Data (QoD) and Quality of Context (QoC); e-Commerce, accounting, pricing and billing; Use of distributed compute and storage resources; Energy-aware mechanisms for control and management; Configuration, reuse of software components; Resource allocation and management; Denial of service mitigation and prevention; System and data security; Communication visualization

Advanced applications
Simulation and modelling (scientific applications, engineering, industry); Computer science and geoinformatics; e-Energy, geosciences, prospection, exploration, oil and gas; Mobility and logistic services; Geoscientific Information Systems (GIS); Remote sensing and satellite imaging; Cartography, hydrology; Climatology and environmental sciences; Molecular dynamics simulation; Genetic algorithms; Physics and chemistry applications; Medicine, genetics, epidemiology, medical geology; Multi-dimensional data visualization; Search engines and scientific discovery; Online social networking; Vehicular, underground and underwater networks and applications; Scientific data processing; Computation frameworks and tools (Mathematica, SAGE, Maple, Matlab, Gromacs, ANSYS, Fluent, etc.); Education, e-Learning, and e-Science; ICT business evaluation and management; Legal informatics, Open Access, Science / Copyright

Evaluation context
Energy-aware and energy-efficient networks; Implementation and experimental testbeds; Traffic measurement and traffic patterns; Characterization of topology dynamics; Web services and performance; Performance measurement and benchmarking; Energy-aware and energy-efficient High Performance Computing; Standards and benchmarks

====================
INFOCOMP General Chair
Claus-Peter Rueckemann, Leibniz Universität Hannover / Westfaelische Wilhelms-Universitaet Muenster / North-German Supercomputing Alliance (HLRN), Germany

INFOCOMP Advisory Chairs
Hans-Joachim Bungartz, Technische Universitaet Muenchen (TUM), Germany
Laura Carrington, University of California at San Diego (UCSD) / San Diego Supercomputer Center (SDSC), USA
Petre Dini, Concordia University, Canada / IARIA, USA
Erik Elmroth, Department of Computing Science and HPC2N, Umeå University, Sweden
Sik Lee, Supercomputing Center KISTI, Korea Institute of Science and Technology Information (KISTI), Korea
Subhash Saini, NASA, USA

INFOCOMP Academia Chairs
Bruce Berriman, California Institute of Technology, USA
Evgenia N. Cheremisina, Dubna International University, Russia / Academic of Russian Academy of Natural Sciences, Moscow, Russia
Malgorzata Pankowska, University of Economics, Katowice, Poland

INFOCOMP Research Institute Liaison Chairs
Kei Davis, Los Alamos National Laboratory / Computer, Computational, and Statistical Sciences Division, USA
Daniel S. Katz, Computation Institute, University of Chicago & Argonne National Laboratory, USA
Harald Kornmayer, Cooperative State University of Baden-Wuerttemberg, Mannheim, Germany
Ivor Spence, School of Electronics, Electrical Engineering and Computer Science, Queen's University Belfast, Northern Ireland, Research for High Performance and Distributed Computing / Queen's University Belfast, UK

INFOCOMP Industry Chairs
Wolfgang Christmann, christmann informationstechnik + medien GmbH & Co. KG
William R. Claycomb, Sandia National Laboratories - Albuquerque, USA
Edgar Leon, IBM Research, Austin, USA
Hans-Guenther Mueller, SGI Silicon Graphics - Goettingen, Germany

INFOCOMP Special Area Chairs on Large Scale and Fast Computation
Christopher Jordan, The University of Texas at Austin, USA
Walter Lioen, SARA Computing and Networking Services Amsterdam, The Netherlands

INFOCOMP Special Area Chairs on Networks and Communications
Noelia Correia, University of the Algarve, Portugal
Wolfgang Hommel, Leibniz Supercomputing Centre - Munich, Germany
George Michelogiannakis, Stanford University, USA

INFOCOMP Special Area Chairs on Advanced Applications
Kurt Schneider, Fachgebiet Software Engineering, Leibniz Universität Hannover, Germany

INFOCOMP Special Area Chairs on Evaluation Context
Dominic Eschweiler, Juelich Supercomputing Centre, Germany
Philipp Kremer, German Aerospace Center (DLR), Institute of Robotics and Mechatronics, Oberpfaffenhofen, Germany

Committee: http://www.iaria.org/conferences2011/ComINFOCOMP11.html 
-----------------------------------------

From alejandro.canovas.cp46700@gmail.com  Fri Feb 18 13:27:19 2011
Return-Path: <alejandro.canovas.cp46700@gmail.com>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4E0673A6EC4 for <sam@core3.amsl.com>; Fri, 18 Feb 2011 13:27:19 -0800 (PST)
X-Quarantine-ID: <VgdK1I9afrqa>
X-Virus-Scanned: amavisd-new at amsl.com
X-Amavis-Alert: BAD HEADER, Non-encoded 8-bit data (char E1 hex): From: Alejandro C\341novas Solbes<al[...]
X-Spam-Flag: NO
X-Spam-Score: -3.883
X-Spam-Level: 
X-Spam-Status: No, score=-3.883 tagged_above=-999 required=5 tests=[AWL=-0.184, BAYES_00=-2.599, GB_I_INVITATION=-2, J_CHICKENPOX_44=0.6, MIME_8BIT_HEADER=0.3]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VgdK1I9afrqa for <sam@core3.amsl.com>; Fri, 18 Feb 2011 13:27:17 -0800 (PST)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.9]) by core3.amsl.com (Postfix) with ESMTP id 1F3FF3A6AAE for <sam@irtf.org>; Fri, 18 Feb 2011 13:27:16 -0800 (PST)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id p1ILRnGM021428 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Fri, 18 Feb 2011 22:27:49 +0100
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id p1ILRo3C021873 for <sam@irtf.org>; Fri, 18 Feb 2011 22:27:50 +0100
Received: from JLLORET (vpn062.vpns.upv.es [158.42.244.62]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id p1ILRmuL027393 for <sam@irtf.org>; Fri, 18 Feb 2011 22:27:49 +0100
Date: Fri, 18 Feb 2011 22:27:49 +0100
Message-Id: <201102182127.p1ILRmuL027393@smtp.upv.es>
From: Alejandro Cánovas Solbes<alejandro.canovas.cp46700@gmail.com>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] Deadline extension | MOBILITY 2011 || July 17-22, 2011 - Bournemouth, UK
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Feb 2011 21:27:19 -0000

INVITATION:

=================
Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results.
=================

============== MOBILITY 2011 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

MOBILITY 2011: The First International Conference on Mobile Services, Resources, and Users
July 17-22, 2011 - Bournemouth, UK

General page: http://www.iaria.org/conferences2011/MOBILITY11.html

Call for Papers: http://www.iaria.org/conferences2011/CfPMOBILITY11.html

Submission deadline: March 10, 2011

Technical Co-Sponsors:
- The Bournemouth & Poole College
- UNIK - University Graduate Center
- Bournemouth University
- Movation Collaboration Centre
- Center for Wireless Innovation, Norway
- INRIA
- PT Inovacao
- Cisco Systems, Inc.
Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org
Extended versions of selected papers on vehicular mobility will be published in a special issue of IJET Journal:
http://www.inderscience.com/browse/index.php?journalID=133

Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.

All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html

MOBILITY 2011 Topics (topics and submission details: see CfP on the site)

Mobile architectures, mechanisms, protocols
Mobility and wireless; Mobility enabling protocols; Mobile software; Service composition in mobile environments; Knowledge and service discovery in mobile environments; On-demand mobility; User presence in mobile environments; Replication in mobile environments; Middleware for mobile environments; Internet and mobility; Software architecture for mobile applications

Mobile networking and management
Fundamentals of mobile networks; Mobile-Fixed interworking; Heterogenous networks; Beyond IMT-A; Mobile network virtualization; Femtocells and relays; Mobile cells; Mobile network sharing and network access; Self-management of mobile networks; Mobility management; Access control in mobile environments; Advanced roaming concepts; Mobile network edge-based service delivery platforms; Mobile content delivery networks; Mobile peer-to-peer systems; Mobile VPNs; Quality of experience in mobile networks

Mobile devices and services
Smart mobile devices; Embedded mobile; Sensors and mobiles; Mobile media, mobile content; Mobile applications (mobile learning, mobile healthcare, etc.); Mobile games; Mobile business; Mobile Web applications; Apps versus Web; Novel software concepts for mobile services; Mobile- and micro payment; mCommerce

Mobile prosumers and interfaces
User interaction and mobility; Mobile communities; Mobile Web interfaces and interaction techniques; Implementations and experimental mobile systems; Mobile Web; Mobile search and advertising

Mobile Internet of Things
Future mobile Internet; Internet of Things; Machine to Machine, People, Business (M2x); Online; Smart Homes; Smart Cities

Vehicular mobile technology
Architectures and platforms; Vehicular ad hoc networks; Vehicular routing metrics and supporting protocols; Mobility management and topology control; Standardization of vehicular networks; User aspects; Business enablers

Challenges in mobile environments
Security and privacy environments; Protection and safety of distributed mobile data; Context-aware mobility and privacy; Mobile emergency communication and public safety; Location-based services; Micro-payments; Accuracy and preciseness in localizing mobile entities

====================
MOBILITY General Chair
Josef Noll, University of Oslo & Movation, Norway

MOBILITY Advisory Committee
Petre Dini, Concordia University, Canada & IARIA, USA
Pekka Jappinen. Lappeenranta University of Technology, Finland
Maode Ma, Nanyang Technological University, Singapore

MOBILITY Industry Liaison Chairs
Filipe Cabral Pinto, Telecom Inovação S.A., Portugal
Xiang Song, Microsoft, USA
Xun Luo, Qualcomm Inc. - San Diego, USA

MOBILITY Special Area Chairs on Video
Mikko Uitto, VTT Technical Research Centre of Finland, Finland

MOBILITY Special Area Chairs on Mobile Wireless Networks
Mohammad Mushfiqur Chowdhury, University of Oslo, Norway
Masashi Sugano, Osaka Prefecture University, Japan

MOBILITY Special Area Chairs on Mobile Web / Application
In-Young Ko, Korea Advanced Institute of Science and Technology (KAIST), Korea

MOBILITY Special Area Chairs on Context-aware, Media, and Pervasive
Brent Lagesse, Oak Ridge National Laboratory, USA

MOBILITY Special Area Chairs on Mobile Internet of Things and Mobile Collaborations
Jörn Franke, SAP Research Center - Sophia Antipolis, France
Nils Olav Skeie, University College Telemark, Norway

MOBILITY Special Area Chairs on Vehicular Mobility
Gianluca Franchino, CEIICP - Scuola Superiore Sant'Anna - Pisa, Italy

MOBILITY Special Area Chairs on Mobile Cloud Computing
Chunming Rong, University of Stavanger, Norway
Josef Noll, Center for Wireless Innovation, Norway

MOBILITY Publicity Chairs
Aline Carneiro Viana, INRIA Saclay - Ile de France - Orsay, France
Sarfraz Alam, UNIK-University Graduate Center, Norway

Committee: http://www.iaria.org/conferences2011/ComMOBILITY11.html
============================

From jlloret@dcom.upv.es  Mon Feb 21 14:06:47 2011
Return-Path: <jlloret@dcom.upv.es>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id ED0E13A7184 for <sam@core3.amsl.com>; Mon, 21 Feb 2011 14:06:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.599
X-Spam-Level: 
X-Spam-Status: No, score=-4.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, GB_I_LETTER=-2]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oJmOl13lxUC7 for <sam@core3.amsl.com>; Mon, 21 Feb 2011 14:06:46 -0800 (PST)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.9]) by core3.amsl.com (Postfix) with ESMTP id 665323A7153 for <sam@irtf.org>; Mon, 21 Feb 2011 14:06:46 -0800 (PST)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id p1LM7QiR032713 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Mon, 21 Feb 2011 23:07:27 +0100
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id p1LM7Q5m015412 for <sam@irtf.org>; Mon, 21 Feb 2011 23:07:27 +0100
Received: from JLLORET (vpn245-16.vpns.upv.es [158.42.245.16]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id p1LM7PbT021133 for <sam@irtf.org>; Mon, 21 Feb 2011 23:07:26 +0100
Date: Mon, 21 Feb 2011 23:07:26 +0100
Message-Id: <201102212207.p1LM7PbT021133@smtp.upv.es>
From: Jaime Lloret Mauri<jlloret@dcom.upv.es>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] [NPA] CFP: Network Protocols and Algorithms
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Feb 2011 22:06:48 -0000

********************* Call for Papers ********************* 

Network Protocols and Algorithms 

ISSN 1943-3581

http://www.macrothink.org/journal/index.php/npa/

Network Protocols and Algorithms is a free-access online international journal, peer-reviewed and published by Macrothink 
Institute. It publishes papers focused on the design, development, manage, optimize or monitoring any type of network 
protocol, communication system, algorithm for communication and any protocol and algorithm to communicate network devices.

The scope of the journal include, but are not limited to, the following topic areas:

- Synchronization Protocols and Algorithms
- Security Protocols and Algorithms
- QoS Protocols and Algorithms
- Ad-Hoc and Sensor Network Protocols and Algorithms
- Content Delivery Networks Protocols and Algorithms
- P2P Protocols and Algorithms
- Cluster-Based Protocols and Algorithms
- Real-Time Protocols and Algorithms
- Wireless Protocols and Algorithms
- MAC Protocols and Algorithms for Wired Networks
- Mobile wireless internet protocols and algorithms
- Delay Tolerant protocols and algorithms
- Mesh network protocols and algorithms
- Protocols and algorithms for Voice over IP delivery
- Cognitive Radio Network Protocols and Algorithms
- Monitoring and management protocols and algorithms
- optical networking protocols and algorithms
- Scalable Network Protocols and Algorithms
- Protocols and algorithms for Green Computing and Resource Allocation
- Routing Protocols and Algorithms
- Tree-based Protocols and Algorithms
- Distributed/Decentralized Algorithms for Networks
- Fault tolerant Protocols and Algorithms
- Protocols and algorithms for Mobile and Dynamic Networks
- Cross-Layer Collaborative Protocols and Algorithms
- Formal methods and cryptographic algorithms for communication
- Power Efficient and Energy Saving Network Protocols and Algorithms
- Multimedia Network Protocols and Algorithms
- Network Protocols and Algorithms for Context-Aware and Semantic Networks
- Localized Network Protocols and Algorithms
- Transport Layer Protocols
- Smart Grids protocols and algorithms

Network Protocols and Algorithms has linked its papers to references by DOI (Digital Object Identifier) numbers.

Network Protocols and Algorithms appears in the next search engines: Google Scholar, Bing, Yahoo and Ask.

Network Protocols and Algorithms is added and indexed in Index Copernicus, ProQuest, EBSCO, Ulrichsweb.com, Directory of 
Open Access Journals (DOAJ), Open J-Gate, Gale, Socolar, io-port Database, NewJour - Electronic Journals and Newsletters, 
Public Knowledge Project metadata harvester, Ovid LinkSolver, Genamics JournalSeek and PublicationsList.org. It is also 
requested to be included in other major Indexing Databases.

You are welcome to submit a paper or forward this call for papers to any people working in Network Protocols and 
Algorithms that may be interested in submitting a paper.

The topics suggested by the journal can be discussed in term of concepts, state of the art, standards, implementations, 
running experiments and applications. Proposals and deployments are also welcome.

Submission Information:
Only original and unpublished research papers will be considered in this journal. Manuscripts must be writen in English. 
All submissions will be reviewed based on technical merit and relevance. Instructions for authors and submissions can be 
found in http://www.macrothink.org/journal/index.php/npa/about/submissions


Jaime Lloret Mauri
Editor in Chief of the International Journal of Network Protocols and Algorithms
Associate Professor
Department of Communications
Polytechnic University of Valencia

From alejandro.canovas.cp46700@gmail.com  Mon Feb 21 16:46:54 2011
Return-Path: <alejandro.canovas.cp46700@gmail.com>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 788F23A67AB for <sam@core3.amsl.com>; Mon, 21 Feb 2011 16:46:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.98
X-Spam-Level: 
X-Spam-Status: No, score=-2.98 tagged_above=-999 required=5 tests=[AWL=-0.981,  BAYES_50=0.001, GB_I_INVITATION=-2]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id whL6gZE+9n19 for <sam@core3.amsl.com>; Mon, 21 Feb 2011 16:46:52 -0800 (PST)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.9]) by core3.amsl.com (Postfix) with ESMTP id 806FC3A67AA for <sam@irtf.org>; Mon, 21 Feb 2011 16:46:51 -0800 (PST)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id p1M0lXhW025251 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Tue, 22 Feb 2011 01:47:33 +0100
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id p1M0lW8e031720 for <sam@irtf.org>; Tue, 22 Feb 2011 01:47:33 +0100
Received: from JLLORET (vpn016.vpns.upv.es [158.42.244.16]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id p1M0lVbT001545 for <sam@irtf.org>; Tue, 22 Feb 2011 01:47:32 +0100
Date: Tue, 22 Feb 2011 01:47:32 +0100
Message-Id: <201102220047.p1M0lVbT001545@smtp.upv.es>
From: Alejandro Canovas Solbes<alejandro.canovas.cp46700@gmail.com>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] CfP: Last Mile | ICCGI 2011 || June 19-24, 2011 - Luxembourg
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Feb 2011 00:46:54 -0000

INVITATION:

=================
Note that the submission deadline has been extended to February 28, 2011.
Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results.
=================


============== ICCGI 2011 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

ICCGI 2011, The Sixth International Multi-Conference on Computing in the Global Information Technology

June 19-24, 2011 - Luxembourg

General page: http://www.iaria.org/conferences2011/ICCGI11.html

Call for Papers: http://www.iaria.org/conferences2011/CfPICCGI11.html

Submission deadline: February 28, 2011

Technical Co-Sponsors:
- University Politehnica of Bucharest
- University of Nicosia
- University of Surrey
- Université Lille Nord
- Institut de Recherche d'Hydro-Québec - Varennes
- Illinois State University
- HCL America
- Intel, USA
Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org

Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.

All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html

ICCGI 2011 Topics (topics and submission details: see CfP on the site)

Industrial systems
Control theory and systems; Fault-tolerance and reliability; Data engineering; Enterprise computing and evaluation; Electrical and electronics engineering; Economic decisions and information systems; Advanced robotics; Virtual reality systems; Industrial systems and applications; Industrial and financial systems; Industrial control electronics; Industrial IT solutions

Evolutionary computation
Algorithms, procedures, mechanisms and applications; Computer architecture and systems; Computational sciences; Computation in complex systems; Computer and communication systems; Computer networks; Computer science theory; Computation and computer security; Computer simulation; Digital telecommunications; Distributed and parallel computing; Computation in embedded and real-time systems; Soft computing; User-centric computation

Autonomic and autonomous systems
Automation and autonomous systems; Theory of Computing; Autonomic computing; Autonomic networking; Network computing; Protecting computing; Theories of agency and autonomy; Multi-agent evolution, adaptation and learning; Adjustable and self-adjustable autonomy; Pervasive systems and computation; Computing with locality principles; GRID networking and services; Pervasive computing; Cluster computing and performance; Artificial intelligence Computational linguistics; Cognitive technologies; Decision making; Evolutionary computation; Expert systems; Computational biology

Bio-technologies
Models and techniques for biometric technologies; Bioinformatics; Biometric security; Computer graphics and visualization; Computer vision and image processing; Computational biochemistry; Finger, facial, iris, voice, and skin biometrics; Signature recognition; Multimodal biometrics; Verification and identification techniques; Accuracy of biometric technologies; Authentication smart cards and biometric metrics; Performance and assurance testing; Limitations of biometric technologies; Biometric card technologies; Biometric wireless technologies; Biometric software and hardware; Biometric standards

Knowledge data systems
Data mining and Web mining; Knowledge databases and systems; Data warehouse and applications; Data warehousing and information systems; Database performance evaluation; Semantic and temporal databases; Database systems Databases and information retrieval; Digital library design; Meta-data modeling

Mobile and distance education
Human computer interaction; Educational technologies; Computer in education; Distance learning; E-learning; Mobile learning Cognitive support for learning; Internet-based education; Impact of ICT on education and society; Group decision making and software; Habitual domain and information technology; Computer-mediated communications; Immersing authoring; Contextual and cultural challenges in user mobility

Intelligent techniques, logics, and systems
Intelligent agent technologies; Intelligent and fuzzy information processing; Intelligent computing and knowledge management; Intelligent systems and robotics; Fault-tolerance and reliability; Fuzzy logic & systems; Genetic algorithms; Haptic phenomena; Graphic recognition; Neural networks; Symbolic and algebraic computation; Modeling, simulation and analysis of business processes and systems

Knowledge processing
Knowledge representation models; Knowledge languages; Cognitive science; Knowledge acquisition; Knowledge engineering; Knowledge processing under uncertainty; Machine intelligence; Machine learning; Making decision through Internet; Networking knowledge plan

Information technologies
Information technology and organizational behavior; Agents, data mining and ontologies; Information retrieval systems; Information and network security; Information ethics and legal evaluations; Optimization and information technology; Organizational information systems; Information fusion; Information management systems; Information overload; Information policy making; Information security; Information systems; Information discovery

Internet and web technologies
Internet and WWW-based computing; Web and Grid computing; Internet service and training; IT and society; IT in education and health; Management information systems; Visualization and group decision making; Web based language development; Web search and decision making; Web service ontologies; Scientific web intelligence; Online business and decision making; Business rule language; E-Business; E-Commerce; Online and collaborative work; Social eco-systems and social networking; Social decisions on Internet; Computer ethics

Digital information processing
Mechatronics; Natural language processing; Medical imaging; Image processing; Signal processing; Speech processing; Video processing; Pattern recognition; Pattern recognition models; Graphics & computer vision; Medical systems and computing

Cognitive science and knowledge agent-based systems
Cognitive support for e-learning and mobile learning; Agents and cognitive models; Agents & complex systems; computational ecosystems; Agent architectures, perception, action & planning in agents; Agent communication: languages, semantics, pragmatics & protocols; Agent-based electronic commerce and trading systems Multi-agent constraint satisfaction; Agent programming languages, development environments and testbeds; Computational complexity in autonomous agents; Multi-agent planning and cooperation; Logics and formal models of for agency verification; Nomadic agents; Negotiation, auctions, persuasion; Privacy and security issues in multi-agent systems

Mobility and multimedia systems
Mobile communications; Multimedia and visual programming; Multimedia and decision making; Multimedia systems; Mobile multimedia systems; User-centered mobile applications; Designing for the mobile devices; Contextual user mobility; Mobile strategies for global market; Interactive television and mobile commerce

Systems performance
Performance evaluation; Performance modeling; Performance of parallel computing; Reasoning under uncertainty; Reliability and fault-tolerance; Performance instrumentation; Performance monitoring and corrections; Performance in entity-dependable systems; Real-time performance and near-real time performance evaluation; Performance in software systems; Performance and hybrid systems; Measuring performance in embedded systems

Networking and telecommunications
Telecommunication and Networking; Telecommunication Systems and Evaluation; Multiple Criteria Decision Making in Information Technology; Network and Decision Making; Networks and Security; Communications protocols (SIP/H323/MPLS/IP); Specialized networks (GRID/P2P/Overlay/Ad hoc/Sensor); Advanced services (VoIP/IPTV/Video-on-Demand; Network and system monitoring and management; Feature interaction detection and resolution; Policy-based monitoring and managements systems; Traffic modeling and monitoring; Traffic engineering and management; Self-monitoring, self-healing and self-management systems; Man-in-the-loop management paradigm

Software development and deployment
Software requirements engineering; Software design, frameworks, and architectures; Software interactive design; Formal methods for software development, verification and validation; Neural networks and performance; Patterns/Anti-patterns/Artifacts/Frameworks; Agile/Generic/Agent-oriented programming; Empirical software evaluation metrics; Software vulnerabilities; Reverse engineering; Software reuse; Software security, reliability and safety; Software economics; Software testing and debugging; Tracking defects in the OO design; Distributed and parallel software; Programming languages; Declarative programming; Real-time and embedded software; Open source software development methodologies; Software tools and deployment environments; Software Intelligence; Software Performance and Evaluation

Knowledge virtualization
Modeling techniques, tools, methodologies, languages; Model-driven architectures (MDA); Service-oriented architectures (SOA); Utility computing frameworks and fundamentals; Enabled applications through virtualization; Small-scale virtualization methodologies and techniques; Resource containers, physical resource multiplexing, and segmentation; Large-scale virtualization methodologies and techniques; Management of virtualized systems; Platforms, tools, environments, and case studies; Making virtualization real; On-demand utilities Adaptive enterprise; Managing utility-based systems; Development environments, tools, prototypes

Systems and networks on the chip
Microtechnology and nanotechnology; Real-time embedded systems; Programming embedded systems; Controlling embedded systems; High speed embedded systems; Designing methodologies for embedded systems; Performance on embedded systems; Updating embedded systems; Wireless/wired design of systems-on-the-chip; Testing embedded systems; Technologies for systems processors; Migration to single-chip systems

Context-aware systems
Context-aware autonomous entities; Context-aware fundamental concepts, mechanisms, and applications; Modeling context-aware systems; Specification and implementation of awareness behavioral contexts; Development and deployment of large-scale context-aware systems and subsystems; User awareness requirements Design techniques for interfaces and systems; Methodologies, metrics, tools, and experiments for specifying context-aware systems; Tools evaluations, Experiment evaluations

Networking technologies
Next generation networking; Network, control and service architectures; Network signalling, pricing and billing; Network middleware; Telecommunication networks architectures; On-demand networks, utility computing architectures; Next generation networks [NGN] principles; Storage area networks [SAN]; Access and home networks; High-speed networks; Optical networks; Peer-to-peer and overlay networking; Mobile networking and systems; MPLS-VPN, IPSec-VPN networks; GRID networks; Broadband networks

Security in network, systems, and applications
IT in national and global security; Formal aspects of security; Systems and network security; Security and cryptography; Applied cryptography; Cryptographic protocols; Key management; Access control; Anonymity and pseudonymity management; Security management; Trust management; Protection management; Certification and accreditation; Virii, worms, attacks, spam; Intrusion prevention and detection; Information hiding; Legal and regulatory issues

Knowledge for global defense
Business continuity and availability; Risk assessment; Aerospace computing technologies; Systems and networks vulnerabilities; Developing trust in Internet commerce; Performance in networks, systems, and applications; Disaster prevention and recovery; IT for anti-terrorist technology innovations (ATTI); Networks and applications emergency services; Privacy and trust in pervasive communications; Digital rights management; User safety and protection

Information Systems [IS]
Management Information Systems; Decision Support Systems; Innovation and IS; Enterprise Application Integration; Enterprise Resource Planning; Business Process Change; Design and Development Methodologies and Frameworks; Iterative and Incremental Methodologies; Agile Methodologies; IS Standards and Compliance Issues; Risk Management in IS Design and Development; Research Core Theories; Conceptualisations and Paradigms in IS; Research Ontological Assumptions in IS Research; IS Research Constraints, Limitations and Opportunities; IS vs Computer Science Research; IS vs Business Studies

IPv6 Today - Technology and deployment
IP Upgrade - An Engineering Exercise or a Necessity?; Worldwide IPv6 Adoption - Trends and Policies; IPv6 Programs, from Research to Knowledge Dissemination; IPv6 Technology - Practical Information; Advanced Topics and Latest Developments in IPv6; IPv6 Deployment Experiences and Case Studies; IPv6 Enabled Applications and Devices

Modeling
Continuous and Discrete Models; Optimal Models; Complex System Modeling; Individual-Based Models; Modeling Uncertainty; Compact Fuzzy Models; Modeling Languages; Real-time modeling; Peformance modeling

Optimization
Multicriteria Optimization; Multilervel Optimization; Goal Programming; Optimization and Efficiency; Optimization-based decisions; Evolutionary Optimization; Self-Optimization; Extreme Optimization; Combinatorial Optimization; Disccrete Optimization; Fuzzy Optimization; Lipschitzian Optimization; Non-Convex Optimization; Convexity; Continuous Optimization; Interior point methods; Semidefinite and Conic Programming

Complexity
Complexity Analysis; Computational Complexity; Complexity Reduction; Optimizing Model Complexity; Communication Complexity; Managing Complexity; Modeling Complexity in Social Systems; Low-complexity Global Optimization; Software Development for Modeling and Optimization; Industrial applications

ICCGI Advisory Chairs
Emmanuel Chaput, ENSEEIHT / IRIT-CNRS, France
Constantin Paleologu, University Politehnica of Bucharest, Romania
Tibor Gyires, Illinois State University, USA
Luc Vouligny, Institut de Recherche d'Hydro-Québec - Varennes, Canada
Hermann Kaindl, TU-Wien, Austria

ICCGI Industry/Research Chairs
Krishna Murthy, HCL America, USA
Jean Johnson, The Inclusion Trust - Takeley, UK
John Terzakis, Intel, USA
Yasushi Kambayashi, Nippon Institute of Technology, Japan
Mary Luz Mouronte López, Ericsson S.A., Spain

ICCGI Special Area Chairs

- Evolutionary Computation
Liviu Panait, Google Inc., USA

- Autonomic/Autonomous Systems
Ani Calinescu, Oxford University, UK

- Knowledge/Cognition
Constandinos Mavromoustakis, University of Nicosia, Cyprus

- e-Learning/Mobility
José Rouillard, Université Lille Nord, France

- Industrial systems
Marius Minea, University Politehnica of Bucharest, Romania

- Digital eco-systems
Amir r Razavi, University of Surrey - Guildford, UK

Committee: http://www.iaria.org/conferences2011/ComICCGI11.html
====================

From sandra.sendra.upv@gmail.com  Tue Feb 22 01:14:38 2011
Return-Path: <sandra.sendra.upv@gmail.com>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 064B83A67CF for <sam@core3.amsl.com>; Tue, 22 Feb 2011 01:14:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.954
X-Spam-Level: 
X-Spam-Status: No, score=-2.954 tagged_above=-999 required=5 tests=[AWL=-0.900, BAYES_00=-2.599, FRT_OFFER2=2.545, GB_I_INVITATION=-2]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k+yAAKimh5OY for <sam@core3.amsl.com>; Tue, 22 Feb 2011 01:14:37 -0800 (PST)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.9]) by core3.amsl.com (Postfix) with ESMTP id 52B223A67B2 for <sam@irtf.org>; Tue, 22 Feb 2011 01:14:37 -0800 (PST)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id p1M9FKoC013150 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Tue, 22 Feb 2011 10:15:20 +0100
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id p1M9FK5a023587 for <sam@irtf.org>; Tue, 22 Feb 2011 10:15:20 +0100
Received: from JLLORET (vpn245-23.vpns.upv.es [158.42.245.23]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id p1M9FIoS027772 for <sam@irtf.org>; Tue, 22 Feb 2011 10:15:19 +0100
Date: Tue, 22 Feb 2011 10:15:19 +0100
Message-Id: <201102220915.p1M9FIoS027772@smtp.upv.es>
From: Sandra Sendra<sandra.sendra.upv@gmail.com>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] CfP: Last Mile | ICWMC 2011 || June 19-24, 2011 - Luxembourg
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Feb 2011 09:14:38 -0000

INVITATION:

=================
Note that the submission deadline of February 28, 2011 is approaching.
Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and 
publish original scientific results.
=================

============== ICWMC 2011 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

ICWMC 2011, The Seventh International Conference on Wireless and Mobile Communications
June 19-24, 2011 - Luxembourg

General page: http://www.iaria.org/conferences2011/ICWMC11.html

Call for Papers: http://www.iaria.org/conferences2011/CfPICWMC11.html

Submission deadline: February 28, 2011

Technical Co-Sponsors:
- Orange
- IMEC- NL
- Eindhoven University of Technology
- University of Nis
- University Politehnica of Bucharest
- Digital Technology Laboratory - DMG/Mori Seiki
- Middlesex University
- ABB Group
Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org

Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, 
implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete 
unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, 
topic areas. 

All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, 
Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html

ICWMC 2011 Topics (topics and submission details: see CfP on the site)

Wireless Communications Basics
Coding & modulation & equalization; Channel modeling and characterization; Equalization/Synchronization; Transform-
domain communication; Multiple access algorithms and schemes; Antenna and RF subsystems; Smart antennas, adaptive 
antennas, MIMO and beam forming; MIMO and OFDM Based PHY Layer technologies; CDMA Systems

Radio Interfaces and Systems
Radio communications systems; Radio resource management; Radio transmission technologies; Power and interference 
control; Interference Cancellation for Wireless Mobile Systems; Power management for small terminals; Energy map; 
Channel Measurement and Characterization

Spectrum Allocation and Management
Spectrum efficiency analyses; Dynamic spectrum access networks; Spectrum management; Interference mitigation and 
management techniques 

Circuits for Wireless Communications
Wireless ASICs; Wireless technologies; RF Design issues

Wireless and Mobility
Mobility management; Location-based services and positioning; Micro and macro-mobility; Mobility, location and handoff 
management; Mobile and wireless IP; Wireless broadband mobile access; Routing in multihop, ad hoc and sensor networks; 
Wireless multicasting; Wireless mesh networks; Topology control in wireless

Protocols for wireless and mobility
Wireless protocols, architectural and design concepts; Protocols for air interfaces and networks; Wireless MAC 
protocols: Design and analysis; Transport layer issues in mobile and wireless networks; Middleware for handhelds and 
mobile services nodes; Proxies and middleware for wireless networks 

Traffic and congestion control, QoS, Resource Management
Traffic Modeling and Analysis; 3G/4G Bandwidth on Demand; QoS and mobility; End-to-end QoS; QoS profiling and pricing; 
Traffic Engineering; Congestion and admission control 

Wireless and mobile technologies
Micro-mobility and macro-mobility; Wireless LANs; Home and Personal Area Networks: Bluetooth, ZigBeee, etc; Wireless 
MANs:802.16, 802.20; Wireless WANs: 2G/3G/4G; Mobile ad hoc networks and multi-hop wireless; Sensor networks and 
applications; Ultra-wideband and short-range networks; High altitude platforms and satellites; Emergency wireless 
communications; Wireless real-time communications; RFID systems (including readers and transponders in LF, HF and UHF 
bands)

Performance Evaluation, Simulation and Modeling of wireless networks and systems
Performance and QoS in wireless networks; Radio channel modeling (wave propagation and measurements); Mobile/wireless 
networks modeling and simulation; Performance of end-to-end protocols over wireless networks 

Management of wireless and mobile networks 
Mobility and QoS management; Billing technologies and tools; Policy Based Management in wireless LANS and MANs; 
Wireless and Mobile Network Planning; Mobile Database Access and Design

Security in wireless and mobile environment
Security and robustness in wireless networks; Privacy, Authentication Authorization and Accounting (AAA); Encryption 
and Cryptography; Key Management Protocols; Digital Rights Management and Multimedia Protection

Networks convergence and integration
2G/3G/4G integration; Convergence of 3G wireless and Internet cross-layer design in wireless networks; WLAN/3G/4G 
integration; Wireless-wireline convergence; Heterogeneous Networks (WAN, Wireless MAN, WLAN); IP Multimedia subsystems 
(IMS); Next Generation Network Architecture- mobility issues; Coexistence of mobile radio networks; End to End QoS in 
Heterogeneous environment; Signaling for integrated wireline/wireless networks 

Applications and services based on wireless infrastructures
Mobile & Wireless applications & services; Service discovery: protocols and frameworks; Personalized services and 
applications; Audio-visual and mobile multimedia applications; Media and content distribution over wireless networks 

Standardization and regulations
Position on standards & fora on wireless and mobile networks; Wireless Networks Standards and Protocols; Communications 
regulations; 802.11 WLAN Standards; 802.16 WMAN Standards; 3GPP and 3GPP2 standards; HSDPA Technology and Standards; 
Next Generation Network standards 

Design and implementation 
Emerging wireless technologies; Cross-layer optimizations in wireless networks; Design and implementation of mobile 
information systems; Software defined radio and re-configurability; Joint PHY/MAC design 

Wireless and mobile network deployment
Business models on wireless networks; Market trends and regional developments; M-commerce; Lessons learnt for wireless 
deployment in schools Lessons learnt for wireless deployment in special regions; Specialized wireless networks; 
Heterogeneous wireless network deployment (e.g., combining 802.11, 802.16 and 3G networks)

Cooperative and Cognitive Vehicular Networks
Architectures and platforms of cognitive vehicular network; Distributed artificial intelligence techniques for 
cognitive networks; Cognitive vehicular routing metrics and supporting protocols; Reduced complexity cognitive 
networks; Physical and MAC layer issues; Protocols design for cognitive vehicular networks; Cross-layer optimization in 
cognitive networks; Security issues for vehicular and cognitive networks; Testbed experiment, applications and new 
advances; Cooperative vehicular networks; QoS provisioning in heterogeneous networks ; Managing vertical handover; 
Multihoming; IPv6 GeoNetworking; Vehicular network architectures and protocols ; Cross-layer design and optimization 
for vehicular networks and cognitive networks; Mobility management and topology control; Standardization and 
Development of vehicular networks

Convergence and social mobility
Convergence of mobile networks with the Web 2.0; Convergence on architecture and services; Open service capabilities; 
Open exposure of telco capabilities; Open Web APIs, SOA and SDP); Interworking strategies; Mobile terminals as sources 
for User-generated content; Architecture and services for user-generated content; Auto-description and metadata 
synthesis for telecom-generated for user-generated content; Social mobile networks; User behavior profiling; Social 
connections (social graphs, contacts, etc); Services and architectures/solutions for social mobile services

ICWMC Advisory Chairs
Jonathan Loo, Middlesex University - Hendon, UK
Catherine Meadows, Naval Research Laboratory - Washington DC, USA 
Antonio Liotta, Eindhoven University of Technology, The Netherlands 
Ouri Wolfson, University of Illinois at Chicago, USA
Naoki Wakamiya, University of Osaka, Japan 


ICWMC Industry/Research Chairs
Yan Zhang, IMEC- NL, The Netherlands 
Gang Zhao, Digital Technology Laboratory - DMG/Mori Seiki, USA 
Christopher Nguyen, Intel Corp., USA 
Mariusz Skrocki, Orange Labs - Warszawa, Poland 
Erick Amador, Infineon Technologies, France 
Ying Jian, Google, Inc., USA
Jingli Li, TopWorx - Emerson, USA
György Kálmán, ABB AS - Akershus, Norway

ICWMC Special Area Chairs

- Signal processing
Silviu Ciochina, Universitatea Politehnica din Bucuresti, Romania

- Security
Georg Neugebauer, RWTH Aachen University, Germany

- Mobility
Dragana Krstic, University of Nis, Serbia

- Vehicular
Jong-Hyouk Lee, INRIA, France

- Sensors
David Boyle, Tyndall National Institute, University College Cork, Ireland
Guangjie Han, Hohai University, Japan

- RFID
Andreas Löffler, Friedrich-Alexander University of Erlangen-Nuremberg, Germany

- Cognitive radio
Homayoun Nikookar, Delft University of Technology, The Netherlands

- Applications/Services
Tommi Aihkisalo, VTT Technical Research Centre of Finland - Oulu, Finland 

Committee: http://www.iaria.org/conferences2011/ComICWMC11.html
=================== 

From jlloret@dcom.upv.es  Wed Feb 23 02:18:17 2011
Return-Path: <jlloret@dcom.upv.es>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DE66F3A6832 for <sam@core3.amsl.com>; Wed, 23 Feb 2011 02:18:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.599
X-Spam-Level: 
X-Spam-Status: No, score=-4.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, GB_I_INVITATION=-2]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6qAnIWoMlVZ2 for <sam@core3.amsl.com>; Wed, 23 Feb 2011 02:18:13 -0800 (PST)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.9]) by core3.amsl.com (Postfix) with ESMTP id 75AA03A65A6 for <sam@irtf.org>; Wed, 23 Feb 2011 02:18:09 -0800 (PST)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id p1NAIsY0006168 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Wed, 23 Feb 2011 11:18:54 +0100
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id p1NAIsEE018491 for <sam@irtf.org>; Wed, 23 Feb 2011 11:18:54 +0100
Received: from JLLORET (gnd2g38-162.wi-fi.upv.es [158.42.38.162]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id p1NAIrtq005406 for <sam@irtf.org>; Wed, 23 Feb 2011 11:18:53 +0100
Date: Wed, 23 Feb 2011 11:18:53 +0100
Message-Id: <201102231018.p1NAIrtq005406@smtp.upv.es>
From: Jaime Lloret Mauri<jlloret@dcom.upv.es>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] CfP: Last Mile | COLLA 2011 || June 19-24, 2011 - Luxembourg
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Feb 2011 10:18:18 -0000

INVITATION:

=================
Note that the submission deadline has been extended to February 28, 2011.
Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results.
=================

============== COLLA 2011 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

COLLA 2011: The First International Conference on Advanced Collaborative Networks, Systems and Applications

June 19-24, 2011 - Luxembourg

General page: http://www.iaria.org/conferences2011/COLLA11.html

Call for Papers: http://www.iaria.org/conferences2011/CfPCOLLA11.html

Submission deadline: February 28, 2011

Technical Co-Sponsors:
- Atos Origin
- ENEA
- Murray State University
Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org

Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.

All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html

COLLA 2011 Topics (topics and submission details: see CfP on the site)

Cooperation and collaboration mechanisms
Collaborative computing; Cooperation as interface sharing; Collaboration as knowledge sharing; Ethics and trust in collaborative cross-domains; Cooperative emotion; Planning and managing collaborative applications and projects; Semantic and ontology challenges in collaborative environments; Cooperation and collaboration pitfalls; Groupware supporting single-display collaboration; Sharing data and decisions; Coalitions and negotiations in cooperative environments; Adaptive collaboration; Integrating cross-organizational applications; Cooperative data extraction and data integration; Secure collaboration; Dynamic cooperative environments; Visualization of cooperative processes

Collaborative architectures and mechanisms
Fundamental theoretical aspects of distributed collaboration; Methodologies and tools for design and analysis of collaborative user applications; Frameworks for human-centric based group collaboration; Distributed collaborative workflows; Architectures, protocols, and technologies for collaborative networks and systems; Collaboration and negotiation protocols; Quality of collaboration in collaborative networks, systems, and applications; Modeling for collaboration; Cloud-based collaboration; Agent-based collaborative environments; Collaboration techniques in resource intensive environments; Security, privacy and trust in collaborative networks, systems, and applications

Collaborative applications
Collaboration in pervasive computing applications; Collaborative e-education, e-learning, and collaborative computing in digital libraries; Models and mechanisms for real-time collaborative applications; Distributed technologies for group collaboration; Collaborative games; Web-based communities; New data distribution models to facilitate group collaboration; Social computing and inter-cultural collaboration;

Collaborative infrastructures
Collaborative, context-aware infrastructure; Collaborative mobile networks and infrastructures; Collaborative, location-aware mobile systems/applications; Collaborative sensor networks, unmanned air and ground vehicle networks and applications; ; Peer-to-peer and overlay networks, systems, and applications;

Collaborative services
Collaborative technologies for fast creation and deployment of new mobile services; Web services technologies and collaboration; Service-oriented architectures for collaborative networking and applications; Trusted collaborative services; Collaborative entertainment systems and services; Computer supported cooperative design; Adaptive content distribution

Collaborative users
Human/robot collaboration; Collaborative social networks and web-based collaboration; Computer supported collaborative work with distributed systems; Human-centric ubiquitous collaboration; Social networks and community discovery; Markets, auctions, exchanges, and coalitions

Tools and benchmarking
Methodologies and tools for design and analysis of collaborative user applications; Simulation, performance evaluation, experiments, and case studies of collaborative networks and applications; Dedicated hardware and software enabling collaboration; Technologies for creating dynamic social networks; P2P platforms for supporting collaboration; Energy management for collaborative networks; Tools for collaborative decision making processes; Trustworthy collaborative business processing in groupware organizations; Visualization techniques and interaction devices; Visual languages for collaborative networks and applications; Workflow management for collaborative networks/systems

COLLA Advisory Chairs
Dennis McLeod, University of Southern California - Los Angeles, USA
Lasse Berntzen, Vestfold University College – Tønsberg, Norway
Jaime Lloret Mauri, Universidad Politécnica de Valencia, Spain
Petre Dini, Concordia University, Canada / China Space Agency Center, China

COLLA Industry Liaison Chairs
Gokce Banu Laleci Erturkmen, SRDC Ltd., Turkey

COLLA Research Liaison Chairs
Vicente Romero, Atos Research & Innovation, Spain
Antonio De Nicola, ENEA, Italy

COLLA Publicity Chairs
Miguel Garcia Pineda, Polytechnic University of Valencia, Spain
Tanja Vos, Universidad Politécnica de Valencia, Spain

Committee: http://www.iaria.org/conferences2011/ComCOLLA11.html
------------------------

From jlloret@dcom.upv.es  Sun Feb 27 05:11:46 2011
Return-Path: <jlloret@dcom.upv.es>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7EBD43A69B2 for <sam@core3.amsl.com>; Sun, 27 Feb 2011 05:11:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.999
X-Spam-Level: 
X-Spam-Status: No, score=-2.999 tagged_above=-999 required=5 tests=[AWL=-1.600, BAYES_50=0.001, GB_I_LETTER=-2, J_CHICKENPOX_93=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yy71F7-gENRm for <sam@core3.amsl.com>; Sun, 27 Feb 2011 05:11:44 -0800 (PST)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.9]) by core3.amsl.com (Postfix) with ESMTP id 1D7A03A69AF for <sam@irtf.org>; Sun, 27 Feb 2011 05:11:42 -0800 (PST)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id p1RDCc8D001614 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Sun, 27 Feb 2011 14:12:38 +0100
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id p1RDCcvI002028 for <sam@irtf.org>; Sun, 27 Feb 2011 14:12:38 +0100
Received: from JLLORET (vpn245-27.vpns.upv.es [158.42.245.27]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id p1RDCb1h018879 for <sam@irtf.org>; Sun, 27 Feb 2011 14:12:37 +0100
Date: Sun, 27 Feb 2011 14:12:37 +0100
Message-Id: <201102271312.p1RDCb1h018879@smtp.upv.es>
From: Jaime Lloret Mauri<jlloret@dcom.upv.es>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] CFP: First International Conference on Advances in Computing and Communications (ACC-2011)
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sun, 27 Feb 2011 13:11:46 -0000

---------------------------------------------------------------------------
*** Our apologies if you receive multiple copies of this CFP ***
---------------------------------------------------------------------------

First International Conference on Advances in Computing and Communications (ACC-2011)  

Kochi, Kerala, India

July, 22-24, 2011 

http://www.acc-rajagiri.org

Technically co-sponsored by Association of Computing Machinery (ACM) - SIGWEB


CALL FOR PAPERS
-----------------

ACC2011 focuses on Advances in Computing and Communications, and it will provide a forum for sharing insights, experiences and interaction on various facets of evolving technologies and patterns related to Computer Science, Information Technology and Electronics. The conference provides the most relevant opportunity to bring together students, researchers and practitioners from both academia and industry. The conference will include a peer reviewed program of technical sessions, workshops, tutorials, and demonstration sessions.

Technical papers describing original, previously unpublished results are solicited in all areas of theory and practice of Computing, Communication and Information Technologies. Authors are invited to submit papers through EDAS Conference Management System (http://edas.info/newPaper.php?c=9485).The proceedings of the conference will be published by Springer in the series of Communications in Computer and Information Science (CCIS). CCIS is abstracted/indexed in ISI Proceedings, DBLP and Scopus. The Proceedings of ACC2011 will also be included in the CCIS electronic book series hosted in the SpringerLink digital library. All the accepted papers will be published in the conference proceedings. The organizers of ACC 2011 as well as our attendees expect accepted papers to be presented at the conference.  


Topics of interest include, but are not limited to:

* Ad-hoc Networks 
* Autonomic and Context-aware Computing 
* Bioinformatics and Bio-computing
* Cloud, Cluster, Grid and P2P Computing
* Database and Information Systems 
* Green Computing
* Internet and Web Computing
* Knowledge Management
* Mobile Computing 
* Multi Agent Systems
* Multimedia and Video Systems
* Parallel and Distributed Algorithms
* Reconfigurable Computing
* Security, Trust and Privacy
* Ubiquitous Computing 
* Soft Computing Techniques 
* Vehicular Communications Networks
* Advanced Micro Architecture Techniques 
* Cognitive Radio and Cognitive Networks
* Cyber Forensics
* Distributed Software Development
* Emergency First Response Systems
* Human Computer Interaction and Interface
* ICT for Women Empowerment and Rural Development
* Information Theory and Coding
* QoS and Resource Management
* Satellite and Space Communications
* Sensor Networks and Embedded Systems 
* Signal and Image Processing 

ACC- 2011 is organized by Rajagiri School of Engineering and Technology (RSET), a premier institution of higher learning in Kerala, India (http://www.rajagiritech.ac.in/) during July, 22-24, 2011 at Kochi, Kerala, India. The Campus is located on the banks of the river Chitrapuzha. It is 0.5 km from the Seaport - Airport Highway, 13 km from Ernakulam North Railway Station, and 27 km from the Nedumbassery International Airport. RSET is an endeavor of the Sacred Heart Province of the Carmelites of Mary Immaculate (CMI) - the first-ever indigenous religious congregation for men in the Syrian Catholic tradition of Christianity in India. 

Kochi (colonial name Cochin) is a vibrant city situated on the south-west coast of the Indian peninsula in the breathtakingly scenic and prosperous state of Kerala, hailed as 'God's Own Country' (http://www.cochin.org/cochin.htm, http://www.keralatourism.org/). Its strategic importance over the centuries is underlined by the sobriquet Queen of the Arabian Sea. Informally, Kochi is also referred to as the Gateway to Kerala. Southwest monsoon is the main rainy season in Kerala. This season begins by the end of May with the outset of the southwest monsoon winds. The next few months are periods of torrential rain.


Workshops and Special Sessions
--------------------------------

* Second International Workshop on Intelligent Technologies for Counter Terrorism and Security (IT-CoTeS)
* International Workshop on Multimedia Streaming (MultiStreams2011)
* Second International Workshop on Trust Management in P2P Systems (IWTMP2PS2011)
* Special Session on Distributed Software Development: Technical, Organizational and Social Challenges
* International workshop on Cloud Computing: Architecture, Algorithms and Applications(CloudComp2011)
* International Workshop on Identity: Security, Management & Applications (ID2011)
* International Workshop on Applications of Signal Processing (I-WASP 2011) 


Authors of selected outstanding papers will be invited to submit extended versions of their papers for consideration of publication in the following Journals: 

International Journal of Computers & Electrical Engineering (ISSN: 0045-7906), ELSEVIER [Special issue] 
International Journal of Communication Networks and Distributed Systems (IJCNDS) (ISSN: 1754-3916), Inder Science Publishers [2011 Special issue] 
Informatica - An International Journal of Computing and Informatics (ISSN: 0350-5596), Slovenian Society Informatika [2011 Special issue] 
International Journal of Network Protocols and Algorithms (NPA) (ISSN 1943-3581), Macrothink Institute,USA [2011 Special issue] 
International Journal of Grid and High Performance Computing (IJGHPC) (DOI: 10.4018/IJGHPC, ISSN: 1938-0259), IGI Global, USA [2012 Special issue] 
International Journal of Knowledge Engineering and Data Mining (IJKEDM) (ISSN:1755-2087), Inder Science Publishers [2011 Special issue] 
International Journal of Computers (JCP) (ISSN:1796-203X), Academy Publisher, Finland [2011 Special issue] 
International Journal of Networks (JNW) (ISSN:1796-2056), Academy Publisher, Finland [2011 Special issue] 
Information Assurance and Security Letters (IASL) (ISSN: 2150-7996), MIR Labs [2011 Special issue] 
International Journal on Internet and Distributed Computing Systems (IJIDCS) (ISSN:2219-1127) 


Best Paper Awards
------------------- 

As evaluated by TPC Chairs and TPC Members, THREE papers will be given Best Paper Award for ACC-2011 viz 1st, 2nd and 3rd respectively. The above committee will expect the presentation of the selected best papers during the conference before finalizing the list. The winners will be declared during the conference. 

Special Issues
--------------
Authors of selected outstanding papers will be invited to submit extended versions of their papers for consideration of publication in the International Journal of Network Protocols and Algorithms (NPA) (ISSN 1943-3581) published by Macrothink Institute, USA.

Important Dates
--------------- 

Full Paper Submission: March 8, 2011 (Firm Deadline)	
Acceptance Notification: April 15, 2011
Camera Ready Papers due: May 01, 2011
Registration Starts: April 16, 2011
Registration Closes: May 01, 2011
Conference: July, 22-24, 2011


Steering Committee 
------------------

John F. Buford, Avaya Labs Research, USA
Rajkumar Buyya, University of Melbourne, Australia
Mukesh Singhai, University of Kentucky, USA
John Strassner, Pohang University of Science and Technology, Republic of Korea
Junichi Suzuki, University of Massachusetts, Boston, USA
Ramakrishna Kappagantu, IEEE India Council
Achuthsankar S. Nair, Centre for Bioinformatics, Trivandrum, India 

General Chairs
--------------

Ajith Abraham, Machine Intelligence Research Labs, Europe
Chandra Sekaran K, Indian Institute of Technology Madras, India 
Waleed W. Smari, University of Dayton, Ohio, USA

Program Chairs
--------------

Jaime Lloret Mauri, Polytechnic University of Valencia, Spain
Thorsten Strufe, Darmstadt University of Technology, Germany
Gregorio Martinez, University of Murcia, Spain

Conference Chair
----------------

Sabu M. Thampi, Rajagiri School of Engineering and Technology, India

Special Sessions & Workshops Co-Chairs
--------------------------------------

El-Sayed El-Alfy, King Fahd University of Petroleum and Minerals, Saudi Arabia
Silvio Bortoleto, Positivo University, Brazil 

Tutorial Co-Chairs
------------------

Patrick Seeling, University of Wisconsin - Stevens Point, USA 
Jaydeep Sen, Tata Consultancy Services, Calcutta, India
K.S. Mathew, Rajagiri School of Engineering and Technology, India
Roksana Boreli, National ICT Australia Ltd, Australia

Demo Co-Chairs
--------------

Amitava Mukherjee, IBM Global Business Services, India
Bhadran V K, Centre for Development of Advanced Computing, Trivandrum, India
Janardhanan P.S, Rajagiri School of Engineering and Technology, India

Publicity Co-Chairs
-------------------

Victor Govindaswamy, Texas A&M University, USA
Arun Saha, Fujitsu Network Communications, USA
Biju Paul, Rajagiri School of Engineering and Technology, India

Publication Chairs
------------------

Pruet Boonma, Chiang Mai University, Thailand 
Sajid Hussain, Fisk University, USA
Hiroshi Wada, University of New South Wales, Australia

International Programme Committee 
---------------------------------

http://www.acc-rajagiri.org/ICommittee.html
 


See more information at: http://www.acc-rajagiri.org/
