2009-12-04

Re: [Tccc] Tccc Digest, Vol 81, Issue 11

On 04/12/2009, tccc-request@lists.cs.columbia.edu
<tccc-request@lists.cs.columbia.edu> wrote:
> Send Tccc mailing list submissions to
> tccc@lists.cs.columbia.edu
>
> To subscribe or unsubscribe via the World Wide Web, visit
> https://lists.cs.columbia.edu/cucslists/listinfo/tccc
> or, via email, send a message with subject or body 'help' to
> tccc-request@lists.cs.columbia.edu
>
> You can reach the person managing the list at
> tccc-owner@lists.cs.columbia.edu
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of Tccc digest..."
>
>
> Today's Topics:
>
> 1. Wiley SCN Journal - Call for papers (Naveen Chilamkurti)
> 2. Journal of Internet Technology - Call for papers
> (Naveen Chilamkurti)
> 3. CFP - IEEE Network Special Issue on Online Social Networks
> (Thomas Karagiannis)
> 4. Re: presentations by non-authors (Aiko Pras)
> 5. Re: presentations by non-authors (SABU THAMPI)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Fri, 4 Dec 2009 21:51:22 +1100
> From: "Naveen Chilamkurti" <N.Chilamkurti@latrobe.edu.au>
> Subject: [Tccc] Wiley SCN Journal - Call for papers
> To: <tccc@lists.cs.columbia.edu>
> Message-ID:
> <CC70A61CFFC2D340B3A88EE5BB8F13F7087D8E38@EXCHANGE.ltu.edu.au>
> Content-Type: text/plain; charset="iso-8859-1"
>
>
>
> Call for Papers: Security and Privacy in Wireless Systems
> Security and Communication Networks
> http://www. interscience.wiley.com/security/
>
>
>
> Advances in wireless communication systems have enabled the Internet to be
> even more ubiquitous in terms of network deployment and management. However,
> there are many security challenges ahead if wireless technologies are to
> gain the trust and confidence of the users. Thus, this Special Issue aims to
> address many aspects of wireless communication security, in an effort to
> publish and summarize the current state-of-the-art research works and to
> provide insights into future directions and challenges in the field. The
> topics for this Special Issue include:
>
> * Wireless network security foundations, including authorization
> * Access control, and intrusion detection and prevention
> * Wireless network methodologies and protocols, including agent-based
> and mobile code security, and soft computing-based security
> * Wireless e-Commerce and enterprise security
> * Database system security and safety
> * Cross-layer design and security
> * Vehicular ad hoc network security and reliability
> * RFID and sensor network security and privacy
> * Software security for sensor network nodes
> * Wireless intrusion detection, localization and countermeasures
> * Cryptographic primitives and operations for wireless networks
> * Trust, anonymity and privacy models for wireless networks, across domain
> mobility
> * Wireless network forensics
> * Identity-based authentication for wireless networks
> * DDoS / DoS attacks
> * Secure routing protocols for wireless sensor networks
> * Securing digital content over wireless network
>
> Submitted papers should not be considered elsewhere for publication and the
> authors must follow the guidelines for preparation of the manuscripts. The
> language of the journal is English. 12-point type in one of the standard
> fonts, Times, Helvetica, or Courier is preferred. The paper length should
> not exceed 20 pages total including all figures and illustrations. It is not
> necessary for authors to double-line space their manuscript. Tables must be
> on separate pages after the reference list, and not be incorporated into the
> main text. Figures should be uploaded as separate figure files. For
> manuscript submission authors should follow the guidelines described in
> Section ''For Authors'' at http://www.interscience.wiley.com/security.
> Prospective authors should submit their paper online at
> http://mc.manuscriptcentral.com/scn. When submitting the papers, the authors
> should make sure to choose the Manuscript type as ''Special Issue'', enter
> the ''Running Head'' and the ''Special Iss!
> ue title'' as ''SCN-SI-014'' and ''Security and Privacy in Wireless
> Networks", respectively.
>
> This special issue additionally selects high quality papers (best papers)
> from the Next Generation Wireless Systems 2009 conference
> (http://www.sersc.org/NGWS2009/), Melbourne, Australia.
>
>
> Submission Due Dates:
>
> Manuscript Due: 20th December 2009
> Decision Notification: 26th February 2010
> Revision Due: 12th May 2010
> Publication Date: November/December 2010
>
>
>
> Guest Editors:
> Naveen Chilamkurti
> Department of Computer Science and Computer Engineering
> La Trobe University, Melbourne, Australia
> n.chilamkurti@latrobe.edu.au
>
> Ben Soh
> Department of Computer Science and Computer Engineering
> La Trobe University, Melbourne, Australia
> b.soh@latrobe.edu.au
>
> Tai-hoon Kim
> Dept. of Multimedia Engineering,
> Hannam University, Korea
> taihoonn@sersc.org
>
>
>
>
> _______________________________________________
> Please do not post msgs that are not relevant to the database community at
> large. Go to www.cs.wisc.edu/dbworld for guidelines and posting forms.
> To unsubscribe, go to https://lists.cs.wisc.edu/mailman/listinfo/dbworld
>
>
>
> _______________________________________________
> Tccc mailing list
> Tccc@lists.cs.columbia.edu
> https://lists.cs.columbia.edu/cucslists/listinfo/tccc
>
>
>
>
> ------------------------------
>
> Message: 2
> Date: Fri, 4 Dec 2009 21:52:11 +1100
> From: "Naveen Chilamkurti" <N.Chilamkurti@latrobe.edu.au>
> Subject: [Tccc] Journal of Internet Technology - Call for papers
> To: <tccc@lists.cs.columbia.edu>
> Message-ID:
> <CC70A61CFFC2D340B3A88EE5BB8F13F7087D8E39@EXCHANGE.ltu.edu.au>
> Content-Type: text/plain; charset="iso-8859-1"
>
>
>
> Call for Papers
> Journal of Internet Technology
> (http://jit.ndhu.edu.tw/, Indexed by SCI-E)
>
> Special Issue on "Mobile Internet" and Selected Papers from International
> Conference on Next Generation Wireless Systems, 2009
> (http://www.sersc.org/NGWS2009/index.php)
>
> Theme and Scope
> With the proliferation of mobile devices, accessing the Internet on-the-move
> becomes possible and necessary. However, the current mobile Internet
> protocols and infrastructures left many things to be desired. More
> researches are needed for people to really access Internet at anywhere, on
> anytime, and using many devices. This special issue is intended to foster
> the dissemination of state-of-the-art research in the area of mobile
> Internet. Original research articles are solicited in all aspects of mobile
> Internet including protocol enhancements, emerging technologies, theoretical
> studies, practical applications, and experimental prototypes. Submissions of
> high quality papers describing mature results or on-going work are invited.
> Topics appropriate for this special issue include, but are not limited to:
>
> Mobility Management in mobile Internet
>
> Cross-layer schemes and optimizations for mobile Internet
>
> End-to-End quality of service support for mobile Internet
>
> Handoff Techniques in mobile Internet
>
> Resource management and admission control in Mobile Internet
>
> Multimedia delivery over mobile Internet
>
> Security and Privacy concerns in mobile Internet
>
> Performance evaluation of mobile Internet
>
> Location based services and tracking in mobile Internet
>
> Middleware support for mobile Internet
>
> New and emerging technologies, service, and applications for mobile Internet
>
> Case studies and Testbeds
> Instructions for Manuscripts
> This special issue aims to foster state-of-the-art research in the area of
> mobile Internet. Prospective authors are encouraged to submit their papers
> to the International Conference on Next Generation Wireless Systems 2009,
> first for preliminary screening and for expediting the reviewing process.
> However, papers can also be submitted directly to one of the guest editors.
> The submitted papers must be written in English and describe original
> research which is not published nor currently under review by other journals
> or conferences. Author guidelines for preparation of manuscript can be found
> at http://jit.ndhu.edu.tw/preparation2.php . The covering letter should
> indicate the names of the authors and their affiliations, addresses, faxes,
> and e-mails. Submission should be e-mailed as a PDF file directly to one of
> the guest editors of the special issue by December 15, 2009.
>
> Important Dates
>
> Manuscript Due: December 15, 2009
>
> Notification of Acceptance/Rejection/Revision: February 28, 2010
>
> Revise Manuscript Due: March 31, 2010
>
> Final Manuscript Due: April 30, 2010
>
> Tentative Publication Date: 3rd Quarter, 2010 (Tentative)
>
> Guest Editors
>
> Prof. Ruay-Shiung Chang
> National Dong Hwa University, Taiwan,
> Email: rschang@mail.ndhu.edu.tw
> Prof. Tai-hoon Kim
> Hannam University, Korea
> Email: thkim2005@gmail.com
>
> Dr. Adrian Stoica
> NASA JPL, USA
> Email: adrian.stoica@jpl.nasa.gov
>
> Dr. Naveen Chilamkurti
> La Trobe University, Australia
> n.chilamkurti@latrobe.edu.au
> _______________________________________________
> Please do not post msgs that are not relevant to the database community at
> large. Go to www.cs.wisc.edu/dbworld for guidelines and posting forms.
> To unsubscribe, go to https://lists.cs.wisc.edu/mailman/listinfo/dbworld
>
>
>
>
>
> ------------------------------
>
> Message: 3
> Date: Fri, 4 Dec 2009 12:21:11 +0000
> From: Thomas Karagiannis <Thomas.Karagiannis@microsoft.com>
> Subject: [Tccc] CFP - IEEE Network Special Issue on Online Social
> Networks
> To: "tccc@lists.cs.columbia.edu" <tccc@lists.cs.columbia.edu>
> Message-ID:
> <A4177B4B35406B44BFEA3E0CF2969E2102D9AC@DB3EX14MBXC313.europe.corp.microsoft.com>
>
> Content-Type: text/plain; charset="us-ascii"
>
> The popularity and complexity of online social networks continues to grow
> triggering intense research interest in the analysis of the structure and
> properties of online communities. Today, online social network applications
> range from social communities and discussion groups, to recommendation
> engines, tagging systems, mobile social networks and virtual worlds.
>
> This special issue solicits innovative contributions that describe
> completed, unpublished work covering various aspects of online social
> networks. In particular, the goal of this special issue is to share new
> research developments in the area, and assemble papers from a variety of
> disciplines that address the challenges and important questions posed by
> online social applications.
>
> Topics of interest include, but are not limited to the following:
>
> * Implications of social networking on network and distributed systems
> design
> * System design for social networks
> * Measurement and analysis of online communities and social media
> * Analytical frameworks for user interactions and behavior
> * Management of trust and privacy: reputation, rating and reviews
> * Mobile social networks
> Important Dates
>
> Abstract submission (optional): January 8, 2010
> Full paper submission: January 15, 2010
> Acceptance notification: May 1, 2010
> Camera-ready: July 1, 2010
> Publication date: September, 2010
>
> Submission Instructions
>
> Authors should submit their manuscript electronically in PDF format by email
> to the guest editors according to the above timetable. Authors are
> encouraged to register their papers by submitting the paper abstract, the
> paper title, authors and keywords by the corresponding deadline. Prospective
> authors must prepare their original submissions in accordance with the IEEE
> Network guidelines to authors,
> http://www.comsoc.org/livepubs/ni/info/authors.html. Articles should not
> exceed 4500 words, be tutorial in nature, and should be written in a style
> comprehensible to readers outside the specialty of the article. All
> submissions will be reviewed based on technical merit and relevance.
>
> Guest editors
>
> Dr. Thomas Karagiannis
> Researcher
> Microsoft Research
> Cambridge, UK
> thomkar@microsoft.com<mailto:thomkar@microsoft.com>
>
> Dr. Michalis Faloutsos
> Associate Professor
> CS Department
> UC Riverside, USA
> michalis@cs.ucr.edu<mailto:michalis@cs.ucr.edu>
>
> Dr. Sue B. Moon
> Associate Professor
> CS Department
> KAIST, Korea
> sbmoon@kaist.edu<mailto:sbmoon@kaist.edu>
>
>
>
>
> ------------------------------
>
> Message: 4
> Date: Fri, 4 Dec 2009 13:53:10 +0100
> From: Aiko Pras <a.pras@utwente.nl>
> Subject: Re: [Tccc] presentations by non-authors
> To: tccc@lists.cs.columbia.edu
> Message-ID: <48850450-686D-4AE6-9F3D-DADF6C72FF45@utwente.nl>
> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
>
> Hi
>
> 1) I believe it would be good to slightly change the rules, and
> require that an AUTHOR should present.
>
> 2) Enforcement of that rule should be decided upon by the TPC chair. I
> other words: the TPC chair gets a "tool" that allows him / her to
> remove a paper from Xplore. The tool need not be used, however.
>
> 3) My proposal would be to collect statistics in EDAS (and JEMS, ...)
> telling if papers have been presented etc. Although I agree that
> legislation does not allow to collect all possible personal data, I
> do not believe that we are therefore forced to do nothing. Lets first
> define what we want, and after that see if it violates possible laws.
>
> My 2 cents ...
>
> Aiko
>
> On 4 dec 2009, at 10:56, Waltenegus Dargie wrote:
>
>> I suppose that raises a profiling problem which is hot and
>> contestable.
>> I like the idea of letting conference chairs decide base on local
>> information only. In general, if the same set of authors submit more
>> than two papers for a conference, we should expect one of them to show
>> up, because it means they must have deliberated long enough to attend
>> the conference. Failing not to show up should then be seriously dealt
>> with. Individual papers and individual cases are a bit difficult to
>> judge.
>>
>> Waltenegus
>>
>>
>>
>> Rui Aguiar schrieb:
>>> I was reading these comments, much inline with my experience, and
>>> wondering
>>> that we had now setup a great mechanism to distribute scientific
>>> contributions,
>>> but we have no mechanism in place that can aid chairs in making these
>>> hard decisions (e.g. by repeated patterns of failling to attend).
>>> Maybe it is time that we have a sort of credibility tool for authors,
>>> aiding chairs to take decisions on that gray area of what to do with
>>> a missing participant - one guy that misses one conference once by
>>> a flu, is
>>> not really the same that the same guy that misses all three
>>> conferences in a
>>> row because of repeated flu :-).
>>>
>>> OK, maybe I am too much dreaming with reputation issues these
>>> days :-)
>>> but it would a simple tool to associate to authors in Explorer a
>>> conference
>>> site that kept track if they present or not their papers in the
>>> conferences -
>>> just collect participation stats after the sessions (we usually do
>>> that
>>> anyway), and ask chairs to provide this info to a central site...
>>>
>>> Regards
>>>
>>> Rui
>>>
>>>>
>>>> Like Joerg I think that it is a bit of issue of a judgment and the
>>>> gray
>>>> areas stay. We have had to
>>>> fact that also in SECON (Rome) and DySPAN lately.
>>>>
>>>> I would prefer to go for "soft push" for saying that in principle
>>>> the
>>>> *authors* should present their
>>>> papers, and in the case of blatant and continuous violation of this
>>>> rule, chairs can take an action
>>>> (up to taking paper out of Explorer distribution). But this should
>>>> be
>>>> done after serious violation(s).
>>>> In fact, the current IEEE ruling stating that papers must be
>>>> presented
>>>> or otherwise there is
>>>> a possibility that chairs decide that it is not going to be in
>>>> Explorer
>>>> was implicitly assuming that
>>>> the paper is presented by one of the authors. It did not come to
>>>> serious
>>>> consideration that this
>>>> would not be the case.
>>>>
>>>> The gray-ish area stays, however, almost inevitably. One needs to
>>>> use a
>>>> bit of common sense
>>>> and judgment to gauge how reasonable and believable the reasons
>>>> for not
>>>> presenting are. I do
>>>> not necessarily have a big problem sometimes on this. For example
>>>> this
>>>> year I was chairing
>>>> a session and we had simply an excellent substitute. He had been
>>>> really
>>>> briefed into the paper,
>>>> was also working in the field etc. Simply a good presentation and
>>>> was
>>>> able to answer the questions.
>>>> This was much more better than another case, where we had an
>>>> author, who
>>>> was presenting
>>>> probably 3-5 papers written by his students, and was not able to
>>>> answer
>>>> many of the questions
>>>> although being nominally the author. So if the annoyance level is
>>>> generated by "not able to answer
>>>> questions" argument (alone), then having the author does not
>>>> necessarily
>>>> guarantee anything.
>>>>
>>>> My take on the serious violations on the game rules would be
>>>> repeated
>>>> non-author presentations,
>>>> especially in the mode "we will send one person to present all 10
>>>> papers
>>>> from our institute". I know
>>>> that for many this might be a funding issue etc., but regardless
>>>> these
>>>> are typically the problem
>>>> cases. Occasional covers are not, but almost an institutional
>>>> strategies
>>>> to send only one presenter
>>>> for a flood of papers typically ends up to the situation what Lars
>>>> was
>>>> describing.
>>>>
>>>> My take from 4-6 conferences I have been more deeply involved in is
>>>> following:
>>>>
>>>> * Few cases with very believable and good reasons: sudden illness,
>>>> institutional travel restrictions
>>>> (couple for flu epidemics, one for sudden cost reduction reasons),
>>>> and I
>>>> think I had even one
>>>> surprise wedding. These people were also making a pre-contact on
>>>> warning
>>>>
>>>> * More cases with no forewarning at all, and mixed bag of
>>>> explanations.
>>>>
>>>> * About 3-5 cases, where I was spotting this sort of maximal
>>>> number of
>>>> paper for minimal number
>>>> of presenters. Thus having only one person presenting huge number of
>>>> papers from the same
>>>> institution. One case was serious enough that I had a friendly
>>>> discussion with the person on trying
>>>> to understand a logic and to tell that this is not really what the
>>>> community and conferences are
>>>> expecting.
>>>>
>>>> -- Petri
>>>>
>>>>
>>>>> While I agree with the basic idea, as you say, this is a judgment
>>>>> call per case, under rare circumstances.
>>>>>
>>>>> We had very few (<=3) non-author presentations at WoWMoM this year;
>>>>> some people simply had travel bans from their institutions due to
>>>>> swine flu. (Now, it is an interesting question how to count travel
>>>>> bans due to budget; I'd say this is simply different.)
>>>>>
>>>>> So, while I basically agree with you that an author should come and
>>>>> make all effort to present, a gray-ish area will remain.
>>>>>
>>>>> Btw, the conference venue may also have an impact on how many
>>>>> people
>>>>> make the effort or are allowed to go. "May I go to Hawaii, I got
>>>>> this paper there..." may cause some raised eyebrows.
>>>>>
>>>>> It would be interesting to sample this over different conferences
>>>>> and venues to understand the origins of the problem.
>>>>>
>>>>> That said, I have seen repeated inquiries this year, asking me what
>>>>> happens if a person gets a paper accepted and cannot present. So,
>>>>> we probably need to take some action.
>>>>>
>>>>> Joerg
>>>>>
>>>>> Gaurav Somani wrote:
>>>>>
>>>>>> Very true. A restriction on at least one author registration
>>>>>> should be
>>>>>> modified to at least one author attendee. In any case there is a
>>>>>> problem
>>>>>> regarding their presence than the presentation should be
>>>>>> directly uploaded
>>>>>> instead of presenting by anyone. A conference has a main motive of
>>>>>> discussing the issues and getting feedback on your work.
>>>>>>
>>>>>> Gaurav Somani
>>>>>> LNMIIT, Jaipur
>>>>>>
>>>>>> On Fri, Dec 4, 2009 at 9:34 AM, Lars Eggert
>>>>>> <lars.eggert@nokia.com> wrote:
>>>>>>
>>>>>>
>>>>>>> Hi,
>>>>>>>
>>>>>>> in the past, we had problems that accepted papers didn't get
>>>>>>> presented,
>>>>>>> when authors would not show up at the conference. This has
>>>>>>> since been fixed,
>>>>>>> usually by requiring a presentation before accepted papers are
>>>>>>> published in
>>>>>>> the digital library.
>>>>>>>
>>>>>>> My impression at GLOBECOM this year is that roughly 1/3 of the
>>>>>>> papers are
>>>>>>> presented by someone other than the authors. This usually means
>>>>>>> that it is
>>>>>>> impossible to ask any substantial questions. Several authors
>>>>>>> actually
>>>>>>> directly end with a slide that says "send questions to the
>>>>>>> authors by
>>>>>>> email."
>>>>>>>
>>>>>>> One of the main attractions of attending a conference IMO is
>>>>>>> being able to
>>>>>>> interact with the authors, both in the session and during the
>>>>>>> breaks. When
>>>>>>> authors aren't here, that's not possible and the value of the
>>>>>>> conference is
>>>>>>> greatly diminished. I might as well watch a YouTube video of
>>>>>>> the talk.
>>>>>>>
>>>>>>> (I do understand that sometimes visa issues, etc. can prevent
>>>>>>> an author
>>>>>>> from attending a conference on short notice. But I don't
>>>>>>> believe this
>>>>>>> explains the large number of cases I see here.)
>>>>>>>
>>>>>>> An easy fix would be to require presentation of a paper *by an
>>>>>>> author*
>>>>>>> before it's published. I'm wondering what others think of this
>>>>>>> idea?
>>>>>>>
>>>>>>> Lars
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> Tccc mailing list
>>>>>>> Tccc@lists.cs.columbia.edu
>>>>>>> https://lists.cs.columbia.edu/cucslists/listinfo/tccc
>>>>>>>
>>>>>>>
>>>>>> _______________________________________________
>>>>>> Tccc mailing list
>>>>>> Tccc@lists.cs.columbia.edu
>>>>>> https://lists.cs.columbia.edu/cucslists/listinfo/tccc
>>>>>>
>>>>>>
>>>>> _______________________________________________
>>>>> Tccc mailing list
>>>>> Tccc@lists.cs.columbia.edu
>>>>> https://lists.cs.columbia.edu/cucslists/listinfo/tccc
>>>>>
>>>> _______________________________________________
>>>> Tccc mailing list
>>>> Tccc@lists.cs.columbia.edu
>>>> https://lists.cs.columbia.edu/cucslists/listinfo/tccc
>>>>
>>>
>>>
>>
>> _______________________________________________
>> Tccc mailing list
>> Tccc@lists.cs.columbia.edu
>> https://lists.cs.columbia.edu/cucslists/listinfo/tccc
>
>
>
> ------------------------------
>
> Message: 5
> Date: Fri, 4 Dec 2009 18:29:00 +0530
> From: SABU THAMPI <smtlbs@gmail.com>
> Subject: Re: [Tccc] presentations by non-authors
> To: Aiko Pras <a.pras@utwente.nl>
> Cc: tccc@lists.cs.columbia.edu
> Message-ID:
> <1cad4c540912040459w61aa851bqd436ddc44975b8cd@mail.gmail.com>
> Content-Type: text/plain; charset=ISO-8859-1
>
> please do not forget the authors from third world countries. Most of the
> authors meet the expenses for registration from their pockets. How they can
> come and present their ideas in the Conference by taking money
> from their pockets for the journey and accommodation. The Government funds
> are very limited.
>
> Regards
>
> --
> Dr. Sabu M. Thampi, M.S, M.E., Ph.D
> Mob: +919447103005
> smtlbs@yahoo.co.in; smtlbs@gmail.com, smtlbs@in.com
> http://in.linkedin.com/pub/dr-sabu-m-thampi-ph-d/11/30/18a
>
>
> ------------------------------
>
> _______________________________________________
> Tccc mailing list
> Tccc@lists.cs.columbia.edu
> https://lists.cs.columbia.edu/cucslists/listinfo/tccc
>
> End of Tccc Digest, Vol 81, Issue 11
> ************************************
>

--
Sent from my mobile device

FU Cheng, Frank (Ph.D, S.M.IEEE)
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc

No comments: