Issue No.07 - July (2012 vol.45)
Published by the IEEE Computer Society
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MC.2012.224
The Call and Calendar section lists conferences, symposia, and workshops that the IEEE Computer Society sponsors or cooperates in presenting.
Calls for Articles for Computer
Computer seeks submissions for a May 2013 special issue on cutting-edge research in visualization.
It has been more than 25 years since the National Science Foundation Panel on Graphics, Image Processing, and Workstations published its landmark report, "Visualization in Scientific Computing." Since then, the field of visualization has expanded to encompass scientific visualization, information visualization, and visual analytics, as well as many other subfields.
This special issue will highlight major research challenges in this field. Authors should address a current cutting-edge research topic in visualization with regard to what researchers could or should achieve in the next 5, 10, or 15 years. This involves reflection on how such a research topic has evolved over the past 25 years as well as projections for future developments.
The guest editors particularly welcome articles that feature critical evaluation of the state of the art; scenario-based vision statements; insightful analysis of feasibility, major obstacles, expected paradigm shifts, and building blocks drawn from advances in other disciplines; and discussion of road maps and their expected impact on science, technology, and society.
Suggested research topics for submission include cognition in visualization, visualization literacy, visual analytics systems, and emerging challenges—for example, connectome datasets.
Articles should be understandable to a broad audience of computing science and engineering professionals. The writing should be practical and original, avoiding detailed discussions of individual theories, theorems, algorithms, or abstract concepts, and minimizing the use of mathematical notations and technical jargon. All manuscripts are subject to peer review on both technical merit and relevance to Computer's readership. Accepted papers will be professionally edited for content and style.
The guest editors for this special issue are independent visualization consultant Theresa-Marie Rhyne (firstname.lastname@example.org) and Min Chen of Oxford University (email@example.com).
Paper submissions are due by 1 October 2012. Please e-mail the guest editors a brief description of the article you plan to submit by 15 September 2012.
For author guidelines and information on how to submit a manuscript electronically, visit www.computer.org/portal/web/peerreviewmagazines/computer.
Computer seeks submissions for an April 2013 special issue on cybersecurity.
Cybersecurity is an emerging area of intense activity that endeavors to provide innovative solutions to ensure uninterrupted communications and service availability.
This special issue aims to disseminate the latest advances in cybersecurity that are critical in thwarting future threats, attacks, fraud, and damage. The content will focus on effective techniques and approaches that have the potential to ensure a safe, trustworthy, secure, and resilient cyberspace.
Appropriate topics of interest include but are not limited to cybersecurity approaches for protecting the critical infrastructure in public sectors (water, electricity, gas, transportation, and so on); cyberthreat modeling and analysis; solutions to mitigate cyberattacks and cybercrime; cyberforensics; visual analytics and risk management techniques; testbeds, tools, and methodologies for cybersecurity experimentation; and cybersecurity education, policy, law, and regulation.
All manuscripts are subject to peer review on both technical merit and relevance to Computer's readership. Accepted papers will be professionally edited for content and style.
The guest editors for this special issue include Sherali Zeadally, University of the District of Columbia (firstname.lastname@example.org); Gregorio Martinez, University of Murcia, Spain (email@example.com); and Han-Chieh Chao, National Ilan University, Taiwan (firstname.lastname@example.org).
Paper submissions are due by 1 November 2012. For author guidelines and information on how to submit a manuscript electronically, visit www.computer.org/portal/web/peerreviewmagazines/computer.
Computer seeks submissions for an October 2013 special issue on multicore memory coherence.
As we enter an era of large multi-cores, the question of efficiently supporting a shared memory model has become more important. Massively parallel architectures lacking coherent shared memory have enjoyed great success in niche applications such as 3D rendering, but general programming developers still demand the convenience of a shared memory abstraction.
Efficiently using a message-passing interface requires that individual computation tasks be relatively large to overcome communication latencies. It becomes difficult to use MPI at the fine-grained level when fast on-chip communication is available. Higher-level mechanisms like MapReduce or shard-based databases are popular in particular application domains, though researchers have not yet efficiently applied them at the chip/node level.
This special issue will focus on approaches to providing scalable, shared memory at the on-chip level, paramount in a future where individual nodes will have on the order of 1,000 cores each.
Suggested topics include but are not limited to private and shared cache hierarchies; scalable memory coherence protocols, directory-based and otherwise; data layout and placement techniques; on-chip interconnects to support shared-memory abstractions; and hardware, software, and hybrid approaches.
Articles are due by 1 March 2013. Visit www.computer.org/computer/cfp10 to view the complete call for papers.
Calls for Articles for IEEE CS Publications
IEEE Internet Computing plans a May/June 2013 special issue on Internet censorship and control.
The Internet is a battleground where governments, citizens, and commercial interests fight for technical, social, and political control. These fights take many forms, including Internet filtering versus circumvention, surveillance versus anonymization, denial-of-service attacks, and intrusion attempts versus protection mechanisms and on- and offline persecution and defense of online activists. As the Internet becomes embedded in our world, its structural changes will have an increasing effect on our social and political structures; conversely, our social and political structures will increasingly impact the Internet's technical structure.
This special issue of IEEE Internet Computing seeks articles on the technical, social, and political mechanisms and impacts of Internet censorship and control. The guest editors are soliciting both technical and social science articles, and they especially encourage contributions that combine the two themes.
Articles are due 1 September 2012. Visit www.computer.org/portal/web/computingnow/iccfp3 to view the complete call for papers.
IEEE Intelligent Systems plans a May/June 2013 special issue on transfer learning in Web and social network mining.
In the field of information retrieval and Web mining, more and more learning tasks can easily acquire multiple datasets from various domains. For example, many of today's recommendation tasks leverage multiple types of user data such as browsing-history data, shopping record data, and social network data. At the same time, the need for knowledge transfer is increasingly evident as many new datasets, or parts of data, are only sparsely annotated.
Unlike traditional single-domain learning problems—which are based on the assumption that training and test data are drawn from identical distributions—transfer learning problems are built on multiple-domain data that can relate to target tasks in different degrees. To better leverage multiple-domain data, mining and transferring shared knowledge across multiple is likely to become a crucial step in information retrieval, recommendation, and Web and social network mining in the future.
This special issue brings together research on information retrieval and machine learning, natural language processing, social networks, and other areas of computer and information science.
Articles are due 1 September 2012. Visit www.computer.org/portal/web/computingnow/iscfp3 to view the complete call for papers.
IEEE Software plans a May/June 2013 special issue on safety-critical software systems.
We increasingly depend on devices in which software-based artifacts impact our safety. Such is the case in the aviation, automotive, medical, nuclear, and railway industries, among others. The development of safety-critical software systems encompasses a wide set of challenges including software engineering methods, tools, and frameworks. Applying new paradigms and solutions—model-based approaches (MDA/MDE), reuse techniques, cloud computing, and so on—provides numerous benefits with respect to software development, cost reduction, and certification.
Recently, new standards have been released relating to the development of safety-critical software systems. Despite different domain evidence in these standards developers can successfully apply software engineering techniques to safety-critical software systems.
This special issue will emphasize the role of software development processes, architecture models, and certification in safety-critical software systems, with articles addressing case studies, experience reports, practices, approaches, techniques, and guidelines.
Articles are due 1 October 2012. Visit www.computer.org/portal/web/computingnow/swcfp3 to view the complete call for papers.
8-10 Aug: ChinaCom 2012, 7th Int'l ICST Conf. on Communications and Networking in China, Kunming, China; http://awtrc.ict.ac.cn/uploads/homepage/index.html
8-10 Aug: IRI 2012, 13th IEEE Int'l Conf. on Information Reuse and Integration, Las Vegas, Nevada; www.sis.pitt.edu/~iri2012/index.html
20-24 Aug: WICSA 2012, IEEE Conf. on Software Architecture, Helsinki; www.wicsa.net
26-29 Aug: ASONAM 2012, Int'l Conf. on Advances in Social Networks Analysis and Mining, Istanbul; www.asonam2012.etu.edu.tr
22-26 Sep: PACT 2012, 21st Int'l Conf. on Parallel Architectures and Compilation Techniques, Minneapolis; www.pactconf.org
24-28 Sep: RE 2012, 20th IEEE Int'l Conf. on Requirements Eng., Chicago; http://crisys.cs.umn.edu/re2012
30 Sep-4 Oct: VL/HCC 2012, IEEE Symp. on Visual Languages and Human-Centric Computing, Innsbruck, Austria; www.ispass.org/ispass2012
3-6 Oct: FIE 2012, Frontiers in Education Conf., Seattle; http://fie-conference.org/fie2012
9-12 Oct: E-Science 2012, 8th IEEE Int'l Conf. on e-Science, Chicago; www.ci.uchicago.edu/escience2012
22-25 Oct: LCN 2012, 37th IEEE Conf. on Local Computer Networks, Clearwater Beach, Florida; www.ieeelcn.org/index.html
5-8 Nov: ISMAR 2012, IEEE Int'l Symp. on Mixed and Augmented Reality, Atlanta; www.ismar12.org
10-16 Nov: SC 2012, IEEE/ACM Int'l Conf. for High-Performance Computing, Networking, Storage, and Analysis, Salt Lake City; http://sc12.supercomputing.org
11-15 Nov: ICPR 2012, 21st IEEE Int'l Conf. on Pattern Recognition, Tsukuba Science City, Japan; www.icpr2012.org
1-5 Dec: MICRO 2012, IEEE/ACM Int'l Symp. on Microarchitecture, Vancouver; www.microsymposia.org/micro45
3-6 Dec: CLOUDCOM 2012, 4th IEEE Int'l Conf. on Cloud Computing Technology and Science, Taipei, Taiwan; www.cloudcom.org
5-7 Dec: RTSS 2012, 33rd IEEE Real-Time Systems Symp., San Juan, Puerto Rico; www.rtss.org
6-8 Dec: APSCC 2012, IEEE Asia-Pacific Services Computing Conf., Guilin, China; http://grid.hust.edu.cn/apscc2012