The Community for Technology Leaders

Calls for Articles For Computer

Pages: pp. 107-109

Computer seeks submissions for a February 2013 special issue on the Internet of Things.

The IoT promises to be the most disruptive technological revolution since the advent of the World Wide Web. Projections indicate that up to 100 billion uniquely identifiable objects will be connected to the Internet by 2020, but human understanding of the underlying technologies has not kept pace. This creates a fundamental challenge to researchers, with enormous technical, socioeconomic, political, and even spiritual consequences.

"The Internet of Things: The Next Technological Revolution" offers a forum for highlighting what the IoT could bring to the end user. The editors welcome articles that feature a critical evaluation of the state of the art, insightful analysis of deployed IoT systems, and road maps for future IoT research.

Topics of interest include but are not limited to the design and development methodology for a user-centered IoT; the dynamics of social media and connected objects; community programming for the IoT, including citizen science, citizen journalism, and social activism; opportunistic sensing, big data, and the IoT; and the impact of the IoT on the future networked society.

Articles are due by 1 July 2012. Visit to view the complete call for papers.

Computer seeks submissions for a May 2013 special issue on cutting-edge research in visualization.

It has been more than 25 years since the National Science Foundation Panel on Graphics, Image Processing, and Workstations published its landmark report, "Visualization in Scientific Computing." Since then, the field of visualization has expanded to encompass scientific visualization, information visualization, and visual analytics, as well as many other subfields.

This special issue will highlight major research challenges in this field. Authors should address a current cutting-edge research topic in visualization with regard to what researchers could or should achieve in the next 5, 10, or 15 years. This involves reflection on how such a research topic has evolved over the past 25 years as well as projections for future developments.

The guest editors particularly welcome articles that feature critical evaluation of the state of the art; scenario-based vision statements; insightful analysis of feasibility, major obstacles, expected paradigm shifts, and building blocks drawn from advances in other disciplines; and discussion of road maps and their expected impact on science, technology, and society.

Suggested research topics for submission include cognition in visualization, visualization literacy, visual analytics systems, and emerging challenges—for example, connectome datasets.

Articles should be understandable to a broad audience of computing science and engineering professionals. The writing should be practical and original, avoiding detailed discussions of individual theories, theorems, algorithms, or abstract concepts, and minimizing the use of mathematical notations and technical jargon. All manuscripts are subject to peer review on both technical merit and relevance to Computer's readership. Accepted papers will be professionally edited for content and style.

The guest editors for this special issue are independent visualization consultant Theresa-Marie Rhyne ( and Min Chen of Oxford University (

Paper submissions are due by 1 October 2012. Please e-mail the guest editors a brief description of the article you plan to submit by 15 September 2012.

For author guidelines and information on how to submit a manuscript electronically, visit

Computer seeks submissions for an April 2013 special issue on cybersecurity.

Cybersecurity is an emerging area of intense activity that endeavors to provide innovative solutions to ensure uninterrupted communications and service availability.

This special issue aims to disseminate the latest advances in cybersecurity that are critical in thwarting future threats, attacks, fraud, and damage. The content will focus on effective techniques and approaches that have the potential to ensure a safe, trustworthy, secure, and resilient cyberspace.

Appropriate topics of interest include but are not limited to cybersecurity approaches for protecting the critical infrastructure in public sectors (water, electricity, gas, transportation, and so on); cyberthreat modeling and analysis; solutions to mitigate cyber-attacks and cybercrime; cyberforensics; visual analytics and risk management techniques; testbeds, tools, and methodologies for cybersecurity experimentation; and cybersecurity education, policy, law, and regulation.

All manuscripts are subject to peer review on both technical merit and relevance to Computer's readership. Accepted papers will be professionally edited for content and style.

The guest editors for this special issue include Sherali Zeadally, University of the District of Columbia (; Gregorio Martinez, University of Murcia, Spain (; and Han-Chieh Chao, National Ilan University, Taiwan (

Paper submissions are due by 1 November 2012. For author guidelines and information on how to submit a manuscript electronically, visit

Computer seeks submissions for an October 2013 special issue on multicore memory coherence.

As we enter an era of large multi-cores, the question of efficiently supporting a shared memory model has become more important. Massively parallel architectures lacking coherent shared memory have enjoyed great success in niche applications such as 3D rendering, but general programming developers still demand the convenience of a shared memory abstraction.

Efficiently using a message passing interface requires that individual computation tasks be relatively large to overcome communication latencies. It becomes difficult to use MPI at the fine-grained level when fast on-chip communication is available. Higher-level mechanisms like MapReduce or shard-based databases are popular in particular application domains, though researchers have not yet efficiently applied them at the chip/node level.

This special issue will focus on approaches to providing scalable, shared memory at the on-chip level, paramount in a future where individual nodes will have on the order of 1,000 cores each.

Suggested topics include but are not limited to private and shared cache hierarchies; scalable memory coherence protocols, directory-based and otherwise; data layout and placement techniques; on-chip interconnects to support shared-memory abstractions; and hardware, software, and hybrid approaches.

Articles are due by 1 March 2013. Visit to view the complete call for papers.

Calls For Articles for IEEE CS Publications

IEEE Multimedia plans a July-September 2013 special issue on Web-scale near-duplicate search.

As bandwidth accessible to average users is increasing, audiovisual material has become the fastest-growing data type on the Internet. The impressive growth of the Social Web, where users can exchange user-generated content, contributes to the overwhelming number of multimedia files available. Among these huge volumes of data, there exist large numbers of near-duplicates and copies. File copies are easy to detect using hashes. Near-duplicates are based on the same original content but have been edited and postprocessed, resulting in different files. Another type of near-duplicate relates to footage about the same event or scene. The detection of near-duplicates poses a challenge to multimedia content analysis, especially when speed, scale, and copied fragment length are pushed to operational levels.

This special issue seeks innovative contributions dedicated to the theme of Web-scale near-duplicate search. Topics of interest include techniques and algorithms, near-duplicate and/or partial near-duplicate detection, cross-media search of near-duplicates, and semantic-based detection of near-duplicates.

Articles are due by 29 June 2012. Visit to view the complete call for papers.


August 2012

8-10 Aug: ChinaCom 2012, 7th Int'l ICST Conf. on Communications and Networking in China, Kunming, China;

8-10 Aug: IRI 2012, 13th IEEE Int'l Conf. on Information Reuse and Integration, Las Vegas, Nevada;

20-24 Aug: WICSA 2012, IEEE Conf. on Software Architecture, Helsinki;

26-29 Aug: ASONAM 2012, Int'l Conf. on Advances in Social Networks Analysis and Mining, Istanbul;

September 2012

22-26 Sep: PACT 2012, 21st Int'l Conf. on Parallel Architectures and Compilation Techniques, Minneapolis;

24-28 Sep: RE 2012, 20th IEEE Int'l Conf. on Requirements Eng., Chicago;

30 Sep-4 Oct: VL/HCC 2012, IEEE Symp. on Visual Languages and Human-Centric Computing, Innsbruck, Austria;

Submission Instructions

The Call and Calendar section lists conferences, symposia, and workshops that the IEEE Computer Society sponsors or cooperates in presenting.

Visit for instructions on how to submit conference or call listings as well as a more complete listing of upcoming computing-related conferences.

Events in 2012

July 2012

1-7 ICWS 2012

4-6 ICALT 2012

20-22 COMPSAC 2012

August 2012

8-10 ChinaCom 2012

8-10 IRI 2012

20-24 WICSA 2012

26-29 ASONAM 2012

September 2012

22-26 PACT 2012

24-28 RE 2012

30 Sep - 4 Oct VL/HCC 2012

IEEE RE 2012

The IEEE International Requirements Engineering Conference series is the premier international forum for researchers, educators, practitioners, and students to present and discuss recent innovations, trends, experiences and concerns in the field of requirements engineering.

Conference organizers have invited papers that address all facets of requirements engineering, from elicitation to validation, from formal to informal, and across people-, business-, and system-centric viewpoints. Topics of interest include the modeling of requirements, goals, and domains; social, cultural, global, personal, and cognitive factors; and the evolution of requirements over time, product families, and variability.

RE 2012 takes place 24-28 September in Chicago. Visit for complete conference information.

75 ms
(Ver 3.x)