Issue No.06 - June (2012 vol.45)
Published by the IEEE Computer Society
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MC.2012.199
Information about upcoming events of interest to IEEE Computer Society members.
Computer seeks submissions for a February 2013 special issue on the Internet of Things.
The IoT promises to be the most disruptive technological revolution since the advent of the World Wide Web. Projections indicate that up to 100 billion uniquely identifiable objects will be connected to the Internet by 2020, but human understanding of the underlying technologies has not kept pace. This creates a fundamental challenge to researchers, with enormous technical, socioeconomic, political, and even spiritual consequences.
"The Internet of Things: The Next Technological Revolution" offers a forum for highlighting what the IoT could bring to the end user. The editors welcome articles that feature a critical evaluation of the state of the art, insightful analysis of deployed IoT systems, and road maps for future IoT research.
Topics of interest include but are not limited to the design and development methodology for a user-centered IoT; the dynamics of social media and connected objects; community programming for the IoT, including citizen science, citizen journalism, and social activism; opportunistic sensing, big data, and the IoT; and the impact of the IoT on the future networked society.
Articles are due by 1 July 2012. Visit www.computer.org/portal/web/computingnow/cocfp02 to view the complete call for papers.
Computer seeks submissions for a May 2013 special issue on cutting-edge research in visualization.
It has been more than 25 years since the National Science Foundation Panel on Graphics, Image Processing, and Workstations published its landmark report, "Visualization in Scientific Computing." Since then, the field of visualization has expanded to encompass scientific visualization, information visualization, and visual analytics, as well as many other subfields.
This special issue will highlight major research challenges in this field. Authors should address a current cutting-edge research topic in visualization with regard to what researchers could or should achieve in the next 5, 10, or 15 years. This involves reflection on how such a research topic has evolved over the past 25 years as well as projections for future developments.
The guest editors particularly welcome articles that feature critical evaluation of the state of the art; scenario-based vision statements; insightful analysis of feasibility, major obstacles, expected paradigm shifts, and building blocks drawn from advances in other disciplines; and discussion of road maps and their expected impact on science, technology, and society.
Suggested research topics for submission include cognition in visualization, visualization literacy, visual analytics systems, and emerging challenges—for example, connectome datasets.
Articles should be understandable to a broad audience of computing science and engineering professionals. The writing should be practical and original, avoiding detailed discussions of individual theories, theorems, algorithms, or abstract concepts, and minimizing the use of mathematical notations and technical jargon. All manuscripts are subject to peer review on both technical merit and relevance to Computer's readership. Accepted papers will be professionally edited for content and style.
The guest editors for this special issue are independent visualization consultant Theresa-Marie Rhyne (email@example.com) and Min Chen of Oxford University (firstname.lastname@example.org).
Paper submissions are due by 1 October 2012. Please e-mail the guest editors a brief description of the article you plan to submit by 15 September 2012.
For author guidelines and information on how to submit a manuscript electronically, visit www.computer.org/portal/web/peerreviewmagazines/computer.
Computer seeks submissions for an April 2013 special issue on cybersecurity.
Cybersecurity is an emerging area of intense activity that endeavors to provide innovative solutions to ensure uninterrupted communications and service availability.
This special issue aims to disseminate the latest advances in cybersecurity that are critical in thwarting future threats, attacks, fraud, and damage. The content will focus on effective techniques and approaches that have the potential to ensure a safe, trustworthy, secure, and resilient cyberspace.
Appropriate topics of interest include but are not limited to cybersecurity approaches for protecting the critical infrastructure in public sectors (water, electricity, gas, transportation, and so on); cyberthreat modeling and analysis; solutions to mitigate cyber-attacks and cybercrime; cyberforensics; visual analytics and risk management techniques; testbeds, tools, and methodologies for cybersecurity experimentation; and cybersecurity education, policy, law, and regulation.
All manuscripts are subject to peer review on both technical merit and relevance to Computer's readership. Accepted papers will be professionally edited for content and style.
The guest editors for this special issue include Sherali Zeadally, University of the District of Columbia (email@example.com); Gregorio Martinez, University of Murcia, Spain (firstname.lastname@example.org); and Han-Chieh Chao, National Ilan University, Taiwan (email@example.com).
Paper submissions are due by 1 November 2012. For author guidelines and information on how to submit a manuscript electronically, visit www.computer.org/portal/web/peerreviewmagazines/computer.
Computer seeks submissions for an October 2013 special issue on multicore memory coherence.
As we enter an era of large multi-cores, the question of efficiently supporting a shared memory model has become more important. Massively parallel architectures lacking coherent shared memory have enjoyed great success in niche applications such as 3D rendering, but general programming developers still demand the convenience of a shared memory abstraction.
Efficiently using a message passing interface requires that individual computation tasks be relatively large to overcome communication latencies. It becomes difficult to use MPI at the fine-grained level when fast on-chip communication is available. Higher-level mechanisms like MapReduce or shard-based databases are popular in particular application domains, though researchers have not yet efficiently applied them at the chip/node level.
This special issue will focus on approaches to providing scalable, shared memory at the on-chip level, paramount in a future where individual nodes will have on the order of 1,000 cores each.
Suggested topics include but are not limited to private and shared cache hierarchies; scalable memory coherence protocols, directory-based and otherwise; data layout and placement techniques; on-chip interconnects to support shared-memory abstractions; and hardware, software, and hybrid approaches.
Articles are due by 1 March 2013. Visit www.computer.org/computer/cfp10 to view the complete call for papers.
Calls For Articles for IEEE CS Publications
IEEE Multimedia plans a July-September 2013 special issue on Web-scale near-duplicate search.
As bandwidth accessible to average users is increasing, audiovisual material has become the fastest-growing data type on the Internet. The impressive growth of the Social Web, where users can exchange user-generated content, contributes to the overwhelming number of multimedia files available. Among these huge volumes of data, there exist large numbers of near-duplicates and copies. File copies are easy to detect using hashes. Near-duplicates are based on the same original content but have been edited and postprocessed, resulting in different files. Another type of near-duplicate relates to footage about the same event or scene. The detection of near-duplicates poses a challenge to multimedia content analysis, especially when speed, scale, and copied fragment length are pushed to operational levels.
This special issue seeks innovative contributions dedicated to the theme of Web-scale near-duplicate search. Topics of interest include techniques and algorithms, near-duplicate and/or partial near-duplicate detection, cross-media search of near-duplicates, and semantic-based detection of near-duplicates.
Articles are due by 29 June 2012. Visit www.computer.org/portal/web/computingnow/2013/mmcfp3 to view the complete call for papers.
8-10 Aug: ChinaCom 2012, 7th Int'l ICST Conf. on Communications and Networking in China, Kunming, China; http://awtrc.ict.ac.cn/uploads/homepage/index.html
8-10 Aug: IRI 2012, 13th IEEE Int'l Conf. on Information Reuse and Integration, Las Vegas, Nevada; www.sis.pitt.edu/~iri2012/index.html
20-24 Aug: WICSA 2012, IEEE Conf. on Software Architecture, Helsinki; www.wicsa.net
26-29 Aug: ASONAM 2012, Int'l Conf. on Advances in Social Networks Analysis and Mining, Istanbul; www.asonam2012.etu.edu.tr
22-26 Sep: PACT 2012, 21st Int'l Conf. on Parallel Architectures and Compilation Techniques, Minneapolis; www.pactconf.org
24-28 Sep: RE 2012, 20th IEEE Int'l Conf. on Requirements Eng., Chicago; http://crisys.cs.umn.edu/re2012
30 Sep-4 Oct: VL/HCC 2012, IEEE Symp. on Visual Languages and Human-Centric Computing, Innsbruck, Austria; www.ispass.org/ispass2012