marf-devel Mailing List for Modular Audio Recognition Framework (Page 2)
Brought to you by:
mokhov
You can subscribe to this list here.
2002 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(50) |
Oct
(16) |
Nov
(124) |
Dec
(196) |
---|---|---|---|---|---|---|---|---|---|---|---|---|
2003 |
Jan
(29) |
Feb
(12) |
Mar
(1) |
Apr
|
May
(4) |
Jun
(1) |
Jul
|
Aug
|
Sep
(1) |
Oct
|
Nov
|
Dec
|
2004 |
Jan
(2) |
Feb
(1) |
Mar
|
Apr
|
May
(1) |
Jun
|
Jul
|
Aug
(1) |
Sep
|
Oct
(1) |
Nov
|
Dec
|
2005 |
Jan
|
Feb
(3) |
Mar
|
Apr
|
May
|
Jun
(10) |
Jul
(14) |
Aug
(24) |
Sep
(1) |
Oct
(8) |
Nov
(5) |
Dec
(13) |
2006 |
Jan
(10) |
Feb
(8) |
Mar
(10) |
Apr
|
May
(5) |
Jun
(6) |
Jul
(5) |
Aug
(8) |
Sep
(12) |
Oct
(2) |
Nov
(5) |
Dec
(2) |
2007 |
Jan
(10) |
Feb
(5) |
Mar
(4) |
Apr
(11) |
May
(2) |
Jun
(4) |
Jul
|
Aug
|
Sep
(4) |
Oct
(2) |
Nov
(4) |
Dec
(1) |
2008 |
Jan
(2) |
Feb
(3) |
Mar
(8) |
Apr
(5) |
May
(2) |
Jun
|
Jul
|
Aug
(18) |
Sep
(4) |
Oct
(4) |
Nov
(1) |
Dec
|
2009 |
Jan
(1) |
Feb
(1) |
Mar
(4) |
Apr
(2) |
May
(5) |
Jun
(2) |
Jul
(6) |
Aug
|
Sep
|
Oct
(1) |
Nov
(2) |
Dec
(1) |
2010 |
Jan
(2) |
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
(3) |
Aug
(1) |
Sep
|
Oct
|
Nov
|
Dec
|
2011 |
Jan
(1) |
Feb
(3) |
Mar
(3) |
Apr
(1) |
May
(2) |
Jun
(5) |
Jul
(3) |
Aug
(2) |
Sep
(1) |
Oct
(3) |
Nov
|
Dec
(3) |
2012 |
Jan
|
Feb
|
Mar
(3) |
Apr
|
May
|
Jun
|
Jul
|
Aug
(2) |
Sep
(2) |
Oct
|
Nov
|
Dec
|
2013 |
Jan
|
Feb
|
Mar
|
Apr
|
May
(1) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2014 |
Jan
(1) |
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2015 |
Jan
(2) |
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2016 |
Jan
(2) |
Feb
|
Mar
|
Apr
|
May
(1) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
From: Serguei A. M. <mo...@cs...> - 2011-06-07 03:14:25
|
Hi Harel, Zach, This has been brought up before, but there were simply no man/hours available to actually do the job (I am extremely busy with my PhD and other things). There is nothing in MARF itself that prevents you from accomplishing the task. MARF itself is a collection and a testing platform for various algorithms to be used in the pattern recognition pipeline in order to select the best suited for the task and use it afterward. However, to do what you want to do you'd have to put a lot of load on the application itself which uses MARF. The application would contain the business logic necessary to do the search and call on MARF when needed. Like SpeakerIdentApp is a sample MARF application to do a task of speaker biometrics, you have to build an equivalent for pattern search of the desired fingerprint. That means of course you'd have to have the reference music available somewhere. Then go through the stream in chunks and compute either the smallest distance or highest cosine similarity score after certain threshold of each chunk to your fingerprint, when found there is a strong liklihood of the match. Another way, is to convert both the song and fingerprint into the frequency domain from the time domain, and see of the fingerprints' frequencies appear in the song -- in this latter case you don't need to do stream pattern analysis, but can just accumulate the spectrum of the entire song e.g. using FFT. The more details are needed, the larger the FFT window should be (e.g. 1024 or more instead of default 512). You may also need to increase the quality of the sampling frequency in the WAVLoader (the default is 8 kHz, which is an analog phone line quality) to something significantly higher. -s On Fri, 3 Jun 2011, Zachary Kosarik wrote: > Date: Fri, 3 Jun 2011 16:55:02 -0400 > > Hey, > I have never personally tested anything like that, however MARF uses bit > pattern recognition, which when audio is broken down that is all it is. So > in theory if you had a database of songs and they're bit patterns you could > easily use marf to get the patterns and then match them. If you are trying > to do this live i.e. record on mic and then compare the results are going to > vary greatly depending on background noise and scilence gaps. But to answer > your question yes I believe it can be done, but I'm not entirely sure how to > go about it. > > Hope I helped a little, > Zach > > On Sat, May 28, 2011 at 8:37 AM, •HΛ®əŁ° < > mar...@li...> wrote: > > > > > > > Hi, > > Is it possible to use MARF as an 'Audio Search Algorithm' a bit like Shazam > > & SoundHound for creating a searchable audio fingerprint for a song? > > > > Best regards, > > > > •HΛ®əŁ° -- Serguei A. Mokhov, PhD Candidate | /~\ The ASCII Computer Science and Software Engineering & | \ / Ribbon Campaign Concordia Institute for Information Systems Engineering | X Against HTML Concordia University, Montreal, Quebec, Canada | / \ Email! |
From: Serguei A. M. <mo...@cs...> - 2011-06-07 02:58:04
|
Hi Sean, On Mon, 6 Jun 2011, Sean Liu wrote: > Date: Mon, 06 Jun 2011 19:50:32 +0800 > > Hi, > > I am not sure if you are actively working on the project any more. I > hope you are. Yes, I am. I just lag horribly behind in updating the status and pages as I am terribly busy with my PhD among other things. I do maintain, use, and publish using MARF, however. At lease sporradically. Most recently in MARFCAT. > When I used your sample wave files, every thing works as exactly as you > wrote in the manual document. > > But when I changed to use my own set of wave files, the accuracy > dramatically dropped, I do have a lot more data than yours though. How much more data and what's the drop? > Have you ever tried to use different set of data, especially more data? Yes. I tried all kinds of stuff -- audio, text, images, binary files, and all kinds of experiments. However, you'd need to open up a bit more on the details of your setup. There are many factors that can contribute to good or poor recognition accuracy. - sample frequency? (8 kHz, 16 kHz?) - PCM data (2 bytes, more, less, which endian?) - sample quality is it realitively uniform? - do you do noise and silence removal (-noise, -silence options) - how many samples are used to train per class and test per class? (class ~ e.g. speaker, gender, etc.) - are you using mean clusters (the default), median clustering, or plain feature vectors? - ... A lot depends on correct data loading, interpretation, preprocessing, before feature extraction and classification. Also, if you mislabel your training data, you are in for trouble too (I am not sure how much data you actually have and if your labeling of them is correct). Also, please try the most recent version of MARF from the CVS itself; there's been bugs (or if you are using a .jar then pick the one from the recently released app). > And how was the performance if you did? Variable. For images it was relatively poor. For audio (voice), text and binaries it was much better. Here are some works describing experiments done at various times and diversity. You can just skip over to the result tables and then come back for a brief read about the experiments themselves. http://dx.doi.org/10.1145/1370256.1370262 http://arxiv.org/abs/1010.2511 http://www.intechopen.com/download/pdf/pdfs_id/12131 http://subs.emis.de/LNI/Proceedings/Proceedings140/gi-proc-140-007.pdf http://arxiv.org/abs/1006.3787 http://arxiv.org/abs/0912.5502 > Thanks, > > Sean Liu -- Serguei A. Mokhov, PhD Candidate | /~\ The ASCII Computer Science and Software Engineering & | \ / Ribbon Campaign Concordia Institute for Information Systems Engineering | X Against HTML Concordia University, Montreal, Quebec, Canada | / \ Email! |
From: Zachary K. <zj...@gm...> - 2011-06-07 00:04:37
|
Hey, I have never personally tested anything like that, however MARF uses bit pattern recognition, which when audio is broken down that is all it is. So in theory if you had a database of songs and they're bit patterns you could easily use marf to get the patterns and then match them. If you are trying to do this live i.e. record on mic and then compare the results are going to vary greatly depending on background noise and scilence gaps. But to answer your question yes I believe it can be done, but I'm not entirely sure how to go about it. Hope I helped a little, Zach On Sat, May 28, 2011 at 8:37 AM, •HΛ®əŁ° < mar...@li...> wrote: > > > Hi, > Is it possible to use MARF as an 'Audio Search Algorithm' a bit like Shazam > & SoundHound for creating a searchable audio fingerprint for a song? > > Best regards, > > •HΛ®əŁ° > ---------------------------------------------------------- > Simplify data backup and recovery for your virtual environment with > vRanger. > Installation's a snap, and flexible recovery options mean your data is > safe, > secure and there when you need it. Data protection magic? > Nope - It's vRanger. Get your free trial download today. > http://p.sf.net/sfu/quest-sfdev2dev > _______________________________________________ > marf-devel mailing list > mar...@li... > https://lists.sourceforge.net/lists/listinfo/marf-devel > __._,_.___ > Reply to sender<mar...@li...?subject=Re%3A%20%5Bmarf-dev%5D%20Hi%20%3A%29>| Reply > to group<mar...@ya...?subject=Re%3A%20%5Bmarf-dev%5D%20Hi%20%3A%29>| Reply > via web post<http://groups.yahoo.com/group/marf-archive/post;_ylc=X3oDMTJwbmNodHZiBF9TAzk3MzU5NzE0BGdycElkAzE2Njg3MTE3BGdycHNwSWQDMTcwODU2ODc2NgRtc2dJZAMyNDAEc2VjA2Z0cgRzbGsDcnBseQRzdGltZQMxMzA2ODY2MTgy?act=reply&messageNum=240>| Start > a New Topic<http://groups.yahoo.com/group/marf-archive/post;_ylc=X3oDMTJmdmw2bHNtBF9TAzk3MzU5NzE0BGdycElkAzE2Njg3MTE3BGdycHNwSWQDMTcwODU2ODc2NgRzZWMDZnRyBHNsawNudHBjBHN0aW1lAzEzMDY4NjYxODI-> > Messages in this topic<http://groups.yahoo.com/group/marf-archive/message/240;_ylc=X3oDMTMzamVqa21vBF9TAzk3MzU5NzE0BGdycElkAzE2Njg3MTE3BGdycHNwSWQDMTcwODU2ODc2NgRtc2dJZAMyNDAEc2VjA2Z0cgRzbGsDdnRwYwRzdGltZQMxMzA2ODY2MTgyBHRwY0lkAzI0MA-->( > 1) > Recent Activity: > > > Visit Your Group<http://groups.yahoo.com/group/marf-archive;_ylc=X3oDMTJmamE5aTVnBF9TAzk3MzU5NzE0BGdycElkAzE2Njg3MTE3BGdycHNwSWQDMTcwODU2ODc2NgRzZWMDdnRsBHNsawN2Z2hwBHN0aW1lAzEzMDY4NjYxODI-> > [image: Yahoo! Groups]<http://groups.yahoo.com/;_ylc=X3oDMTJlaXIzYzFwBF9TAzk3MzU5NzE0BGdycElkAzE2Njg3MTE3BGdycHNwSWQDMTcwODU2ODc2NgRzZWMDZnRyBHNsawNnZnAEc3RpbWUDMTMwNjg2NjE4Mg--> > Switch to: Text-Only<mar...@ya...?subject=Change+Delivery+Format:+Traditional>, > Daily Digest<mar...@ya...?subject=Email+Delivery:+Digest>• > Unsubscribe <mar...@ya...?subject=Unsubscribe>• Terms > of Use <http://docs.yahoo.com/info/terms/> > . > > __,_._,___ > |
From: Sean L. <sea...@gm...> - 2011-06-06 11:50:57
|
Hi, I am not sure if you are actively working on the project any more. I hope you are. When I used your sample wave files, every thing works as exactly as you wrote in the manual document. But when I changed to use my own set of wave files, the accuracy dramatically dropped, I do have a lot more data than yours though. Have you ever tried to use different set of data, especially more data? And how was the performance if you did? Thanks, Sean Liu |
From: •HΛ®əŁ° <har...@gm...> - 2011-05-28 12:37:49
|
Hi, Is it possible to use MARF as an 'Audio Search Algorithm' a bit like Shazam & SoundHound for creating a searchable audio fingerprint for a song? Best regards, •HΛ®əŁ° |
From: SourceForge.net <no...@so...> - 2011-05-04 11:04:42
|
The following forum message was posted by deviljul at http://sourceforge.net/projects/marf/forums/forum/213052/topic/4515730: Hey, I wonder if MARF is the right choice for me. What I want to do: First two speakers tell where name. Afterwards I have a continuous audio input (from a microphone). In this audio input the names of the two speakers should be detected and be printed out. Is MARF the right choise? Because I always read about testing and training data, I would not have this, just two diffrent inputs. Thanks, Julia |
From: SourceForge.net <no...@so...> - 2011-04-12 07:03:05
|
The following forum message was posted by Anonymous at http://sourceforge.net/projects/marf/forums/forum/213052/topic/4480063: Hi, I don't understand how to enframe,how long a frame is in the FFT int MARF Framework. Could you explain for me or give some reference in the MARF? Thank you! Marshalf |
From: SourceForge.net <no...@so...> - 2011-03-22 09:03:13
|
The following forum message was posted by apurvtiwari at http://sourceforge.net/projects/marf/forums/forum/213052/topic/4423003: hi, I am pretty new to this whole voice/speech recognition concept. Having gone through a couple of threads here on the forum on the fact that MARF (unlike CMUSphinx) doesn't recognise text from speech. From whatever I have read about speech recognition, it's all about computing the most "likely" utterance using n-gram (di-gram being the most popular as it seems) model. So how does MARF recognise speech without the text dictionary? MARF also seems to have speaker independent recognition applications. Is this similar to [url=http://www.soundhound.com/index.php?action=s.sound2sound]Sound2S ound[/url] Technology? If so, can someone point me to a place where I can read more about the procedures employed in achieving this? Secondly, what is the success rate of MARF currently? Thanks in advance, AT |
From: Serguei A. M. on b. of PST-1. <mo...@cs...> - 2011-03-20 19:26:00
|
[ Apologies if you receive multiple copies of this announcement. Please pass it on to your colleagues and students who might be interested in contributing. ] NOTICE: due to several received requests, we extended the paper submission deadline to April 3, 2011. Ninth Annual Conference on Privacy, Security and Trust ------------------------------------------------------ July 19--21, 2011 Montreal, Quebec, Canada http://www.unb.ca/pstnet/pst2011 Call for Papers --------------- The PST2011 International Conference on Privacy, Security and Trust (PST) is being held in Montreal, Quebec, Canada, July 19-21, 2011. PST2011 is the ninth such annual conference focusing on PST technologies. PST2011 provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation. EasyChair submission link of PST 2011: http://www.easychair.org/conferences/?conf=pst2011. IMPORTANT DATES: ---------------- Submission Deadline: April 3, 2011 (new) Notification of Acceptance: May 16, 2011 (new) Final Manuscript Due: May 22, 2011 PST2011 will include an Innovation Day featuring workshops and tutorials followed by two days of high-quality research papers whose topics include, but are NOT limited to, the following: * Privacy Preserving / Enhancing Technologies * Trust Technologies, Technologies for Building Trust in e-Business Strategy * Critical Infrastructure Protection * Observations of PST in Practice, Society, Policy and Legislation * Network and Wireless Security * Digital Rights Management * Operating Systems Security * Identity and Trust management * Intrusion Detection Technologies * PST and Cloud Computing * Secure Software Development and Architecture * Human Computer Interaction and PST * PST Challenges in e-Services, e.g. e-Health, e-Government, e-Commerce * Implications of, and Technologies for, Lawful Surveillance * Network Enabled Operations * Biometrics, National ID Cards, Identity Theft * Digital forensics * PST and Web Services / SOA * Information Filtering, Data Mining & Knowledge from Data * Privacy, Traceability, and Anonymity * National Security and Public Safety * Trust and Reputation in Self-Organizing Environments * Security Metrics * Anonymity and Privacy vs. Accountability * Recommendation, Reputation and Delivery Technologies * Access Control and Capability Delegation * Continuous Authentication * Representations and Formalizations of Trust in Electronic and Physical Social Systems High-quality papers in all PST related areas that, at the time of submission, are not under review and have not already been published or accepted for publications elsewhere are solicited. Accepted papers will either be accepted as regular papers up to 8 pages and with oral presentations, or short papers of up to 2 pages with poster presentations. Up to 2 additional pages will be allowed in each category with over-length charges. The standard IEEE two-column conference format should be used for all submissions. A copy of the IEEE Manuscript Templates for Microsoft Word or LaTeX and additional information about paper submission and conference topics and events can be found at the conference web site. All accepted papers will be published in the conference proceedings and by IEEE and will be accessible via IEEE Xplore Digital Library. Best Paper and Best Student Paper awards will be presented. Some travel grants to students who are presenting their work in the conference will also be made available. Organizing Committee -------------------- Honorary Conference Chair: Andrew Vallerand, Director S&T Public Security, National Defense, Canada General Co-Chairs: Mourad Debbabi, Concordia University, Canada Amr M. Youssef, Concordia University, Canada Program Co-Chairs: Frederic Cuppens (Privacy), ENST-Bretagne, France Natalia Stakhanova (Security), University of South Alabama, USA Jianying Zhou (Trust), Institute for Infocomm Research, Singapore Workshop & Tutorial Chair: Ali Miri, Ryerson University, Canada Poster Session Chair: Franois Cosquer, Alcatel Lucent, France Publication & Publicity Chairs: Indrajit Ray, Colorado State University, USA Carlisle Adams, University of Ottawa, Canada PST Steering Committee Chair: Ali Ghorbani, University of New Brunswick, Canada Conference Manager: Greg Sprague, National Research Council, Canada Local Arrangements: Benjamin Fung, Concordia University, Canada Webmaster: Ilia Goldfarb, National Research Council, Canada Finance and Registration: Linda Vienneau, National Research Council, Canada Privacy Theme ------------- Privacy concerns the operational policies, procedures and regulations implemented within an information system to control for the unauthorized use of, access to, or release of personal information held in any format. Topics of interest in this theme include (but are not limited to): * privacy preserving/enhancing technologies * identity management and biometrics * privacy and ubiquitous computing, e.g. RFIDs * reputation, privacy and communities * e-health and privacy * anonymity and medical research * employee privacy and network administration * privacy and location-based technologies and services * privacy and traceability * spyware and stalking * anonymity, pseudonimity and accountability * responding to hate speech, flaming and trolls * privacy and emergency management policies and technologies * vulnerable online users and privacy sensitization * evolving nature of lawful surveillance * smart cards and privacy * identity theft and management * privacy audits and risk analysis * evolving role of privacy officers Privacy Theme Chair: Frederic Cuppens, TELECOM Bretagne, France Privace Theme Committee: Sushil Jajodia, George Mason University, USA Vijay Atluri, Rutgers University, USA Joaquin Garcia-Alfaro, Telecom Bretagne, France Nora Cuppens-Boulahia, Telecom Bretagne, France Alban Gabillon, Universit de la Polynsie Franaise, France Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain Ernesto Damiani, Universit degli Studi di Milano, Italy Ehud Gudes, Ben-Gurion University, Israel Carlisle Adams, University of Ottawa Esma Aimeur, University of Montreal Norm Archer, McMaster University Debra Grant, Office of the Information and Privacy Commissioner of Canada Steve Johnston, Office of the Privacy Commissioner of Canada Bradley Malin, Vanderbilt University Jian Pei, Simon Fraser University Teresa Scassa, University of Ottawa Jean-Marc Seigneur, University of Geneva Lisa Singh, Georgetown University Traian Truta, Northern Kentucky University Jens Weber, University of Victoria Security Theme -------------- Security addresses the various components of an information system that safeguard the data and associated infrastructure from unauthorized activity. Topics of interest in this theme include, but are not limited to: * access control * adaptive security and system management * analysis of network and security protocols * applications of cryptographic techniques * attacks against networks and machines * authentication and authorization of users, systems, and applications * botnets * critical infrastructure security * firewall technologies * forensics and diagnostics for security * intrusion and anomaly detection and prevention * malicious code analysis, anti-virus, anti-spyware * network infrastructure security * operating system security * public safety and emergency management * security architectures * security in heterogeneous and large-scale environments * techniques for developing secure systems * web security * wireless and pervasive/ubiquitous computing security Security Theme Chair: Natalia Stakhanova, University of South Alabama, USA Security Theme Committee: Michel Barbeau, Carleton University, Canada Mike Burmester, Florida State University, US Alvaro A. Cardenas, Fujitsu Laboratories, US Anton Chuvakin, Security Warrior Consulting, US Mathieu Couture, CRC, Canada Jose M. Fernandez, Ecole Polytechnique, Montreal, Canada Thorsten Holz, Ruhr-University Bochum, Germany Mohammed Houssaini Sqalli, King Fahd University of Petroleum & Minerals, Saudi Arabia H. Gunes Kayacik, Carleton University, Canada David Lie, University of Toronto, Canada Wei Lu, Keene State College, US Xinming Ou, Kansas State University, US Maria Papadaki, University of Plymouth, UK Nadia Tawbi, Universit Laval, Canada Julie Thorpe, University of Ontario Institute of Technology, Canada Issa Traore, University of Victoria, Canada Isaac Woungang, Ryerson University, Canada Alec Yasinsac, University of South Alabama, US Nur Zincir-Heywood, Dalhousie University, Canada Trust Theme ----------- Trust is a fundamental human behavior. It is necessary for people to function in social groups, and it forms the foundation for many of our organizations and relationships. The conference solicits original papers on any topic related to the personal, social, and economic aspects of trust. Topics of interest in this theme include (but are not limited to): * trust models * components and dimensions of trust * game theory and trusting behaviors * trust and risk * trust, regret, and forgiveness * perceptions of trustworthiness * trust management * automating trust decisions * attacks on trust * trust influences on security and privacy * economic drivers for trustworthy systems * cross-cultural differences * computing about trust * applications of trust * trust and economics * trust in e-commerce * reputation systems Trust Theme Chair: Jianying Zhou, Institute for Infocomm Research, Singapore Trust Theme Committee: Habtamu Abie, Norwegian Computing Center, Norway Claudio Agostino Ardagna, Universit degli Studi di Milano, Italy Robin Cohen, University of Waterloo, Canada Rino Falcone, National Research Council, Italy Jordi Forne, UPC, Spain Xinyi Huang, I2R, Singapore Steve Kremer, INRIA, France Costas Lambrinoudakis, University of Piraeus, Greece Albert Levi, Sabanci University, Turkey Hui Li, Xidian University, China Joseph Liu, I2R, Singapore Sangjae Moon, Kyungpook National University, Korea Yuko Murayama, Iwate Prefectural University, Japan Jose Onieva, University of Malaga, Spain Rolf Oppliger, eSECURITY Technologies, Switzerland Gunther Pernul, Universitt Regensburg, Germany Pierangela Samarati, Universit degli Studi di Milano, Italy Guilin Wang, University of Wollongong, Australia Yunlei Zhao, Fudan University, China Partners / Sponsors ------------------- * NRC-CNRC Canada * University of New Brunswick, Canada * Information Security Center of eXcellence (ISCX) * Concordia University, Montreal, Canada * National Cyberforensics and Training Alliance (NCFTA), Canada PST'11 |
From: Serguei A. M. on b. of PST-1. <mo...@cs...> - 2011-03-12 00:54:09
|
[ Apologies if you receive multiple copies of this announcement. Please pass it on to your colleagues and students who might be interested in contributing. ] Ninth Annual Conference on Privacy, Security and Trust ------------------------------------------------------ July 19-21, 2011 Montreal, Quebec, Canada http://www.unb.ca/pstnet/pst2011 Call for Papers --------------- The PST2011 International Conference on Privacy, Security and Trust (PST) is being held in Montreal, Quebec, Canada, July 19-21, 2011. PST2011 is the ninth such annual conference focusing on PST technologies. PST2011 provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation. EasyChair submission link of PST 2011: http://www.easychair.org/conferences/?conf=pst2011. IMPORTANT DATES: ---------------- Submission Deadline: March 20, 2011 Notification of Acceptance: May 9, 2011 Final Manuscript Due: May 22, 2011 PST2011 will include an Innovation Day featuring workshops and tutorials followed by two days of high-quality research papers whose topics include, but are NOT limited to, the following: * Privacy Preserving / Enhancing Technologies * Trust Technologies, Technologies for Building Trust in e-Business Strategy * Critical Infrastructure Protection * Observations of PST in Practice, Society, Policy and Legislation * Network and Wireless Security * Digital Rights Management * Operating Systems Security * Identity and Trust management * Intrusion Detection Technologies * PST and Cloud Computing * Secure Software Development and Architecture * Human Computer Interaction and PST * PST Challenges in e-Services, e.g. e-Health, e-Government, e-Commerce * Implications of, and Technologies for, Lawful Surveillance * Network Enabled Operations * Biometrics, National ID Cards, Identity Theft * Digital forensics * PST and Web Services / SOA * Information Filtering, Data Mining & Knowledge from Data * Privacy, Traceability, and Anonymity * National Security and Public Safety * Trust and Reputation in Self-Organizing Environments * Security Metrics * Anonymity and Privacy vs. Accountability * Recommendation, Reputation and Delivery Technologies * Access Control and Capability Delegation * Continuous Authentication * Representations and Formalizations of Trust in Electronic and Physical Social Systems High-quality papers in all PST related areas that, at the time of submission, are not under review and have not already been published or accepted for publications elsewhere are solicited. Accepted papers will either be accepted as regular papers up to 8 pages and with oral presentations, or short papers of up to 2 pages with poster presentations. Up to 2 additional pages will be allowed in each category with over-length charges. The standard IEEE two-column conference format should be used for all submissions. A copy of the IEEE Manuscript Templates for Microsoft Word or LaTeX and additional information about paper submission and conference topics and events can be found at the conference web site. All accepted papers will be published in the conference proceedings and by IEEE and will be accessible via IEEE Xplore Digital Library. Best Paper and Best Student Paper awards will be presented. Some travel grants to students who are presenting their work in the conference will also be made available. Organizing Committee -------------------- Honorary Conference Chair: Andrew Vallerand, Director S&T Public Security, National Defense, Canada General Co-Chairs: Mourad Debbabi, Concordia University, Canada Amr M. Youssef, Concordia University, Canada Program Co-Chairs: Frederic Cuppens (Privacy), ENST-Bretagne, France Natalia Stakhanova (Security), University of South Alabama, USA Jianying Zhou (Trust), Institute for Infocomm Research, Singapore Workshop & Tutorial Chair: Ali Miri, Ryerson University, Canada Poster Session Chair: Franois Cosquer, Alcatel Lucent, France Publication & Publicity Chair: Indrajit Ray, Colorado State University, USA Carlisle Adams, University of Ottawa, Canada PST Steering Committee Chair: Ali Ghorbani, University of New Brunswick, Canada Conference Manager: Greg Sprague, National Research Council, Canada Local Arrangements: Benjamin Fung, Concordia University, Canada Webmaster: Ilia Goldfarb, National Research Council, Canada Finance and Registration: Linda Vienneau, National Research Council, Canada Privacy Theme ------------- Privacy concerns the operational policies, procedures and regulations implemented within an information system to control for the unauthorized use of, access to, or release of personal information held in any format. Topics of interest in this theme include (but are not limited to): * privacy preserving/enhancing technologies * identity management and biometrics * privacy and ubiquitous computing, e.g. RFIDs * reputation, privacy and communities * e-health and privacy * anonymity and medical research * employee privacy and network administration * privacy and location-based technologies and services * privacy and traceability * spyware and stalking * anonymity, pseudonimity and accountability * responding to hate speech, flaming and trolls * privacy and emergency management policies and technologies * vulnerable online users and privacy sensitization * evolving nature of lawful surveillance * smart cards and privacy * identity theft and management * privacy audits and risk analysis * evolving role of privacy officers Privacy Theme Chair: Frederic Cuppens, TELECOM Bretagne, France Privace Theme Committee: Sushil Jajodia, George Mason University, USA Vijay Atluri, Rutgers University, USA Joaquin Garcia-Alfaro, Telecom Bretagne, France Nora Cuppens-Boulahia, Telecom Bretagne, France Alban Gabillon, Universit de la Polynsie Franaise, France Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain Ernesto Damiani, Universit degli Studi di Milano, Italy Ehud Gudes, Ben-Gurion University, Israel Carlisle Adams, University of Ottawa Esma Aimeur, University of Montreal Norm Archer, McMaster University Debra Grant, Office of the Information and Privacy Commissioner of Canada Steve Johnston, Office of the Privacy Commissioner of Canada Bradley Malin, Vanderbilt University Jian Pei, Simon Fraser University Teresa Scassa, University of Ottawa Jean-Marc Seigneur, University of Geneva Lisa Singh, Georgetown University Traian Truta, Northern Kentucky University Jens Weber, University of Victoria Security Theme -------------- Security addresses the various components of an information system that safeguard the data and associated infrastructure from unauthorized activity. Topics of interest in this theme include (but are not limited to): * access control * adaptive security and system management * analysis of network and security protocols * applications of cryptographic techniques * attacks against networks and machines * authentication and authorization of users, systems, and applications * botnets * critical infrastructure security * firewall technologies * forensics and diagnostics for security * intrusion and anomaly detection and prevention * malicious code analysis, anti-virus, anti-spyware * network infrastructure security * operating system security * public safety and emergency management * security architectures * security in heterogeneous and large-scale environments * techniques for developing secure systems * web security * wireless and pervasive/ubiquitous computing security Security Theme Chair: Natalia Stakhanova, University of South Alabama, USA Security Theme Committee: Michel Barbeau, Carleton University, Canada Mike Burmester, Florida State University, US Alvaro A. Cardenas, Fujitsu Laboratories, US Anton Chuvakin, Security Warrior Consulting, US Mathieu Couture, CRC, Canada Jos M. Fernandez, Ecole Polytechnique, Montreal, Canada Thorsten Holz, Ruhr-University Bochum, Germany Mohammed Houssaini Sqalli, King Fahd University of Petroleum & Minerals, Saudi Arabia H. Gunes Kayacik, Carleton University, Canada David Lie, University of Toronto, Canada Wei Lu, Keene State College, US Xinming Ou, Kansas State University, US Maria Papadaki, University of Plymouth, UK Nadia Tawbi, Universit Laval, Canada Julie Thorpe, University of Ontario Institute of Technology, Canada Issa Traore, University of Victoria, Canada Isaac Woungang, Ryerson University, Canada Alec Yasinsac, University of South Alabama, US Nur Zincir-Heywood, Dalhousie University, Canada Trust Theme ----------- Trust is a fundamental human behavior. It is necessary for people to function in social groups, and it forms the foundation for many of our organizations and relationships. The conference solicits original papers on any topic related to the personal, social, and economic aspects of trust. Topics of interest in this theme include (but are not limited to): * trust models * components and dimensions of trust * game theory and trusting behaviors * trust and risk * trust, regret, and forgiveness * perceptions of trustworthiness * trust management * automating trust decisions * attacks on trust * trust influences on security and privacy * economic drivers for trustworthy systems * cross-cultural differences * computing about trust * applications of trust * trust and economics * trust in e-commerce * reputation systems Trust Theme Chair: Jianying Zhou, Institute for Infocomm Research, Singapore Trust Theme Committee: Habtamu Abie, Norwegian Computing Center, Norway Claudio Agostino Ardagna, Universit degli Studi di Milano, Italy Robin Cohen, University of Waterloo, Canada Rino Falcone, National Research Council, Italy Jordi Forne, UPC, Spain Xinyi Huang, I2R, Singapore Steve Kremer, INRIA, France Costas Lambrinoudakis, University of Piraeus, Greece Albert Levi, Sabanci University, Turkey Hui Li, Xidian University, China Joseph Liu, I2R, Singapore Sangjae Moon, Kyungpook National University, Korea Yuko Murayama, Iwate Prefectural University, Japan Jose Onieva, University of Malaga, Spain Rolf Oppliger, eSECURITY Technologies, Switzerland Gunther Pernul, Universitt Regensburg, Germany Pierangela Samarati, Universit degli Studi di Milano, Italy Guilin Wang, University of Wollongong, Australia Yunlei Zhao, Fudan University, China Partners / Sponsors ------------------- * NRC-CNRC Canada * University of New Brunswick, Canada * Information Security Center of eXcellence (ISCX) * Concordia University, Montreal, Canada * National Cyberforensics and Training Alliance (NCFTA), Canada PST'11 |
From: Halina M. <ha...@en...> - 2011-02-28 20:23:53
|
C3S2E'11P: - Graduate Student Poster/Demo Competition Fourth International C* Conference on Computer Science & Software Engineering CALL FOR POSTERS/DEMOS, POSITION PAPERS C3S2E11 is the fourth in a series of international conferences to address the need of the academic community in computing science and software engineering. The objective of C3S2E is to meet annually to exchange ideas on the continuing need to address the new challenges both from the theoretical as well as application aspects of computing and engineering of software systems. C3S2E encourages the participation of practitioners from governmental and non-governmental agencies, industries, and academia. The CFP for the main event is over; however this call is in progress. For more details, please see the CFP web site: confsys.encs.concordia.ca/c3s2e/c3se2-11p C3S2E11P: Poster & Demos Competition This is an integral part of C3S2E11. In the demo/poster session, graduate students are invited to compete by presenting their work in progress either as a poster or a demo. The students have a chance to orally present their work and answer questions. The length of a poster paper and demo proposal for review purpose would be 5-7 pages. However, the final version is limited to 3 pages in the ACM proceedings format. All submissions would be reviewed and the student authors of at most 10 highest scoring submissions would have their registration fees waived. In case there are multiple student authors only one student per such poster/demo paper is eligible for the registration fee waiver. Faculty advisers are not eligible for the fee waiver. The student's adviser could be a co:author of a poster paper or demo proposal, however, if the poster paper/demo is accepted, the student is required to register and participate. Poster papers and demo papers would be published as part of the proceedings. Conference Publication The conference proceedings will be published by BytePress/ACM and would be added to ACM's Digital Library. All submissions would also be invited to publish their papers in the CINDI Digital Library. Important Dates All the dates are given on the milestone page on ConfSys for C3S2E11P(accessible to signed-in users of ConfSys). The following are the salient ones: Deadline*(details, abstract and place holders): 2011-02-21 Position papers, Poster and Demos submission deadline: 2011-03-14 Acceptance notice: 2011-04-07 Camera-ready copies deadline: 2011-04-18 Conference dates: 2011-05-16 -- 2011-05-18 Please visit the ConfSys (https://confsys.encs.concordia.ca/ConfSys) web sites for further instructions. ConfSys is used to manage all administrative functions of the conference. Organized by Concordia University, Montreal, Canada; with the cooperation of ACM, and BytePress General Chair: Bipin C. Desai (Concordia University, Montreal, Canada) Local Organization Concordia University, Montreal, Canada Program Chairs: Alain Abran: ETS - Univ. du Quebec (Canada) Sudhir Mudur(Concordia University) ConfSys is used to manage all administrative functions of the conference (sign-up, submissions, results, registrations, final upload, presentation-slide uploads etc.) https://confsys.encs.concordia.ca/ConfSys Note: for the secure site you need to accept our self-signed certificate. The non-secure ConfSys site is http://confsys.encs.concordia.ca/ConfSys. _______________________________________________ Cse-grad-announce mailing list Cse...@en... https://mail.encs.concordia.ca:444/mailman/listinfo/cse-grad-announce |
From: Serguei A. M. on b. of PST-1. <mo...@cs...> - 2011-02-19 08:58:19
|
[ Apologies if you receive multiple copies of this announcement. Please pass it on to your colleagues and students who might be interested in contributing. ] Ninth Annual Conference on Privacy, Security and Trust ------------------------------------------------------ July 19-21, 2011 Montreal, Quebec, Canada http://www.unb.ca/pstnet/pst2011 Call for Papers --------------- The PST2011 International Conference on Privacy, Security and Trust (PST) is being held in Montreal, Quebec, Canada, July 19-21, 2011. PST2011 is the ninth such annual conference focusing on PST technologies. PST2011 provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation. Easychair submission link of PST 2011: http://www.easychair.org/conferences/?conf=pst2011. IMPORTANT DATES: ---------------- Submission Deadline: March 20, 2011 Notification of Acceptance: May 9, 2011 Final Manuscript Due: May 22, 2011 PST2011 will include an Innovation Day featuring workshops and tutorials followed by two days of high-quality research papers whose topics include, but are NOT limited to, the following: * Privacy Preserving / Enhancing Technologies * Trust Technologies, Technologies for Building Trust in e-Business Strategy * Critical Infrastructure Protection * Observations of PST in Practice, Society, Policy and Legislation * Network and Wireless Security * Digital Rights Management * Operating Systems Security * Identity and Trust management * Intrusion Detection Technologies * PST and Cloud Computing * Secure Software Development and Architecture * Human Computer Interaction and PST * PST Challenges in e-Services, e.g. e-Health, e-Government, e-Commerce * Implications of, and Technologies for, Lawful Surveillance * Network Enabled Operations * Biometrics, National ID Cards, Identity Theft * Digital forensics * PST and Web Services / SOA * Information Filtering, Data Mining & Knowledge from Data * Privacy, Traceability, and Anonymity * National Security and Public Safety * Trust and Reputation in Self-Organizing Environments * Security Metrics * Anonymity and Privacy vs. Accountability * Recommendation, Reputation and Delivery Technologies * Access Control and Capability Delegation * Continuous Authentication * Representations and Formalizations of Trust in Electronic and Physical Social Systems High-quality papers in all PST related areas that, at the time of submission, are not under review and have not already been published or accepted for publications elsewhere are solicited. Accepted papers will either be accepted as regular papers up to 8 pages and with oral presentations, or short papers of up to 2 pages with poster presentations. Up to 2 additional pages will be allowed in each category with over-length charges. The standard IEEE two-column conference format should be used for all submissions. A copy of the IEEE Manuscript Templates for Microsoft Word or LaTeX and additional information about paper submission and conference topics and events can be found at the conference web site. All accepted papers will be published in the conference proceedings and by IEEE and will be accessible via IEEE Xplore Digital Library. Best Paper and Best Student Paper awards will be presented. Some travel grants to students who are presenting their work in the conference will also be made available. Organizing Committee -------------------- Honorary Conference Chair: Andrew Vallerand, Director S&T Public Security, National Defense, Canada General Co-Chairs: Mourad Debbabi, Concordia University, Canada Amr M. Youssef, Concordia University, Canada Program Co-Chairs: Frederic Cuppens (Privacy), ENST-Bretagne, France Natalia Stakhanova (Security), University of South Alabama, USA Jianying Zhou (Trust), Institute for Infocomm Research, Singapore Workshop & Tutorial Chair: Ali Miri, Ryerson University, Canada Poster Session Chair: Franois Cosquer, Alcatel Lucent, France Publication & Publicity Chair: Indrajit Ray, Colorado State University, USA Carlisle Adams, University of Ottawa, Canada PST Steering Committee Chair: Ali Ghorbani, University of New Brunswick, Canada Conference Manager: Greg Sprague, National Research Council, Canada Local Arrangements: Benjamin Fung, Concordia University, Canada Webmaster: Ilia Goldfarb, National Research Council, Canada Finance and Registration: Linda Vienneau, National Research Council, Canada Privacy Theme ------------- Privacy concerns the operational policies, procedures and regulations implemented within an information system to control for the unauthorized use of, access to, or release of personal information held in any format. Topics of interest in this theme include (but are not limited to): * privacy preserving/enhancing technologies * identity management and biometrics * privacy and ubiquitous computing, e.g. RFIDs * reputation, privacy and communities * e-health and privacy * anonymity and medical research * employee privacy and network administration * privacy and location-based technologies and services * privacy and traceability * spyware and stalking * anonymity, pseudonimity and accountability * responding to hate speech, flaming and trolls * privacy and emergency management policies and technologies * vulnerable online users and privacy sensitization * evolving nature of lawful surveillance * smart cards and privacy * identity theft and management * privacy audits and risk analysis * evolving role of privacy officers Privacy Theme Chair: Frederic Cuppens, TELECOM Bretagne, France Privace Theme Committee: Sushil Jajodia, George Mason University, USA Vijay Atluri, Rutgers University, USA Joaquin Garcia-Alfaro, Telecom Bretagne, France Nora Cuppens-Boulahia, Telecom Bretagne, France Alban Gabillon, Universit de la Polynsie Franaise, France Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain Ernesto Damiani (Universit degli Studi di Milano, Italy) Ehud Gudes, Ben-Gurion University, Israel Carlisle Adams, University of Ottawa Esma Aimeur, University of Montreal Norm Archer, McMaster University Debra Grant, Office of the Information and Privacy Commissioner of Canada Steve Johnston, Office of the Privacy Commissioner of Canada Bradley Malin, Vanderbilt University Jian Pei, Simon Fraser University Teresa Scassa, University of Ottawa Jean-Marc Seigneur, University of Geneva Lisa Singh, Georgetown University Traian Truta, Northern Kentucky University Jens Weber, University of Victoria Security Theme -------------- Security addresses the various components of an information system that safeguard the data and associated infrastructure from unauthorized activity. Topics of interest in this theme include (but are not limited to): * access control * adaptive security and system management * analysis of network and security protocols * applications of cryptographic techniques * attacks against networks and machines * authentication and authorization of users, systems, and applications * botnets * critical infrastructure security * firewall technologies * forensics and diagnostics for security * intrusion and anomaly detection and prevention * malicious code analysis, anti-virus, anti-spyware * network infrastructure security * operating system security * public safety and emergency management * security architectures * security in heterogeneous and large-scale environments * techniques for developing secure systems * web security * wireless and pervasive/ubiquitous computing security Security Theme Chair: Natalia Stakhanova, University of South Alabama, USA Security Theme Committee: Michel Barbeau, Carleton University, Canada Mike Burmester, Florida State University, US Alvaro A. Cardenas, Fujitsu Laboratories, US Anton Chuvakin, Security Warrior Consulting, US Mathieu Couture, CRC, Canada Jos M. Fernandez, Ecole Polytechnique, Montreal, Canada Thorsten Holz, Ruhr-University Bochum, Germany Mohammed Houssaini Sqalli, King Fahd University of Petroleum & Minerals, Saudi Arabia H. Gunes Kayacik, Carleton University, Canada David Lie, University of Toronto, Canada Wei Lu, Keene State College, US Xinming Ou, Kansas State University, US Maria Papadaki, University of Plymouth, UK Nadia Tawbi, Universit Laval, Canada Julie Thorpe, University of Ontario Institute of Technology, Canada Issa Traore, University of Victoria, Canada Isaac Woungang, Ryerson University, Canada Alec Yasinsac, University of South Alabama, US Nur Zincir-Heywood, Dalhousie University, Canada Trust Theme ----------- Trust is a fundamental human behavior. It is necessary for people to function in social groups, and it forms the foundation for many of our organizations and relationships. The conference solicits original papers on any topic related to the personal, social, and economic aspects of trust. Topics of interest in this theme include (but are not limited to): * trust models * components and dimensions of trust * game theory and trusting behaviors * trust and risk * trust, regret, and forgiveness * perceptions of trustworthiness * trust management * automating trust decisions * attacks on trust * trust influences on security and privacy * economic drivers for trustworthy systems * cross-cultural differences * computing about trust * applications of trust * trust and economics * trust in e-commerce * reputation systems Trust Theme Chair: Jianying Zhou, Institute for Infocomm Research, Singapore Trust Theme Committee: Habtamu Abie, Norwegian Computing Center, Norway Claudio Agostino Ardagna, Universit degli Studi di Milano, Italy Robin Cohen, University of Waterloo, Canada Rino Falcone, National Research Council, Italy Jordi Forne, UPC, Spain Xinyi Huang, I2R, Singapore Steve Kremer, INRIA, France Costas Lambrinoudakis, University of Piraeus, Greece Albert Levi, Sabanci University, Turkey Hui Li, Xidian University, China Joseph Liu, I2R, Singapore Sangjae Moon, Kyungpook National University, Korea Yuko Murayama, Iwate Prefectural University, Japan Jose Onieva, University of Malaga, Spain Rolf Oppliger, eSECURITY Technologies, Switzerland Gunther Pernul, Universitt Regensburg, Germany Pierangela Samarati, Universit degli Studi di Milano, Italy Guilin Wang, University of Wollongong, Australia Yunlei Zhao, Fudan University, China Partners / Sponsors ------------------- NRC-CNRC Canada University of New Brunswick, Canada Information Security Center of eXcellence (ISCX) Concordia University, Montreal, Canada National Cyberforensics and Training Alliance (NCFTA), Canada PST'11 |
From: Serguei A. M. on b. of C3S2E'1. <mo...@cs...> - 2011-01-18 04:37:26
|
[ Apologies if you receive multiple copies of this announcement.] Hello: Concordia University is organizing C3S2E'11, the Fourth International C* Conference on Computer Science and Software Engineering, in May 2011. With so many questionable academic meetings and their CFPs which we get everyday, direct emailing has become a nuisance; hence we need to depend on the old reliable grapevine approach. We would, consequently, appreciate if you would bring the CFP for this meeting to the attention of your colleagues and students. We plan, also to have a number of workshops. If you would like to organize one, please contact one of the program chairs. As a general rule, you would be responsible for the CFP and review and acceptance of papers for the workshop. The Admin for ConfSys would set up the system for the workshop. The accepted papers for the workshop would be scheduled during the workshop slot and the papers would be published with the C3S2E'11 proceedings. Since ConfSys review is triple blind, committee members of the workshop could also submit paper. Conference URL (CFP): http://confsys.encs.concordia.ca/c3s2e/c3s2e-11 Submission system: https://confsys.encs.concordia.ca/ConfSys/jsp/index.jsp Contact: ad...@co... Program committee: http://confsys.encs.concordia.ca/c3s2e/c3s2e-11/ProgramCmt-C3S2E11.html Previous publications: (2010) http://portal.acm.org/citation.cfm?id=1822327 (2009) http://portal.acm.org/citation.cfm?id=1557626 (2008) http://portal.acm.org/citation.cfm?id=1370256 CFP details: ============ Call for Regular, Workshops and Position papers; posters and demo ----------------------------------------------------------------- C3S2E'11 is the fourth in a revived series of international conferences to address the need of the academic community in computing science and software engineering. The objective of C3S2E is to meet annually to exchange ideas on the continuing need to address the new challenges both from the theoretical as well as application aspects of computing and engineering of software systems. C3S2E encourages the participation of practitioners from governmental and non-governmental agencies, industries, and academia. C3S2E invites quality papers describing original and applied research ideas and new findings on technological and theoretical aspects of computing and software engineering. In particular, we welcome submissions describing work on integrating new technologies into products and applications, on experiences with existing and novel techniques, and on the identification of unsolved challenges. We consider this meeting to be an important forum to discuss experiences in applying computing and software engineering to actual situations. Authors are invited to submit papers in English or French, reporting recent research in the area of computing and software development theories and practices and experience in related fields. While research papers should report original research work, experience and application papers should describe the development and operations of challenging computing related systems and applications. The symposium will have focused sessions in the following areas: * Algorithms and Theory * Artificial Intelligence and Related Subjects * Bio-medical,life science and medical computing * Computational Linguistics * Computing Applications * Core Computing Technology * Data Bases * E-Commerce * Ethics * Hardware and Architecture * Human-Computer Interaction * Open Source * Parallel Computing * Programming Languages * Privacy and Security * Software Engineering * Supercomputing * System Technology * Virtual Reality * Web Design and Development * Emerging computing technologies The scope of the conference includes the above topics but is not restricted to these areas in computing and software engineering: following are some of the topics typically used by computer scientists to describe their interests: Algorithms, Applications, Artificial intelligence, Automata theory, Automated reasoning, Bioinformatics, Compiler theory, Computability theory, Computational complexity theory, Computational linguistic, Computer architecture, Computer graphics, Computer programming, Computer security, Computer vision, Concurrency, Cryptography, Data Models, Data mining, Data structures, Data warehousing, Digital library, Distributed computing, Expert Systems, Formal methods, Functional Programming, Game theory, Graph theory, Human computer interaction, Image processing, Information Retrieval, Knowledge base system, Machine learning, Machine translation, Mathematical logic, Multimedia, Natural Language Processing, Networking, Number theory, Numerical analysis, Operating systems, Parallel computing, Programming language, Quantum computing theory, Reverse engineering, Robotics, Scientific computing, Semantic Web, Semi-structured data, Software engineering, Speech synthesis and recognition, Super computing, Symbolic computation, Web database Call for proposals for Workshop or Panels ----------------------------------------- Proposals are invited for workshops or panels to be held in conjunction with the symposium, in the areas of interest within the scope of conference. The workshop papers would be published in the C3S2E proceedings. The detailed proposals should reach the program chairs by March 1, 2011. Position Papers ~~~~~~~~~~~~~~~ In addition to regular papers, position papers are invited. These papers could be work in progress and/or exploring of new concepts and directions. Position papers should be clearly marked on the first page and for the review purpose could be of a length varying from a short paper(6-10 pages) to a regular full paper (15-20 pages). Poster & Demos ~~~~~~~~~~~~~~ This is an integral part of this meeting. In the poster session, graduate students are invited to compete by presenting their work in progress either as a poster or a demo. The students have a chance to orally present their work and also display the salient features of their work and answer questions. The posters would be judged by the attendants and the best posters could be awarded prizes. The length of a poster paper and demo proposal for review purpose would be 5-7 pages. The adviser could be a co:author of a poster paper or demo proposal, however, if the poster paper/demo is accepted, the student is required to register and participate. Poster papers and demo summaries would be published as part of the proceedings. Cultural/Social Events ~~~~~~~~~~~~~~~~~~~~~~ In addition to the conference dinner, there would be a guided tour of the "The Warrior Emperor and China's Terracotta Army" at the Montreal Museum of Fine Arts. According to the organizers "This Canadian national tour is a newly developed and contextually different presentation than previous, international displays. The number of full-sized warriors and the exhibitions scope makes this the largest display of the First Emperors terracotta army ever to be seen in North America." Conference Publication ~~~~~~~~~~~~~~~~~~~~~~ The conference proceedings will be published by BytePress/ACM and would be added to ACM's Digital Library. All submissions would also be invited to publish their papers in the CINDI Digital Library. The extended version of the best papers would also be recommended for publication in a special edition of reputed journal. Important Dates ~~~~~~~~~~~~~~~ All the dates are given on the milestone page on ConfSys for C3S2E (accessible to registered users). The following are the salient ones: ConfSys user Sign-Up begins: Always on Paper submission begins: 2010-11-01 Paper submission deadline: 2011-01-28 Acceptance notice: 2011-03-15 Camera-ready copies deadline: 2011-04-15 Conference dates: 2011-05-16 -- 2011-05-18 Please visit the ConfSys (https://confsys.encs.concordia.ca/ConfSys) web sites for further instructions. ConfSys is used to manage all administrative functions of the conference. Organized by ~~~~~~~~~~~~ Concordia University, Montreal, Canada; with the cooperation of ACM, BytePress.org and ConfSys.org General Chair: Bipin C. Desai (Concordia University, Montreal, Canada) Local Organization Concordia University, Montreal, Canada Program Chairs: Alain Abran: ETS - Univ. du Qubec (Canada) Sudhir Mudur: Concordia Univesity (Canada) C3S2E'11 |
From: SourceForge.net <no...@so...> - 2010-08-01 15:52:11
|
The following forum message was posted by mokhov at http://sourceforge.net/projects/marf/forums/forum/213052/topic/3782565: [quote][quote]you just have to change categories from speakers to words[/quote] Here do you mean change in just the \" speakers.txt \" or some change in code is required for changing the category?? [/quote] No code changes are required, just speakers.txt. You list one word per line, give it a numeric ID, and all the recorded files that associate to it. The format is described in the manual, but it is essentially a CSV file, and the filenames for training and testing are separated by the vertical bar \"|\". Now if you also want the output to say \"Word\" instead of \"Speaker\", etc. or if the filename \"speakers.txt\" is too confusing, you\'d need to change the code to fix the output messages, but this is a cosmetic change. [quote]Also,in SpeakerIdentApp matches were found based on sound features of speaker and was independent of what was being said and how.Whereas in the pronunciation system,if we substitute \"words\" in place of \"speakers\" in the dictionary, wouldn\'t it become specific for the speaker of the words ??[/quote] No, the features extracted would be per categories that you pick. They are clustered (groupped) as such, so the training sets (your problem models) would be different from that of about speakers themselves (basically that means you cannot re-use my .gzbin files, which correspond to the speaker clusters -- you will have to train your own based on your own dictionary, independent of the speaker). The best algorithm combination(s) you\'ll find (that give you the highest accuracy) will likely to be also different from that of speaker identification. [quote]Yes ,I agree some experimentation is required to find right combination of algorithms ,though for comparison I think distance based algos would be better for the required accuracy .Here the problem is if we are too accurate it becomes a speaker or word identification software and if we are too fuzzy it wouldn\'t just check for the right pronunciation but any thing remotely near it ,guess some optimization would be required. [/quote] In general, I applied the MARF\'s pipeline in my recent works not only to audio, but for forensic file type analysis, natural language tasks (text analysis), writer recognition (handwriting attribution of scanned documents in images), and others. There are corresponding publications for all of those. I guess it\'d make sense at last to maintain the web page and list them there... Anyways. the approach is the same for all, but the selection of algorithms is different depending on the task at hand, and so is the dictionary of categories, etc. I was caught by surprise sometimes as to which combinations were the best for the task, so the experiments are definitively required. In your particular case my feeling (supported by the gender classification task in that article) is that you\'d probably get better accuracy if you will group word pronunciations by different genders/age groups at the low level of .txt and then in the application match it up to one word category later. This wait I hypothesize it\'d be more robust and gender/age group independent. Specifically, e.g. in the .txt file you have ... 1,Hello_adult_female,... 2,Hello_adult_male,... 3,Hello_child,... ... and then in the application you match up IDs 1, 2, and 3 all into \"Hello\". It may turn out to be this step is not necessary, but I can\'t tell offhand for sure. It requires experiments for both with and without such separation. It may also be required that a better algorithm can be implemented to do a better job than the existing ones. I myself if I ever get time, I\'ll make something like that up as a demo app for MARF, but don\'t hold your breath. On the other hand, if you require any adjustments to MARF to make your life easier, let me know. If you come up with something new and you would like to share to contribute it to the project, you are most welcome to. :) Let me know how it goes. -s |
From: SourceForge.net <no...@so...> - 2010-07-29 06:22:09
|
The following forum message was posted by shantrip at http://sourceforge.net/projects/marf/forums/forum/213052/topic/3782565: Hello Serguei Thanks for your reply and for providing definite direction to proceed. I will have to study the paper you provided and study some more before i can come up with specific project related questions ,..still had few doubts so decided to ask. >>[quote]you just have to change categories from speakers to words [/quote] Here do you mean change in just the \" speakers.txt \" or some change in code is required for changing the category?? Also,in SpeakerIdentApp matches were found based on sound features of speaker and was independent of what was being said and how.Whereas in the pronunciation system,if we substitute \"words\" in place of \"speakers\" in the dictionary, wouldn\'t it become specific for the speaker of the words ?? Yes ,I agree some experimentation is required to find right combination of algorithms ,though for comparison I think distance based algos would be better for the required accuracy .Here the problem is if we are too accurate it becomes a speaker or word identification software and if we are too fuzzy it wouldn\'t just check for the right pronunciation but any thing remotely near it ,guess some optimization would be required. Once again thanks for providing some lead ,do reply... bye and tc |
From: SourceForge.net <no...@so...> - 2010-07-27 05:36:03
|
The following forum message was posted by mokhov at http://sourceforge.net/projects/marf/forums/forum/213052/topic/3782565: Hi ShanTrip, The type of application you describe should be quite easy to do, you just have to change categories from speakers to words and do some experiments to select which algorithms do it best for this category. It is bound to be different than the best algos for speakers themselves. For example, I\'ve done experiments on changing categories to spoken accent and gender instead of identity in here: http://portal.acm.org/citation.cfm?id=1370256.1370262 The words principle is the same. The SpeakerIdentApp\'s .txt db would have to become like a dictionary of word and the associated \"good\" pronunciations files for training and testing. It may also be wise to experiment to split each pronounced word into three subcategories, one per age group and gender to increase accuracy. In this case, a match would be searched in the related categories and them mapped to the same spelled word when the smallest distance is found or the largest similarity is found between the spoken and trained utterances. Else the application is quite feasible and easy to alter from SpeakerIdentApp to the task. Let me know if you still have any more questions. -s ... and it\'s not long at all ;-) -s |
From: SourceForge.net <no...@so...> - 2010-07-24 06:22:47
|
The following forum message was posted by shantrip at http://sourceforge.net/projects/marf/forums/forum/213052/topic/3782565: Hi Serguei.. I am planning to develop a pronunciation detection software where a given word will be spoken by the user and saved as wav file.This file will be compared with a predefined sound file and percentage of match calculated.The program will check for only phonetic match so voice of different people wilh same pronunciation should match. I checked your Speaker Identification Application and that was really great! ! But requirement of pronunciation is it should be speaker independant. I checked out some other packages like cmu-sphinx4 ,but that was giving good result at word match and results for phones were not very promising .Also MFCC-DTW pair was giving some problem in interoperability for me. MARF for me seems the best bet ,being a complete audio package .So, i would be grateful if you can tell if such application is feasible using MARF?? Also, if yes ...please point me some direction of approach... Thanks in advance!! ShanTrip PS:Sorry for long post ,had to make my situation clear. |
From: Joey P. <pa...@en...> - 2010-01-28 18:52:03
|
Dear colleagues, [ Apologies for the crossposting or if you get multiple copies of this email ] FINAL CALL FOR PAPERS -- A FEW DAYS LEFT We would like to invite you to submit a paper to the 8th IEEE/ACIS International Conference on Software Engineering Research, Management and Applications (SERA2010) held on May 24 - 26, 2010. The event will take place at Concordia University, Montreal, Canada. http://users.encs.concordia.ca/~sera2010/ Please take notice of the following Final Call for Papers. The deadline for submission of papers is **February 1, 2010.** We kindly ask you to distribute this announcement among the colleagues in your institution and post it on research mailing lists you have access to that you may think this is relevant. Important dates: ================ Paper and Proposals Submission: February 1, 2010 Acceptance Notification: March 1, 2010 Camera-ready Paper & Pre-Registration: March 15, 2010 Topics: ======= http://users.encs.concordia.ca/~sera2010/Conference.html - Formal Methods and Tools - New theoretical foundations in Software Engineering Modeling - Business Process & Enterprise Integration Engineering - Communication Systems and Networks - Computer Game Development, User Modeling and Management - Cost Modeling and Analysis - Data Mining and Knowledge Recovery - Distributed Intelligent Systems - Healthcare Engineering - Human Computer Interaction - Parallel and Distributed Computing Telecommunications - Service Oriented Computing - Mobile/Wireless Computing - Requirements Modeling and Management - Process Management & Improvement - Reengineering, Reverse Engineering - Autonomic Computing - Requirements Engineering - Safety and Security Critical Software - Software Agent Technology - Web Engineering, Web-Based Applications - Virtual Reality and Computer Graphics Submission: =========== We solicit research and experience papers as well as research-in-progress and practitioner reports in any of the technical areas listed under Scope & Topics. Submit your paper via the web-based conference management system following the instructions below: * First, please review the IEEE PDF specifications. http://www.ieee.org/portal/cms_docs/pubs/confstandards/pdfs/IEEE-PDF-SpecV401.pdf * Go to the Conference Management System and follow the instructions on the "Electronic Submission Page" that it takes you to. http://acis.cps.cmich.edu:8080/SERA2010/submit.html * The file that you submit should include the paper title, abstract, keywords, and introduction followed by the body of your paper. The author's name and address MUST NOT appear in this file. This is to facilitate a blind review. * Upload your full paper in two column format (not to exceed 10 single-spaced pages) via the web-based conference management system in PDF format, or you can submit your paper in the final manuscript format. * The format of the final manuscript should be in a two-column format and 8 pages in length. Up to an extra 2 pages (total of 8) can be purchased at registration time (see registration form for pricing). * Please select at least two keywords from the drop-down menu and check boxes. If you cannot find the right category in the drop-down menu then please enter a category for your paper in the summary. We need this information when determining reviewers for your paper. Submissions, refereeing, and all correspondence will be conducted by e-mail. All papers must be submitted through our Conference Management System. http://acis.cps.cmich.edu:8080/SERA2010/submit.html The program committee will review each submission and judge it with respect to its originality, significance, and relevance. Publication: ============ http://users.encs.concordia.ca/~sera2010/Publication.html Accepted papers will be published in the proceedings of the 8th ACIS International Conference on Software Engineering Research, Management and Applications (SERA2010) by the IEEE Computer Society and indexed by EI, INSPEC and DBLP. Conference organizers will select approximately 20 outstanding papers from SERA 2010 to be published in Springer's Studies in Computational Intelligence (SCI). The book series will be distributed at the conference site. Workshops and Special Sessions: =============================== Please download the corresponding CFPs for the workshops and special sessions from here: http://users.encs.concordia.ca/~sera2010/Session.html * Computational Intelligence Techniques Applied to Software Estimation * 3rd International Workshop on Software Engineering for Context Aware Systems and Applications (SECASA 2010) * Special Session on Formal and Quantitative Approaches for Non-Functional Requirements Modeling and Assessment in Software Engineering * Category Theory for Software Engineering * Special Session on Software Measurement as a Strategy for Better Software Value Management Submission, Review, and Publication for Workshops and Special Sessions Papers will be submitted in PDF format following the SERA2010 template. The papers are due on: February 1st, 2010. The authors will receive acceptance notifications on March 1st, 2010. The camera ready papers & registration deadline is March 15th, 2010. Submitted papers must not be previously published or be under consideration for publication elsewhere. All papers accepted for the session will be published in the proceedings of the 8th ACIS International Conference on Software Engineering Research, Management and Applications (SERA2010). The selection procedure includes a review of each paper by at least three SERA2010 PC members. Experience papers will be accepted based on the relevance of the problems they tackle. Research papers will be accepted based on the relevance of the research questions to practice and the soundness of the research method deployed. Committees: =========== http://users.encs.concordia.ca/~sera2010/People.html For further inquires about SERA2010 conference and event planning, please e-mail to: ser...@en... You may obtain further information on the conference at its web site http://users.encs.concordia.ca/~sera2010/ Sincerely yours, SERA2010 organizers =============================================================================== |
From: Joey P. <pa...@en...> - 2010-01-28 18:49:12
|
Dear colleagues, [ Apologies for the crossposting or if you get multiple copies of this email ] Final call for papers for the 3rd International Workshop on Software Engineering for Context Aware Systems and Applications SECASA 2010 a Special Session in SERA 2010 8th ACIS International Conference on Software Engineering Research, Management and Applications (SERA2010) Monday, May 24 â Wednesday, May 26, 2010 Montreal, Canada http://users.encs.concordia.ca/~sera2010/ Sponsored by International Association for Computer and Information Science (ACIS) In cooperation with IEEE Montreal Section, Concordia University, Ãcole de technologie supérieure (ETS) Overview We call for original contributions on the theme of context-aware computing, focusing both on the development of practical context-aware systems and application and on the theory to support this development. Context-aware concepts are readily found in multiple applications, including distributed and mobile computing, adaptive Web applications, distributed operating systems, and distributed communities for social networking and user collaboration. More generally, context-aware computing requires that the behavior of a piece of software be aware of, and adapt to a set of underlying runtime contexts and changes thereto, where the contexts are external varying environments that may affect computation. Examples of such external environments or contexts involve time, location, situation, and user profile. Context-aware programming means writing software programs that specify how computations or behaviors of context-aware applications depend on or vary in underlying contexts. Of par! ticular interest are theoretical approaches to the problem of context-awareness. For example, applying intensional concepts, with possible world semantics, to context-aware computing and programming should help build a solid theoretical foundation for engineering context-aware software systems and applications. Topics of interest include all aspects of software engineering for developing context aware systems and applications. Research papers as well as papers reporting practical experiences and applications of the above topics are all welcome. Topics include but are not restricted to: - Software development process for context-aware systems and applications - Requirements engineering for context-aware systems and applications - Context-aware software design and development process - Modeling and simulation of context-aware systems and applications - Formalism and abstraction of context-awareness in systems and applications - Software architecture and design patterns of context-aware systems applications - Quality of context-aware systems and applications - Programming languages and systems for context-aware systems and applications - Testing, verification, and validation of context-aware systems and applications Submission, Review, and Publication Papers will be submitted in PDF format following the SERA2010 template. The papers are due on: February 1st, 2010. The authors will receive acceptance notifications on March 1st, 2010. The camera ready papers & registration deadline is March 15th, 2010. Submitted papers must not be previously published or be under consideration for publication elsewhere. All papers accepted for the session will be published in the proceedings of the 8th ACIS International Conference on Software Engineering Research, Management and Applications (SERA2010). The selection procedure includes a review of each paper by at least three SERA2010 PC members. Experience papers will be accepted based on the relevance of the problems they tackle. Research papers will be accepted based on the relevance of the research questions to practice and the soundness of the research method deployed. http://acis.cps.cmich.edu:8080/SERA2010/submit.html Publication of SECASA papers within the SERA proceedings: http://users.encs.concordia.ca/~sera2010/Publication.html Accepted papers will be published in the IEEE Computer Society. Chairspersons Joey Paquet, Chairperson Computer Science and Software Engineering Concordia University, Canada pa...@cs... Weichang Du, Co-chair Faculty of Computer Science University of New Brunswick Fredericton, New Brunswick, Canada wd...@un... SERA Committees: http://users.encs.concordia.ca/~sera2010/People.html Structure Full-day event. 8 papers (with a reasonable acceptance rate) 1 invited speaker (TBD) 1 panel discussion (tentatively, ``the meaning, notion, and explicit vs. implicit expression of context'') -- Sincerely yours, SECASA2010 organizers |
From: Joey P. <pa...@en...> - 2009-12-21 18:32:48
|
Dear colleagues, [ Apologies for the crossposting or if you get multiple copies of this email ] We would like to invite you to submit a paper and / or a special session / workshop proposal to the 8th IEEE/ACIS International Conference on Software Engineering Research, Management and Applications (SERA2010) on May 24 - 26, 2010. The event will take place at Concordia University, Montreal, Canada. http://users.encs.concordia.ca/~sera2010/ Please take notice of the attached Call for Papers, Call for Workshop Proposals and Call for Sponsorship for further information. The deadline for submission of either papers or the workshop/special session proposals HAS BEEN EXTENDED TO February 1, 2010. We kindly ask you to distribute this announcement among the colleagues in your institution and post it on research mailing lists you have access to that you may think this is relevant. Important dates: ================ Paper and Proposals Submission: February 1, 2010 Acceptance Notification: March 1, 2010 Camera-ready Paper & Pre-Registration: March 15, 2010 Topics: ======= http://users.encs.concordia.ca/~sera2010/files/First_CFP_SERA2010.pdf - Formal Methods and Tools - New theoretical foundations in Software Engineering Modeling - Business Process & Enterprise Integration Engineering - Communication Systems and Networks - Computer Game Development, User Modeling and Management - Cost Modeling and Analysis - Data Mining and Knowledge Recovery - Distributed Intelligent Systems - Healthcare Engineering - Human Computer Interaction - Parallel and Distributed Computing Telecommunications - Service Oriented Computing - Mobile/Wireless Computing - Requirements Modeling and Management - Process Management & Improvement - Reengineering, Reverse Engineering - Autonomic Computing - Requirements Engineering - Safety and Security Critical Software - Software Agent Technology - Web Engineering, Web-Based Applications - Virtual Reality and Computer Graphics Call for Sponsorship: ===================== http://users.encs.concordia.ca/~sera2010/files/SERA2010-CallForSponsorship-last.pdf Submission: =========== We solicit research and experience papers as well as research-in-progress and practitioner reports in any of the technical areas listed under Scope & Topics. Submit your paper via the web-based conference management system following the instructions below: * First, please review the IEEE PDF specifications. http://www.ieee.org/portal/cms_docs/pubs/confstandards/pdfs/IEEE-PDF-SpecV401.pdf * Go to the Conference Management System and follow the instructions on the "Electronic Submission Page" that it takes you to. http://acis.cps.cmich.edu:8080/SERA2010/submit.html * The file that you submit should include the paper title, abstract, keywords, and introduction followed by the body of your paper. The author's name and address MUST NOT appear in this file. This is to facilitate a blind review. * Upload your full paper in two column format (not to exceed 10 single-spaced pages) via the web-based conference management system in PDF format, or you can submit your paper in the final manuscript format. * The format of the final manuscript should be in a two-column format and 8 pages in length. Up to an extra 2 pages (total of 8) can be purchased at registration time (see registration form for pricing). * Please select at least two keywords from the drop-down menu and check boxes. If you cannot find the right category in the drop-down menu then please enter a category for your paper in the summary. We need this information when determining reviewers for your paper. Submissions, refereeing, and all correspondence will be conducted by e-mail. All papers must be submitted through our Conference Management System. http://acis.cps.cmich.edu:8080/SERA2010/submit.html The program committee will review each submission and judge it with respect to its originality, significance, and relevance. Publication: ============ http://users.encs.concordia.ca/~sera2010/Publication.html Accepted papers will be published in the IEEE Computer Society. Conference organizers will select approximately 20 outstanding papers from SERA 2010 to be published in Springer's Studies in Computational Intelligence (SCI). The book series will be distributed at the conference site. Workshops and Special Sessions: ============================== http://users.encs.concordia.ca/~sera2010/Conference.html Committees: =========== http://users.encs.concordia.ca/~sera2010/People.html For further inquires about SERA2010 conference and event planning, please e-mail to: ser...@en... You may obtain further information on the conference at its web site http://users.encs.concordia.ca/~sera2010/ Sincerely yours, SERA2010 organizers =============================================================================== |
From: SourceForge.net <no...@so...> - 2009-11-30 16:24:03
|
Feature Requests item #2906060, was opened at 2009-11-30 10:24 Message generated for change (Tracker Item Submitted) made by petermon You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=502903&aid=2906060&group_id=63118 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Applications - LangIdentApp Group: None Status: Open Resolution: None Priority: 5 Private: No Submitted By: Pedro Montiel (petermon) Assigned to: Nobody/Anonymous (nobody) Summary: Words recognition Initial Comment: Hi! My name is Pedro Montiel, I am from Mexico City. Recently I have started a scholar project involving "spoken word recognition". What I want to do is to program an application for "voice command recognition". Basically train the system to recognize the word I am saying. I have took a look to your MARF framework and tested your "SpeakerIdentApp", and start to take it as a base for what i want to do. The thing is that I gave for training .wav files (recorded with my voice) for five different words, and then ask the program to recognize what I said in a new .wav file. But I am not getting the same great results you achieved in identifying a speaker. I think the problem is that, if I understood well your "report.pdf", that all my sound files have being recorded by the same person. Can you give me some advise to use your MARF framework to achieve my goal???? Thanks in advance. Best regards.... ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=502903&aid=2906060&group_id=63118 |
From: Joey P. <pa...@en...> - 2009-11-24 16:30:34
|
Dear colleagues, [ Apologies for the crossposting or if you get multiple copies of this email ] We would like to invite you to submit a paper and / or a special session / workshop proposal to the 8th IEEE/ACIS International Conference on Software Engineering Research, Management and Applications (SERA2010) on May 24 - 26, 2010. The event will take place at Concordia University, Montreal, Canada. http://users.encs.concordia.ca/~sera2010/ Please take notice of the attached Call for Papers, Call for Workshop Proposals and Call for Sponsorship for further information. The deadline for submission of either papers or the workshop/special session proposals is December 15, 2009. We kindly ask you to distribute this announcement among the colleagues in your institution and post it on research mailing lists you have access to that you may think this is relevant. Important dates: ================ Paper and Proposals Submission: December 15, 2009 Acceptance Notification: January 25, 2010 Camera-ready Paper & Pre-Registration: February 20, 2010 Topics: ======= http://users.encs.concordia.ca/~sera2010/files/First_CFP_SERA2010.pdf - New theoretical foundations in Software Engineering Modeling - Business Process & Enterprise Integration Engineering - Communication Systems and Networks - Computer Game Development, User Modeling and Management - Cost Modeling and Analysis - Data Mining and Knowledge Recovery - Distributed Intelligent Systems - Formal Methods and Tools - Healthcare Engineering - Human Computer Interaction - Parallel and Distributed Computing Telecommunications - Service Oriented Computing - Mobile/Wireless Computing - Requirements Modeling and Management - Process Management & Improvement - Reengineering, Reverse Engineering - Autonomic Computing - Requirements Engineering - Safety and Security Critical Software - Software Agent Technology - Web Engineering, Web-Based Applications - Virtual Reality and Computer Graphics Call for Sponsorship: ===================== http://users.encs.concordia.ca/~sera2010/files/SERA2010-CallForSponsorship-last.pdf Submission: =========== We solicit research and experience papers as well as research-in-progress and practitioner reports in any of the technical areas listed under Scope & Topics. Submit your paper via the web-based conference management system following the instructions below: * First, please review the IEEE PDF specifications. http://www.ieee.org/portal/cms_docs/pubs/confstandards/pdfs/IEEE-PDF-SpecV401.pdf * Go to the Conference Management System and follow the instructions on the "Electronic Submission Page" that it takes you to. http://acis.cps.cmich.edu:8080/SERA2010/submit.html * The file that you submit should include the paper title, abstract, keywords, and introduction followed by the body of your paper. The authorâs name and address MUST NOT appear in this file. This is to facilitate a blind review. * Upload your full paper in two column format (not to exceed 10 single-spaced pages) via the web-based conference management system in PDF format, or you can submit your paper in the final manuscript format. * The format of the final manuscript should be in a two-column format and 8 pages in length. Up to an extra 2 pages (total of 8) can be purchased at registration time (see registration form for pricing). * Please select at least two keywords from the drop-down menu and check boxes. If you cannot find the right category in the drop-down menu then please enter a category for your paper in the summary. We need this information when determining reviewers for your paper. Submissions, refereeing, and all correspondence will be conducted by e-mail. All papers must be submitted through our Conference Management System. http://acis.cps.cmich.edu:8080/SERA2010/submit.html The program committee will review each submission and judge it with respect to its originality, significance, and relevance. Publication: ============ http://users.encs.concordia.ca/~sera2010/Publication.html Accepted papers will be published in the IEEE Computer Society. Conference organizers will select approximately 20 outstanding papers from SERA 2010 to be published in Springer's Studies in Computational Intelligence (SCI). The book series will be distributed at the conference site. Workshops and Special Sessions: ============================== http://users.encs.concordia.ca/~sera2010/files/SERA2010-2d-Call%20for%20Workshop%20Proposals.pdf Committees: =========== http://users.encs.concordia.ca/~sera2010/People.html For further inquires about SERA2010 conference and event planning, please e-mail to: ser...@en... You may obtain further information on the conference at its web site http://users.encs.concordia.ca/~sera2010/ Sincerely yours, SERA2010 organizers =============================================================================== |
From: CISSE 2. <ci...@ci...> - 2009-10-12 01:07:07
|
Dear Colleagues, Due to numerous deadline extension requests from potential CISSE 2009 authors, the CISSE organizing committee has decided to extend the paper submission deadline to 10/26/2009. Please note that this is a hard deadline, so that the technical committees can perform their paper reviewing duties in a timely manner. If you received this email in error, please forward it to the appropriate department at your institution. If you wish to unsubscribe please follow the unsubscribe link at bottom of the email. Please do not reply to this message. If you need to contact us please email us at in...@ci... ********************************************************************* * The Fifth International Joint Conferences on Computer, * * Information, and Systems Sciences, and Engineering (CISSE 2009) * * * * * * * * http://www.cisse2009.org * * * * * * * ********************************************************************* December 4-12, 2009 Sponsored by the University of Bridgeport Technically co-sponsored by the IEEE Computer Society, Communications Society and Education Society (Connecticut Section) --------------------------------------------------------------------- CONFERENCE OVERVIEW --------------------------------------------------------------------- CISSE 2009 provides a virtual forum for presentation and discussion of the state-of the-art research on computers, information and systems sciences and engineering. CISSE 2009 is the fifth conference of the CISSE series of e-conferences. CISSE is the World's first Engineering/Computing and Systems Research E-Conference. CISSE 2005 was the first high-caliber Research Conference in the world to be completely conducted online in real-time via the internet. CISSE 2005 received 255 research paper submissions and the final program included 140 accepted papers, from more than 45 countries. CISSE 2006 received 691 research paper submissions and the final program included 390 accepted papers, from more than 70 countries. CISSE 2007 received 750 research paper submissions and the final program included 406 accepted papers. A total of 948 paper submissions were received for CISSE 2008 and the final program included 382 accepted papers, from more than 80 countries. The virtual conference will be conducted through the Internet using web-conferencing tools, made available by the conference. Authors will be presenting their PowerPoint, audio or video presentations using web-conferencing tools without the need for travel. Conference sessions will be broadcast to all the conference participants, where session participants can interact with the presenter during the presentation and (or) during the Q&A slot that follows the presentation. This international conference will be held entirely on-line. The accepted and presented papers will be made available and sent to the authors after the conference both on a DVD (including all papers, powerpoint presentations and audio presentations) and as a book publication. Springer, the official publisher for CISSE, published the 2005 proceedings in 2 books and the CISSE 2006, CISSE 2007 and CISSE 2008 proceedings in four books each. Conference participants - authors, presenters and attendees - only need an internet connection and sound available on their computers in order to be able to contribute and participate in this international ground-breaking conference. The on-line structure of this high-quality event will allow academic professionals and industry participants to contribute their work and attend world-class technical presentations based on rigorously refereed submissions, live, without the need for investing significant travel funds or time out of the office. The concept and format of CISSE is ground-breaking. The PowerPoint presentations, final paper manuscripts and time schedule for live presentations over the web are available for two weeks prior to the start of the conference for all registrants, so that the participants can choose the presentations they want to attend and think about questions that they might want to ask. The live audio presentations were also recorded and are part of the permanent CISSE on-line archive - accessible to all registrants- which also includes all the papers, PowerPoint and audio presentations. Potential non-author conference attendees who cannot make the on-line conference dates are encouraged to register, as the entire joint conferences will be archived for future viewing. The CISSE conference audio room provides superb audio even over low speed internet connections, the ability to display PowerPoint presentations, and cross-platform compatibility (the conferencing software runs on Windows, Mac, and any other operating system that supports Java). In addition, the conferencing system allows for an unlimited number of participants, which in turn granted us the opportunity to allow all CISSE participants to attend all presentations, as opposed to limiting the number of available seats for each session. Prospective authors are invited to submit full papers electronically in Microsoft Word or Adobe PDF format through the website of the conference at http://www.cisse2009.org. Accepted papers must be presented in the virtual conference by one of the authors. To submit your paper, please visit http://www.cisse2009.org CISSE 2009 is composed of the following four conferences: International Conference on Systems, Computing Sciences and Software Engineering (SCSS 09) Topics: Grid Computing, Internet-based Computing Models, Resource Discovery, Programming Models and tools, e-Science and Virtual Instrumentation, Biometric Authentication, Computers for People of Special Needs, Human Computer Interaction, Information and Knowledge Engineering, Algorithms, Parallel and Distributed processing, Modeling and Simulation, Services and Applications, Embedded Systems and Applications, Databases, Programming Languages, Signal Processing Theory and Methods, Signal Processing for Communication, Signal Processing Architectures and Implementation, Information Processing, Geographical Information Systems, Object Based Software Engineering, Parallel and Distributed Computing, Real Time Systems, Multiprocessing, File Systems and I/O, Kernel and OS Structures. International Conference on Telecommunications and Networking (TeNe 09) Topics: Optical Networks and Switching, Computer Networks, Network architectures and Equipment, Access Technologies, Telecommunication Technology, Coding and Modulation technique, Modeling and Simulation, Spread Spectrum and CDMA Systems, OFDM technology, Space-time Coding, Ultra Wideband Communications, Medium Access Control, Spread Spectrum, Wireless LAN: IEEE 802.11, HIPERLAN, Bluetooth, Cellular Wireless Networks, Cordless Systems and Wireless Local Loop, Mobile Network Layer, Mobile Transport Layer, Support for Mobility, Conventional Encryption and Message Confidentiality, Block Ciphers Design Principles, Block Ciphers Modes of Operation, Public-Key Cryptography and Message Authentication, Authentication Application, Stenography, Electronic Mail Security, Web Security, IP Security, Firewalls, Computer Forensics. International Conference on Engineering Education, Instructional Technology, Assessment, and E-learning (EIAE 09) Topics: Instructional Design, Accreditation, Curriculum Design, Educational Tools, 2-2-2 Platforms, Teaching Capstone Design, Teaching Design at the Lower Levels, Design and Development of e-Learning tools, Assessment Methods in Engineering, Development and Implementation of E-learning tools, Ethics in Education, Economical and Social Impacts of E-learning. International Conference on Industrial Electronics, Technology & Automation (IETA 09) Topics: Advanced and Distributed Control Systems, Intelligent Control Systems (NN, FL, GA, .etc), Expert Systems, Man Machine Interaction, Data Fusion, Factory Automation, Robotics, Motion Control, Machine Vision, MEMS Sensors and Actuators, Sensors Fusion, Power Electronics, High Frequency Converters, Motors and Drives, Power Converters, Power Devices and Components, Electric Vehicles and Intelligent Transportation, Process Automation, Factory Communication, Manufacturing Information System Advances in Manufacturing Systems, Industrial Applications of Multi Media, Intelligent Systems Instrumentation, Industrial Instrumentation, Modeling and Simulation, Signal Processing, Image and Data Processing, VR and Parallel systems.. Paper Submission ================= Prospective authors are invited to submit full papers electronically in Microsoft Word or Adobe PDF format through the website of the conference at http://www.cisse2009.org. Accepted papers must be presented in the virtual conference by one of the authors. To submit your paper, visit http://www.cisse2009.org New Paper submission Deadline: October 26th, 2009 Notification of Acceptance: November 12th, 2009 Final Manuscript and Registration: November 26th, 2009 ------------------------------------------------------------------------ S. Patel CISSE 2009 Support Team University of Bridgeport e-mail: in...@ci... Bridgeport, CT 06604, U.S.A. http://www.cisse2009.org ------------------------------------------------------------------------ Click here on http://server1.streamsend.com/streamsend/unsubscribe.php?cd=3326&md=362&ud=019114c7e7be93713843cbc2f9191fd6 <http://server1.streamsend.com/streamsend/unsubscribe.php?cd=3326&md=362&ud=019114c7e7be93713843cbc2f9191fd6> to update your profile or Unsubscribe |
From: SourceForge.net <no...@so...> - 2009-07-21 14:01:25
|
Read and respond to this message at: https://sourceforge.net/forum/message.php?msg_id=7518921 By: nobody I guess that wasn't me, but some jester. And i am sorry, but i don't think i'll have time to digg into this. Cheers, Mirko ______________________________________________________________________ You are receiving this email because you elected to monitor this forum. To stop monitoring this forum, login to SourceForge.net and visit: https://sourceforge.net/forum/unmonitor.php?forum_id=213052 |
From: SourceForge.net <no...@so...> - 2009-07-20 20:48:50
|
Read and respond to this message at: https://sourceforge.net/forum/message.php?msg_id=7517200 By: nobody Yes, I agree, we can cooperate for to do this. Thanks Mirko ______________________________________________________________________ You are receiving this email because you elected to monitor this forum. To stop monitoring this forum, login to SourceForge.net and visit: https://sourceforge.net/forum/unmonitor.php?forum_id=213052 |