[ogsa-wg] DAWAM 2009 Call for papers: 4th Int. Workshop "Dependability Aspects on Data WArehousing & Mining"
Nguyen Manh Tho
tho at ifs.tuwien.ac.at
Tue Oct 21 04:23:59 CDT 2008
Apologies for multiple copies due to cross postings. Please send to
interested colleagues and students
CALL FOR PAPERS
-------------------------------------------------------------------------
Forth International Workshop "Dependability Aspects on Data WArehousing
and Mining applications" DAWAM 2009.
dawam.ares-conference.eu
http://www.ares-conference.eu/conf/index.php/workshops/dawam
-------------------------------------------------------------------------
in conjunction with The Forth International Conference on
Availability, Reliability and Security - ARES 2009
(http://www.ares-conference.eu/conf/)
March 16th � 19th, 2009
Fukuoka Institute of Technology (FIT)
Fukuoka, Japan
Overview
--------
The rapid growth of information technologies has brought tremendous
opportunities for data sharing, integration, and analysis across multiple
distributed, heterogeneous data sources. In the past decade, data
warehousing and mining are the well-known technologies used for data
analysis and knowledge discovery in vast domain of applications.
Data mining technology has emerged as a means of identifying patterns and
trends from large quantities of data. Data mining has used a data
warehousing model of gathering all data into a central site, then running an
algorithm against that data.
A growing attention has been paid to the study, development and application
of data warehousing and mining. Nevertheless, dependability aspects in these
applications such as availability, reliability, integrity, privacy, and
security issues are still being investigated. For example, in data
warehousing applications, privacy considerations may prevent the approach of
collecting data into the centralized warehouse because each data source has
different privacy policy. Furthermore, the complexity of security increases
as different sources of information are combined.
Reliable, consistent and trustworthy of information are also significant
requirements in data warehousing applications. Data mining has been shown to
be beneficial in confronting various types of attacks to computer systems
such as fraud detection, intrusion prevention. In some applications, e.g.
clinic information system, government management, business competitive
information, it is required to apply the mining algorithms without observing
the confidential data values thus demands the privacy preservation. There
are also many challenging issues that need further investigation in the
context of data mining from both privacy
and security perspectives such as mining of imbalanced data, bioinformatics
data, streaming data, ubiquitous computing data, grid computing data etc.
Starting from the beginning of the ARES conference in 2006, the DAWAM
workshop (workshop on "Dependability Aspects on Data Warehousing and Mining
applications"), like ARES, will reach the 4th year in 2009. Previous DAWAM
workshops were held at Vienna University of Technology, Austria on April
20-22, 2006 (DAWAM 2006), April 10-13, 2007 (DAWAM 2007), Polytechnic
University of Catalonia, Barcelona, Spain, March 4-7, 2008 (DAWAM 2008).
This year, DAWAM 2009 will be held at Fukuoka Institute of Technology,
Fukuoka, Japan, March 16-19, 2009.
The goals of this workshop are to bring together users, engineers and
researchers (from industry and academy) alike to present their recent work,
discuss and identify problems, synergize different views of techniques and
policies, and brainstorm future research directions on various dependability
aspects of data warehousing and data mining
applications. We strongly encourage researchers and practitioners with
interest in the areas of reliability, availability, privacy and security,
databases, data warehousing, data mining, and statistics to submit their
experience, and/or research results.
Topics related to any of dependability aspects in data warehousing and
mining, theory, systems and applications are of interest. These include, but
are not limited to the following areas:
� Dependability and fault tolerance
� High Availability and Disaster Recovery
� Survivability of evaluative systems
� Reliability and Robustness Issues
� Accuracy and reliability of responses
� Reliable and Failure Tolerant Business Process Integration
� Reliable Event Management and Data Stream Processing
� Failure Tolerant and trustworthy Sensor Networks
� Highly available data warehouses for business processes integration
� Handling different or incompatible formats, and erroneous data
� Privacy and security policies and social impact of data mining
� Privacy preserving data integration
� Access control techniques and secure data models
� Encryption & Authentication
� Pseudonymization and Encryption
� Anonymization and pseudonymization
� Trust management, and security
� Security in Aggregation and Generalization
� User Profile Based Security
� Secure multi-party computation
� Secondary use of personal data, clinic data, credit record
� Fraud and misuse detection
� Intrusion detection and tolerance
� Data mining applications for terrorist detection
� Private queries by a (semi-trusted) third party
� Query authentication, logging, auditing, access control and
authorization policies
The program of the workshop will be a combination of invited talks,
paper/poster presentations and discussions.
Important Dates
---------------
Submission Deadline: November, 1th 2008
Author Notification: December, 1th 2008
Author Registration: December, 15th 2008
Proceedings Version: December, 15th 2008
Conference/Workshop: March 16-19th, 2009
Submission Guidelines
---------------------
Authors are invited to submit research and application papers in IEEE
Computer Society Proceedings Manuscripts style (two columns, single-spaced,
including figures and references, using 10 fonts, and number each page). You
can confirm the IEEE Computer Society Proceedings Author Guidelines at the
following web page:
URL: http://www.ieee.org/portal/pages/pubs/transactions/stylesheets.html
Submission are classified into 3 categories (1) full paper (6 pages), (2)
short paper (4 pages) and (3) poster (1 page) representing original,
previously unpublished work.
Submitted papers will be carefully evaluated based on originality,
significance, technical soundness, and clarity of exposition.
Contact author must provide the following information: paper title, authors'
names, affiliations, postal address, phone, fax, and e-mail address of the
author(s), about 200-250 word abstract, and about five keywords and register
at our ARES website:
http://www.ares-conference.eu/conf/ and select DAWAM workshop submission.
You can also prepare your paper in PDF file and send it to the workshop
co-chair:
Prof. Bhavani Thuraisingham, The University of Texas at Dallas, USA (
bhavani.thuraisingham at utdallas.edu ) or Dr. Nguyen Manh Tho, Institute of
Software Technology, Vienna University of Technology, Austria (
tho at ifs.tuwien.ac.at )
Submission of a paper implies that should the paper be accepted, at least
one of the authors will register and present the paper in the conference.
Accepted papers will be given guidelines in preparing and submitting the
final manuscript(s) together with the notification of acceptance.
Publication
-----------
All accepted papers will be published as ISBN proceedings published by IEEE
Computer Society. Based on quality and referee reviews, some papers not
suitable for acceptance as full paper will be accepted for presentation at
DAWAM 2009 as short paper or Poster presentation category and will be also
included in the IEEE Proceedings.
Like in DAWAM 2007 and DAWAM 2008, A selected number of DAWAM 2009 best
papers will be nominated to be published as special issues in appropriate
journals such as International Journal of Business Intelligence and Data
Mining (IJBIDM), Journal of automatic and trusted computing (JoATC).
Workshop Organizer Co-chairs
----------------------------
Bhavani Thuraisingham, Prof.
Director of the Cyber Security Research Center
Erik Jonsson School of Engineering and Computer Science
The University of Texas at Dallas, USA
bhavani.thuraisingham at utdallas.edu
Nguyen Manh Tho, Ph.D. (main contact)
Institute of Software Technique and Interactive System,
Vienna University of Technology,
Favoriten strasse 9-11/188
A1040 Vienna, Austria
tho at ifs.tuwien.ac.at
Program Committee
-----------------
Jemal Abawajy, Deakin University, Australia
Mikhail Atallah, Purdue University, USA
Davide Balzarotti, University of California, USA
Barbara Carminati, University of Insubria at Varese, Italy
Pawan Chowdhary, IBM T J Watson Research Center, USA
Alfredo Cuzzocrea, Italian National Research Council, Italy
Herve Debar, France Telecom R&D, France
Josep Domingo-Ferrer, Rovira i Virgili University of Tarragona, Spain
Ulrich Flegel, SAP Research CEC Karlsruhe, Germany
Jimmy Huang, York University, Canada
Kwok-Yan Lam, Tsinghua University, China
Xue Li, The University of Queensland, Australia
Zongwei Luo, University of Hong Kong, China
Nasrullah Memon, Aalborg University, Denmark
Taneli Mielikeinen, Nokia Research Center Palo Alto, USA
Anirban Mondal, University of Tokyo, Japan
Tho-Manh Nguyen, Vienna University of Technology, Austria
Torsten Priebe, Capgemini Consulting �sterreich AG, Austria
Raghav Rao, SUNY at Buffalo, USA
Yucel Saygin, Sabanci University, Turkey
Josef Schiefer, Senactive IT-Dienstleistungs GmbH, Austria
Ben Soh, La Trobe University, Australia
Toshihiro Tabata, Okayama University, Japan
David Taniar, Monash University, Australia
Bhavani Thuraisingham, The University of Texas at Dallas, USA
Vassilios S. Verykios, University of Thessaly, Greece
Duminda Wijesekera, George Mason University, USA
Yang Yanjiang, Singapore Management University, Singapore
Justin Zhan, Carnegie Mellon University, USA
More information about the ogsa-wg
mailing list