Postgraduate Research in Microelectronics & Electronics (PrimeAsia) 2010 in Shanghai

The Asia Pacific Conference on Postgraduate Research in Microelectronics & Electronics (PrimeAsia) is a new initiative of the IEEE Circuits and Systems Society for engaging students. It aims to provide opportunities for postgraduate students to present their research works and to interact with people in the research community and industry. In addition to the conference program, tutorials on emerging technologies will be conducted by internationally renowned experts, some sessions will be dedicated to companies, enabling students to get in touch with companies forjob opportunities and university professors forpostdoc/research fellow/research engineer positions.

All papers will go through a peer review process. Papers rated in top 30% will receive awards, i.e. GOLD Leaf, Silver Leaf, Bronze Leaf certificates.All papers will be published in the IEEE Xplore and SCI & EI indexed.

PrimeAsia-CFP.pdf

Advertisements

CALL for WORKSHOP PROPOSALS – ACM CCS 2010

Proposals are solicited for workshops to be held in conjunction with ACM CCS 2010. Each workshop provides a forum to address a specific topic at the forefront of security research. A workshop must be full day in length.Proceedings of all workshops will be available (on a CD) to the workshop attendees. Each workshop will also offer on-line proceedings through ACM Digital Library, with a separate ISBN.

Workshop Proposal Submission

For new workshops, proposals should include:

* Workshop title
* A draft “Call for Papers” articulating the scope and topics covered by the workshop
* A brief summary and justification for the workshop, including anticipated benefits to the ACM CCS community.
* Planned activities
* Expected number of submissions and acceptance rate
* Expected number of attendees
* Program chair(s), and, if available, tentative program committee * A one-paragraph biographical sketch for each organizer, describing relevant qualifications, including research and conference/workshop organizing experience

For previously-held workshops, in addition to the above, proposals must provide the following information, for the most recent incarnation of the workshop:

* Number of submissions
* Number of accepted papers
* Number of registered attendees

Please submit workshop proposals by email to the ACM CCS Workshop Chairs, Ting Yu (yu@csc.ncsu.edu) and Ninghui Li (ninghui@cs.purdue.edu). All workshop proposals will be reviewed by the CCS Steering Committee.

Proposal Evaluation Criteria

* The workshop is within scope of computer and communications security and concerns a coherent and worthwhile technical topic.
* Its novelty with respect to other forums, especially with respect to other CCS workshops.
* Its likely impact on the target community, including likely high participation.
* One of the best ways to show likely interest is to have a strong set of researchers who have agreed to serve on the PC.

Important Dates

* Submissions deadline: February 15, 2010 (Deadline Extended, early submissions are welcome)
* Decisions communicated: February 28, 2010

CCS Support for Workshops

If a workshop proposal is accepted, the ACM CCS workshop chair will work closely with workshop organizers. The ACM CCS workshop chair will help create/maintain the submission and reviewing websites for workshops, and is responsible for monitoring and coordinating organizational aspects of all workshops.

ACM CCS 2010 – ACM Computer and Communications Security

ACM CCS 2010 OCT 4-8, 2010

HYATT REGENCY CHICAGO, IL, USA
http://sigsac.org/ccs/CCS2010

The annual ACM Computer and Communications Security Conference is a leading international forum for information security researchers, practitioners, developers, and users to explore cutting-edge ideas and results, and to exchange techniques, tools, and experiences. The conference seeks submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects of computer and communications security, as well as case studies and implementation experiences. Papers should have relevance to the construction, evaluation, application, or operation of secure systems. Theoretical papers must make a convincing argument for the practical significance of the results. All topic areas related to computer and communications security are of interest and in scope. Accepted paper will be published by ACM Press in the conference proceedings. Outstanding papers will be invited for possible publication in a special issue of the ACM Transactions on Information and System Security.

Paper Submission Process

Submissions must be made by the deadline of April 17, 2010, through the website: http://www.easychair.org/conferences/?conf=ccs2010 Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the conference.

Paper Format

Submissions must be at most ten pages in double-column ACM format (note: pages must be numbered) excluding the bibliography and well-marked appendices, and at most 12 pages overall. Submissions must NOT be anonymized. Only PDF or Postscript files will be accepted. Submissions may also be accompanied by a link to a short (at most 3 minutes) video or slide presentation. For more details on the supplemental material, see the CCS 2010 website. Submissions not meeting these guidelines risk rejection without consideration of their merits.

Tutorial Submissions

Proposals for long (3-hour) and short (1.5-hour) tutorials on research topics of current and emerging interest should be submitted electronically to the tutorials chair by May 24, 2010. The guidelines for tutorial proposals can be found on the website.

Important Dates

– Paper submission due: Saturday, April 17, 2010
– Acceptance notification: Monday, June 21, 2010
– Final papers due: Friday, July 16, 2010

GENERAL CHAIR:
Ehab Al-Shaer (University of North Carolina Charlotte, USA)

PROGRAM CHAIRS:
Angelos D. Keromytis (Columbia University, USA)
Vitaly Shmatikov (University of Texas at Austin, USA)

Tutorial Chair
Gail-Joon Ahn Arizona State University

Workshop Co-Chairs
Ting Yu North Carolina State University, USA
Ninghui Li Purdue University

Treasurer
Sencun Zhu Pennsylvania Sate University, USA

Publication Chair
Hao Chen, UC Davis

Web Chair
Kun Bai IBM T.J. Watson Research, USA

Student Travel Grant Chairs
Angelos Stavrou George Mason University, USA

Poster& Demo Chairs
Adam Lee, University of Pittsburgh, USA
Xinming Ou Kansas State University, USA

Publicity Chairs
Chris Kruegel University of California, Santa Barbara, USA Carlos Becker Westphall, Federal University of Santa Catarina, Brazil

Patrons& Industry Outreach
Bill Chu University of North Carolina Charlotte, USA
XiaoFeng Wang Indiana University, USA
Jorge Lobo IBM T.J. Watson Research, USA

Local Arrangements Committee
Yan Chen (Chair) Northwestern University, USA
V.N. Venkatakrishnan University of Illinois Chicago, USA
Tricha Anjali Illinois Institute of Technology, USA

Regional Arrangements Committee
Alex Liu (Chair) Michigan State University, USA
EJ Jung University of Iowa, USA
Yong Guan Iowa State University, USA
Kui (Quinn) Ren, Illinois Institute of Technology, USA

TECHNICAL PROGRAM COMMITEE:

Ben Adida (Harvard, USA)
Adam Barth (UC Berkeley, USA)
Emery Berger (U of Massachusetts, USA)
Bruno Blanchet (CNRS, ENS, INRIA, France)
Steve Borbash (Dept of Defense, USA)
Nikita Borisov (UIUC, USA)
Stephen Chong (Harvard, USA)
Mihai Christodorescu (IBM Research, USA)
Veronique Cortier (LORIA-CNRS, France)
Jed Crandall (U of New Mexico, USA)
Weidong Cui (Microsoft Research, USA)
Marc Dacier (Eurecom, France)
George Danezis (Microsoft Research, UK)
Roger Dingledine (Tor Project, USA)
Ulfar Erlingsson (Microsoft Research, USA)
Cedric Fournet (MSR-INRIA, France)
Vanessa Friaz-Martinez (Telefonica Research, Spain)
Vinod Ganapathy (Rutgers, USA)
Philippe Golle (PARC, USA)
Virgil Gligor (CMU, USA)
Steven Gribble (U of Washington, USA)
Alex Halderman (U of Michigan, USA)
Susan Hohenberger (Johns Hopkins, USA)
Trent Jaeger (Penn State, USA)
Stas Jarecki (UC Irvine, USA)
Ari Juels (RSA Laboratories, USA)
Apu Kapadia (Indiana U, USA)
Engin Kirda (Eurecom, France)
Yoshi Kohno (U of Washington, USA)
Ralf Kuesters (U of Trier, Germany)
Michael Locasto (George Mason, USA)
Tal Malkin (Columbia, USA)
Patrick McDaniel (Penn State, USA)
Dave Molnar (Microsoft Research, USA)
Fabian Monrose (U of North Carolina, USA)
Steven Murdoch (U of Cambridge, UK)
Steven Myers (Indiana U, USA)
David Naumann (Stevens Tech, USA)
Lasse Overlier (FFI, Norway)
Benny Pinkas (U of Haifa, Israel)
Bart Preneel (KU Leuven, Belgium)
Tom Reps (U of Wisconsin, USA)
Reiner Sailer (IBM Research, USA)
Steve Schneider (U of Surrey, UK)
R. Sekar (SUNY Stony Brook, USA)
Anil Somayaji (Carleton U, Canada)
Angelos Stavrou (George Mason, USA)
Jonathan Trostle (JHU APL, USA)
Helen Wang (Microsoft Research, USA)
XiaoFeng Wang (Indiana U, USA)
Brent Waters (U of Texas at Austin, USA)
Haifeng Yu (NUS, Singapore)
Yuanyuan Zhou (UCSD, USA)
Mary Ellen Zurko (IBM, USA)