Home > Workshops > DAWAM 2007
General
Home Home
News News
Important Dates Important Dates
Focus of the Conference Focus of the Conference
Organizational Committee Organizational Committee
Program Committee Program Committee
Contact Information Contact Information
Previous Conferences Previous Conferences
Contributors
Call for Papers Call for Papers
Symposium Symposium
Workshops Workshops
Submission Guidelines Submission Guidelines
Journal Releases Journal Releases
CISIS-2007 Conference
Participants
Registration Fee Registration Fee
Registration Form Registration Form
Programme Programme
Accommodation Accommodation
Conference Venue Conference Venue
Travel Information Travel Information
Social Events Social Events
Partner- / Sponsorship
Partners Partners
DAWAM 2007 PDF Print E-mail

Second International Workshop "Dependability Aspects on Data WArehousing and Mining applications" DAWAM 2007

http://www.ares-conference.eu/conf/ --> Workshops -->DAWAM 2007

in conjunction with The Second International Conference on Availability, Reliability and Security - ARES 2007 (http://www.ares-conference.eu/conf/)

Overview

Nowadays, the rapid growth of information technologies has brought tremendous opportunities for data sharing, integration, and analysis across multiple distributed, heterogeneous data sources. In the past decade, data warehousing and mining are the well-known technologies used for data analysis and knowledge discovery in vast domain of applications.

Data mining technology has emerged as a means of identifying patterns and trends from large quantities of data. Data mining has used a data warehousing model of gathering all data into a central site, then running an algorithm against that data.

The goals of this workshop are to bring together users, engineers and researchers (from industry and academy) alike to present their recent work, discuss and identify problems, synergize different views of techniques and policies, and brainstorm future research directions on various dependability aspects of data warehousing and data mining applications. We strongly encourage researchers and practitioners with interest in the areas of reliability, availability, privacy and
security, databases, data warehousing, data mining, and statistics to submit their experience, and/or research results.

Topics related to any of dependability aspects in data warehousing and mining, theory, systems and applications are of interest. These include, but are not limited to the following areas:

· Dependability and fault tolerance
· High Availability and Disaster Recovery
· Survivability of evaluative systems
· Reliability and Robustness Issues
· Accuracy and reliability of responses
· Reliable and Failure Tolerant Business Process Integration
· Reliable Event Management and Data Stream Processing
· Failure Tolerant and trustworthy Sensor Networks
· Highly available data warehouses for business processes integration
· Handling different or incompatible formats, and erroneous data
· Privacy and security policies and social impact of data mining
· Privacy preserving data integration
· Access control techniques and secure data models
· Encryption & Authentication
· Pseudonymization and Encryption
· Anonymization and pseudonymization
· Trust management, and security
· Security in Aggregation and Generalization
· User Profile Based Security
· Secure multi-party computation
· Secondary use of personal data, clinic data, credit record
· Fraud and misuse detection
· Intrusion detection and tolerance
· Data mining applications for terrorist detection
· Private queries by a (semi-trusted) third party
· Query authentication, logging, auditing, access control and authorization policies

The program of the workshop will be a combination of invited talks, paper/poster presentations and discussions.

Important Dates

Submission Deadline: December, 17th 2006
Author Notification: January, 14th 2007
Author Registration: January, 21st 2007
Proceedings Version: January, 21st 2007
Conference/Workshop: April 10-13th, 2007

Submission Guidelines

Authors are invited to submit research and application papers in IEEE Computer Society Proceedings Manuscripts style (two columns, single-spaced, including figures and references, using 10 fonts, and number each page). You can confirm the IEEE Computer Society Proceedings

Author Guidelines at the following web page:

URL: http://www.ieee.org/portal/pages/pubs/transactions/stylesheets.html
or http://www.tinmith.net/tabletop2006/IEEE/Format/instruct.htm

Submission are classified into 2 categories (1) full paper (8 pages) and (2) short paper (5 pages) representing original, previously unpublished work. Submitted papers will be carefully evaluated based on originality, significance, technical soundness, and clarity of exposition.

Duplicate submissions are not allowed. A submission is considered to be a duplicate submission if it is submitted to other conferences/workshops/journals or it has been already accepted to be published in other conferences/workshops/journals. Duplicate submissions thus will be automatically rejected without reviews.

Contact author must provide the following information: paper title, authors' names, affiliations, postal address, phone, fax, and e-mail address of the author(s), about 200-250 word abstract, and about five keywords and register at our ARES website:

http://www.ares-conference.eu/conf/

The online submission system will be available at the begining of October 2006.

You can also prepare your paper in PDF file and send it to the workshop co-chair: Dr. Nguyen Manh Tho, Institute of Software Technology, Vienna University of Technology, via email:

Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference. Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance.

Publication

All accepted papers (full and short papers) will be published as ISBN proceedings published by IEEE Computer Society. Based on quality and referee reviews, some papers not suitable for acceptance as full paper will be accepted for presentation at DAWAM 2007 as short paper or Poster presentation category and will be also included in the IEEE Proceedings.

A selected number of papers will be nominated to be published as
special issues in appropriate journals such as Journal of automatic
and trusted computing (JoATC).

Workshop Organizer Co-chairs

Jimmy Huang, Prof.,
School of Information Technology,
York University,
Toronto, Ontario
Canada M3J 1P3

Josef Schiefer, Ph.D.
Senactive IT-Dienstleistungs GmbH,
Phorusgasse 8
A1040 Vienna, Austria

Nguyen Manh Tho, Ph.D. (main contact)
Institute of Software Technique and Interactive System,
Vienna University of Technology,
Favoriten strasse 9-11/188
A1040 Vienna, Austria

Program Committee

Jemal Abbawajy, Deakin University, Australia
Mikhail Atallah, Purdue University, USA
Barbara Carminati, University of Insubria at Varese, Italy
Pawan Chowdhary, IBM T. J. Watson Research Center, USA
Hervé Debar, France Télécom R&D, France
Josep Domingo-Ferrer, Rovira i Virgili University of Tarragona, Spain
Ulrich Flegel, University of Dortmund, Germany
Tyrone Grandison, IBM Almaden Research, USA
Jimmy Huang, York University, Canada
James Joshi, University of Pittsburgh, USA
Christopher Kruegel, Vienna University of Technology, Austria
Kwok-Yan Lam, Tsinghua University, China
Xue Li, The University of Queensland Brisbane, Australia
Zongwei Luo, The University of Hong Kong, China
Henrique Madeira, University of Coimbra, Portugal
Michael May, Fraunhofer AIS, Germany
Nasrullah Memon, Aalborg University Esbjerg, Denmark
Taneli Mielikäinen, University of Helsinki, Finland
Tho Manh Nguyen, Vienna University of Technology, Austria
Daniel O'Leary, University of Southern California, USA
Torsten Priebe, Capgemini Consulting Österreich AG, Vienna, Austria
Raghav Rao, SUNY at Buffalo, USA
Yücel Saygin, Sabanci University, Turkey
Josef Schiefer, Senactive IT-Dienstleistungs GmbH, Austria
Ben Soh, La Trobe University, Australia
Toshihiro Tabata, Okayama University, Japan
David Taniar, Monash University, Australia
Vassilios S. Verykios, University of Thessaly, Greece
Duminda Wijesekera, George Mason University, USA
Yanjiang Yang, Singapore Management University, Singapore
Justin Zhan, Carnegie Mellon University, USA
Sheng Zhong, SUNY at Buffalo, USA