<html><body><div style="color:#000; background-color:#fff; font-family:times new roman, new york, times, serif;font-size:12pt"><div><div>===========================================================================</div><div>We apologize in advance if you receive multiple copies of this CFP.</div><div>===========================================================================</div><div><br></div><div><br></div><div>Final CFP: 4th IEEE International Symposium on UbiSafe Computing (IEEE UbiSafe-12)</div><div><br></div><div>Venue & Dates: Liverpool, UK, 25-27 June, 2012</div><div>http://trust.csu.edu.cn/conference/UbiSafe2012/</div><div><br></div><div>In Conjunction with</div><div><br></div><div>The 11th IEEE International Conference on Trust, Security and Privacy</div><div>in Computing and Communications (IEEE TrustCom 2012), </div><div>Liverpool, UK, 25-27 June,
2012</div><div>http://scim.brad.ac.uk/~hmibrahi/TrustCom2012/</div><div><br></div><div>----------------------------------------------------------------------------------</div><div>Highlights: </div><div><br></div><div>Special Issues for Distinguished Papers from IEEE UbiSafe-12</div><div><br></div><div>(1) IEEE Transactions on Parallel and Distributed Systems</div><div>http://www.computer.org/portal/web/tpds</div><div><br></div><div>(2) Concurrency and Computation: Practice and Experience - Wiley</div><div>http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1532-0634</div><div><br></div><div>(3) Journal of Security and Communication Networks - Wiley</div><div>http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122</div><div><br></div><div>----------------------------------------------------------------------------------</div><div><br></div><div><br></div><div>Introduction</div><div><br></div><div>Computers are now available anytime,
anywhere, by different means, and distributed unobtrusively throughout everyday environments in which physical objects/artifacts embedded with invisible computers are sensible and networked locally and globally. Such "any" computers open tremendous opportunities to provide numerous novel services/applications in both real world and cyber spaces, and exist ubiquitously in our daily life, working, learning, traveling, entertainment, medicine, etc. Although it is yet unclear what exactly the real-cyber integrated worlds would be, there is no doubt that they must be safe.</div><div><br></div><div>The 4th IEEE International Symposium on Ubisafe Computing (UbiSafe-12) will be held in conjunction with "The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12)". It follows the success of UbiSafe-11 in Changsha, China. It aims at bringing together researchers and practitioners in the world working on
theories and technologies for ubiquitous artifacts to function safely for different purposes; for ubiquitous systems to work safely in various situations; and for ubiquitous environments to behave safely with all people. </div><div><br></div><div><br></div><div>Scope and Interests</div><div><br></div><div>IEEE UbiSafe-12 is an international symposium for presenting and discussing emerging ideas and trends in aspects of UbiSafe computing, but are not limited to:</div><div><br></div><div>(1) Fundamentals </div><div><br></div><div>UbiSafe concepts, definitions, basic elements, models, frameworks and methodologies, human-centric paradigms, multi-disciplinary/inter-disciplinary/trans-disciplinary approaches, semantics, ontologies, UbiSafe requirements and formal specifications and validations, information assurance, etc. </div><div><br></div><div>(2) Technologies</div><div><br></div><div>Security and privacy protection, reliability and fault
tolerance, risk analysis, uncertainty and exception handling, socially intelligent agents, intuitive/natural user interface, interaction design, context-awareness, intelligent computing, service-oriented computing, hardware, software, middleware, etc. </div><div><br></div><div>(3) Systems </div><div><br></div><div>Embedded systems, wearable systems, augmented systems, context-based systems, communication systems, safety-critical systems, survivable systems, persistent systems, autonomous/autonomic systems, proactive systems, network infrastructure, sensor networks, etc.</div><div><br></div><div>(4) Applications </div><div><br></div><div>Smart objects, smart environments, information appliance and artifacts, everyday gadgets, robots, safety care, healthcare, medical care and services, working, learning, traveling, entertainment, case studies, etc. </div><div><br></div><div>(5) Measures and Assessments</div><div><br></div><div>UbiSafe
attributes and measures for safety, trust, faith, amenity, easiness, comfort, satisfaction and worry, UbiSafe levels and relations, UbiSafe quality, assessment criteria and authority, subjective and objective assessment standards, evaluation methodologies, testing, measuring and monitoring tools, etc.</div><div><br></div><div>(6) Human Factors and Social Issues</div><div><br></div><div>Human and social aspects of UbiSafe, UbiSafe sources and factors, social rules, regulations and laws, human factors, human behavior analysis, modeling of human feelings, traditional and cultural issues, ethical issues, etc. </div><div><br></div><div><br></div><div>Submission and Publication Information</div><div><br></div><div>The accepted papers from this symposium will be published by IEEE Computer Society in IEEE TrustCom-12 conference proceedings (indexed by EI Compendex). Papers should be written in English conforming to the IEEE conference proceedings format
(8.5" x 11", Two-Column). Papers should be submitted through the paper submission system at the symposium website. Each paper is limited to 6 pages (or 8 pages with the over length charge). Distinguished papers, after further revisions, will be published in special issues indexed by SCI and EI (IEEE Transactions on Parallel and Distributed Systems; Concurrency and Computation: Practice and Experience - Wiley; Journal of Security and Communication Networks - Wiley). Submitting a paper to the symposium means that, if the paper is accepted, at least one author should attend the symposium and present the paper. </div><div><br></div><div><br></div><div>Important Dates</div><div><br></div><div>(1) Submission Deadline: 18 March, 2012 (Firm Deadline) </div><div>(2) Authors Notification: 08 April, 2012 </div><div>(3) Final Manuscript Due: 08 May, 2012 </div><div>(4)
Registration Due: 08 May, 2012 </div><div>(5) Conference Dates: 25-27 June, 2012 </div><div><br></div><div><br></div><div>General Co-Chairs</div><div><br></div><div>Athanasios V. Vasilakos, National Technical University of Athens, Greece </div><div>Wenbin Jiang, Huazhong University of Science and Technology, China </div><div><br></div><div><br></div><div>Program Co-Chairs</div><div><br></div><div>Gregorio Martinez, University of Murcia, Spain </div><div>Ryan K. L. Ko, HP Labs, Singapore </div><div> </div><div><br></div><div>Program Committee </div><div>Please check the website for the full list.</div><div><br></div><div><br></div><div>Publicity Co-Chairs</div><div><br></div><div>Scott Fowler, Linkoping University, Sweden </div><div>Fang Qi, Central South University, China </div><div><br></div><div><br></div><div>Steering
Committee</div><div><br></div><div>Vipin Chaudhary, University at Buffalo, SUNY, USA </div><div>Jingde Cheng, Saitama University, Japan</div><div>Yuanshun Dai, University of Tennessee, USA </div><div>Thomas Grill, Johannes Kepler Univ. Linz, Austria </div><div>Runhe Huang, Hosei University, Japan</div><div>Qun Jin, Waseda University, Japan</div><div>Ismail Khalil, Johannes Kepler Univ. Linz, Austria</div><div>Xiaolin (Andy) Li, University of Florida, USA</div><div>Jianhua Ma, Hosei University, Japan</div><div>Guojun Wang, Central South University, China</div><div>Laurence T. Yang, St. Francis Xavier University, Canada</div><div>Qiangfu Zhao, The University of Aizu, Japan</div><div> </div><div><br></div><div>Webmaster</div><div><br></div><div>Xiaoxiao Zheng, Central South University, China</div><div><br></div><div><br></div><div>Contact </div><div><br></div><div>Please email inquiries concerning IEEE UbiSafe 2012
to: </div><div>Prof. Guojun Wang: csgjwang AT gmail DOT com </div><div>and the symposium organizers: UbiSafe2012 AT gmail DOT com </div><div>Homepage: http://trust.csu.edu.cn/faculty/~csgjwang/</div><div style="font-family: 'times new roman', 'new york', times, serif; font-size: 12pt; "><br></div></div> </div></body></html>