<html><body><div style="color:#000; background-color:#fff; font-family:arial, helvetica, sans-serif;font-size:12pt">Apologies if you received multiple copies of this IEEE UbiSafe-13 preliminary CFP.<br><div style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><div style="font-family: times new roman, new york, times, serif; font-size: 12pt;"><div id="yiv1846462907"><div><div style="color:#000;background-color:#fff;font-family:arial, helvetica, sans-serif;font-size:12pt;"><div><br>-------------------------------------------------------------------------------<br>Call for Papers for the 5th IEEE International Symposium on UbiSafe Computing<br>(IEEE UbiSafe-13)<br> <br><br>Sponsors: <br>Institute of Electrical and Electronics Engineers (IEEE) <br>IEEE Computer Society<br><br><br>Organizers: <br>Trusted Computing Institute, Central South University, China<br>Deakin University, Australia <br><br><br>Venue & Dates:<br>Melbourne,
Australia, 16-18 July, 2013<br><br><br>Conference Website:<br>http://trust.csu.edu.cn/conference/ubisafe2013/<br><br><br>In Conjunction with<br>The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE
TrustCom-13)<br>http://anss.org.au/trustcom2013/<br><br><br>Introduction<br><br>Computers are now available anytime, anywhere, by different means, and distributed unobtrusively throughout everyday environments in which physical objects/artifacts embedded with invisible computers are sensible and networked locally and globally. Such "any" computers open tremendous opportunities to provide numerous novel services/applications in both real world and cyber spaces, and exist ubiquitously in our daily life, working, learning, traveling, entertainment, medicine, etc. Although it is yet unclear what exactly the real-cyber integrated worlds would be, there is no doubt that they must be safe.<br><br>The 5th IEEE International Symposium on Ubisafe Computing (UbiSafe-13) will be held in conjunction with "The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13)". It follows the success of UbiSafe-12 in
Liverpool, UK. It aims at bringing together researchers and practitioners in the world working on theories and technologies for ubiquitous artifacts to function safely for different purposes; for ubiquitous systems to work safely in various situations; and for ubiquitous environments to behave safely with all people.<br><br><br>Scope and Interests<br><br>IEEE UbiSafe-13 is an international symposium for presenting and discussing emerging ideas and trends in aspects of UbiSafe computing, but are not limited to:<br><br>(1) Fundamentals <br><br>UbiSafe concepts, definitions, basic elements, models, frameworks and methodologies, human-centric paradigms, multi-disciplinary/inter-disciplinary/trans-disciplinary approaches, semantics, ontologies, UbiSafe requirements and formal specifications and validations, information assurance, etc. <br><br>(2) Technologies<br><br>Security and privacy protection, reliability and fault tolerance, risk analysis, uncertainty
and exception handling, socially intelligent agents, intuitive/natural user interface, interaction design, context-awareness, intelligent computing, service-oriented computing, hardware, software, middleware, etc. <br><br>(3) Systems <br><br>Embedded systems, wearable systems, augmented systems, context-based systems, communication systems, safety-critical systems, survivable systems, persistent systems, autonomous/autonomic systems, proactive systems, network infrastructure, sensor networks, etc.<br><br>(4) Applications <br><br>Smart objects, smart environments, information appliance and artifacts, everyday gadgets, robots, safety care, healthcare, medical care and services, working, learning, traveling, entertainment, case studies, etc. <br><br>(5) Measures and Assessments<br><br>UbiSafe attributes and measures for safety, trust, faith, amenity, easiness, comfort, satisfaction and worry, UbiSafe levels and relations, UbiSafe quality, assessment
criteria and authority, subjective and objective assessment standards, evaluation methodologies, testing, measuring and monitoring tools, etc.<br><br>(6) Human Factors and Social Issues<br><br>Human and social aspects of UbiSafe, UbiSafe sources and factors, social rules, regulations and laws, human factors, human behavior analysis, modeling of human feelings, traditional and cultural issues, ethical issues, etc. <br><br><br>Submission and Publication Information<br><br>The accepted papers from this symposium will be published by IEEE Computer Society in IEEE TrustCom-13 conference proceedings (indexed by EI Compendex). Papers should be written in English conforming to the IEEE conference proceedings format (8.5" x 11", Two-Column). Papers should be submitted through the paper submission system at the symposium website. Each paper is limited to 6 pages (or 8 pages with the over length charge). Distinguished papers, after further revisions, will be
considered for possible publication in SCI & EI indexed special issues of prestigious international journals. The program committee will select and award one "Best Paper Award" for this symposium. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper.<br><br><br>Important Dates<br><br>(1) Submission Deadline: 20 March, 2013 <br>(2) Authors Notification: 15 April, 2013 <br>(3) Final Manuscript Due: 15 May, 2013 <br>(4) Registration Due: 15 May, 2013 <br>(5) Conference
Dates: 16-18 July, 2013<br><br><br>Steering Committee<br><br>Vipin Chaudhary, University at Buffalo, SUNY, USA <br>Jingde Cheng, Saitama University, Japan<br>Yuanshun Dai, University of Tennessee, USA <br>Thomas Grill, Johannes Kepler Univ. Linz, Austria <br>Runhe Huang, Hosei University, Japan<br>Qun Jin, Waseda University, Japan<br>Ismail Khalil, Johannes Kepler Univ. Linz, Austria<br>Xiaolin (Andy) Li, University of Florida, USA<br>Jianhua Ma, Hosei University, Japan<br>Guojun Wang, Central South University, China<br>Laurence T. Yang, St. Francis Xavier University, Canada<br>Qiangfu Zhao, The University of Aizu, Japan<br><br><br>General Co-Chairs<br><br>Athanasios V. Vasilakos, National Technical University of Athens, Greece <br>Wenbin Jiang, Huazhong University of Science and Technology, China <br><br><br>Program Co-Chairs<br><br>Gregorio Martinez,
University of Murcia, Spain <br>Ryan K. L. Ko, University of Waikato, New Zealand<br><br><br>Program Committee (In alphabetical order)<br><br>Li Bai, Temple University, USA<br>Mehrdad Dianati, University of Surrey, UK<br>Antonio Mana Gomez, University of Malaga, Spain<br>Jinhua Guo, University of Michigan at Dearborn, USA<br>Chong Han, University of Suurey, UK<br>Atsuo Hazeyama, Tokyo Gakugei University, Japan<br>Michael Hempel, University of Nebraska-Lincoln, USA<br>Michel Hurfin, Irisa, INRIA, France<br>Tomoo Inoue, University of Tsukuba, Japan<br>Qasim Raza Iqbal, Jaguar Land Rover Cars Ltd, UK<br>Aravind Kailas, University of North Carolina Charlotte, USA<br>Satoshi Kurihara, Osaka University, Japan<br>Jiang (Leo) Li, Howard University, USA<br>Maofu Liu, Wuhan University of Science and Techonology, China<br>Xi Liu, Carnegie Mellon University, USA<br>Shichuan Ma, Qualcomm, USA<br>Jorge Martinez-Bauset, Universidad Politecnica de Valencia,
Spain<br>Consolee Mbarushimana, Staffordshire University, UK<br>Homayoun Nikookar, Delft University of Technology, Holland<br>Thomas Noel, University of Strasbourg, France<br>Masayuki Okamoto, TOSHIBA Corporation, Japan<br>Wenjiang Pei, Southeast University, China<br>Dongming Peng, University of Nebraska-Lincoln, USA<br>Ella Pereira, Edge Hill University, UK<br>Rubem Pereira, Liverpool John Moores University, UK<br>Weizhong Qiang, Huazhong University of Science and Technology, China<br>Ali Shahrabi, Glasgow Caledonian University, UK<br>Kuei-Ping Shih, Tamkang University, Taiwan<br>Mohammed Houssaini Sqalli, KFUPM, Saudi Arabia<br>Evi Syukur, Monash University, Australia<br>Kenichi Takahashi, Tottori University, Japan<br>Johnson Thomas, Oklahoma State University, USA<br>Eric Totel, CentraleSupelec / IRISA / INRIA, France<br>Honggang Wang, University of Massachusetts Dartmouth, USA<br>Wei Wang, South Dakota State University, USA<br>Yufeng Wang, Nanjing
University of Posts and Telecommunications, China<br>Isaac Woungang, Ryerson University, Canada<br>Liudong Xing, University of Massachusetts Dartmouth, USA<br>Zhiyong Xu, Suffolk University, USA<br>Jon (Jong-Hoon) Youn, University of Nebraska at Omaha, USA<br>Sherali Zeadally, University of the District of Columbia, USA<br>Sijing Zhang, University of Bedfordshire, UK<br>Sheng Zhong, SUNY Buffalo, USA<br>Deqing Zou, Huazhong University of Science and Technology, China<br>Xukai Zou, Indiana University-Purdue University, USA <br><br><br>Publicity Co-Chairs<br><br>Scott Fowler, Linkoping University, Sweden <br>Fang Qi, Central South University, China <br><br> <br>Webmaster<br><br>Jie Wang, Central South University, China <br><br> <br>Contact<br><br>Please email inquiries concerning UbiSafe 2013 to: <br>Prof. Guojun Wang: csgjwang AT gmail DOT com and the symposium organizers (ubisafe2013 AT gmail DOT com).<br><br><br>Copyright @ Trusted Computing
Institute, CSU<br>http://trust.csu.edu.cn/<br>-------------------------------------------------------------------------------<br></div></div></div></div><br><br> </div> </div> </div></body></html>