<html><body><div style="color:#000; background-color:#fff; font-family:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:8pt">Apologies if you received multiple copies of this IEEE UbiSafe 2014 CFPs <br style="" class="">(Paper Submission Deadline: June 10, 2014)<br style="" class=""><br style="" class="">--------------------------------------------------------------------------------------------------------------------<br style="" class="">Call for Papers <br style="" class="">The 6th IEEE International Symposium on UbiSafe Computing (UbiSafe 2014)<br style="" class="">Beijing, China, 24-26 September, 2014<br style="" class="">http://trust.csu.edu.cn/conference/UbiSafe2014/ <br style="" class=""><br style="" class="">In Conjunction with<br style="" class="">The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2014)<br style="" class="">Beijing, China, 24-26
September, 2014<br style="" class="">http://www.greenorbs.org/TrustCom2014/<br style="" class=""><br style="" class=""><br style="" class="">Introduction<br style="" class=""><br style="" class="">Computers are now available anytime, anywhere, by different means, and distributed unobtrusively <br style="" class="">throughout everyday environments in which physical objects/artifacts embedded with invisible <br style="" class="">computers are sensible and networked locally and globally. Such "any" computers open tremendous <br style="" class="">opportunities to provide numerous novel services/applications in both real world and cyber spaces, <br style="" class="">and exist ubiquitously in our daily life, working, learning, traveling, entertainment, medicine, <br style="" class="">etc. Although it is yet unclear what exactly the real-cyber integrated worlds would be, there is <br style="" class="">no doubt that they must be safe.<br style="" class=""><br
style="" class="">The 6th IEEE International Symposium on Ubisafe Computing (UbiSafe 2014) will be held in conjunction <br style="" class="">with "The 13th IEEE International Conference on Trust, Security and Privacy in Computing and <br style="" class="">Communications (TrustCom 2014)". It follows the success of UbiSafe-13 in Melbourne, Australia. It aims <br style="" class="">at bringing together researchers and practitioners in the world working on theories and technologies <br style="" class="">for ubiquitous artifacts to function safely for different purposes; for ubiquitous systems to work <br style="" class="">safely in various situations; and for ubiquitous environments to behave safely with all people.<br style="" class=""> <br style="" class=""><br style="" class="">Scope and Interests<br style="" class=""><br style="" class="">IEEE UbiSafe 2014 is an international symposium for presenting and discussing emerging ideas and <br style=""
class="">trends in aspects of UbiSafe computing, but are not limited to:<br style="" class=""><br style="" class="">(1) Fundamentals<br style="" class="">UbiSafe concepts, definitions, basic elements, models, frameworks and methodologies, human-centric <br style="" class="">paradigms, multi-disciplinary/inter-disciplinary/trans-disciplinary approaches, semantics, ontologies, <br style="" class="">UbiSafe requirements and formal specifications and validations, information assurance, etc.<br style="" class=""><br style="" class="">(2) Technologies<br style="" class="">Security and privacy protection, reliability and fault tolerance, risk analysis, uncertainty and <br style="" class="">exception handling, socially intelligent agents, intuitive/natural user interface, interaction design, <br style="" class="">context-awareness, intelligent computing, service-oriented computing, hardware, software, middleware, etc.<br style="" class=""><br style=""
class="">(3) Systems<br style="" class="">Embedded systems, wearable systems, augmented systems, context-based systems, communication systems, <br style="" class="">safety-critical systems, survivable systems, persistent systems, autonomous/autonomic systems, proactive <br style="" class="">systems, network infrastructure, sensor networks, etc.<br style="" class=""><br style="" class="">(4) Applications<br style="" class="">Smart objects, smart environments, information appliance and artifacts, everyday gadgets, robots, safety care, <br style="" class="">healthcare, medical care and services, working, learning, traveling, entertainment, case studies, etc.<br style="" class=""><br style="" class="">(5) Measures and Assessments<br style="" class="">UbiSafe attributes and measures for safety, trust, faith, amenity, easiness, comfort, satisfaction and worry, <br style="" class="">UbiSafe levels and relations, UbiSafe quality, assessment criteria and
authority, subjective and objective <br style="" class="">assessment standards, evaluation methodologies, testing, measuring and monitoring tools, etc.<br style="" class=""><br style="" class="">(6) Human Factors and Social Issues<br style="" class="">Human and social aspects of UbiSafe, UbiSafe sources and factors, social rules, regulations and laws, human <br style="" class="">factors, human behavior analysis, modeling of human feelings, traditional and cultural issues, ethical issues, etc.<br style="" class=""><br style="" class=""><br style="" class="">Submission and Publication Information<br style="" class=""><br style="" class="">All presented papers in the conference will be published in the proceedings of the conference and submitted to <br style="" class="">the IEEE Xplore Digital Library. Papers should be written in English conforming to the IEEE conference <br style="" class="">proceedings format (8.5" x 11", Two-Column). Papers should be
submitted through the paper submission system at <br style="" class="">the symposium website. Each paper is limited to 6 pages (or 8 pages with the over length charge). Distinguished <br style="" class="">papers, after further revisions, will be considered for possible publication in SCI & EI indexed special issues <br style="" class="">of prestigious international journals. The program committee will select and award one "Best Paper Award" for <br style="" class="">this symposium. By submitting a paper to the conference, authors assure that if the paper is accepted, at least <br style="" class="">one author will attend the conference and present the paper.<br style="" class=""><br style="" class=""><br style="" class="">Important Dates<br style="" class="">(1) Submission Deadline: 10 June, 2014<br style="" class="">(2) Authors
Notification: 10 July, 2014<br style="" class="">(3) Final Manuscript Due: 30 July, 2014 <br style="" class="">(4) Registration Due: 30 July, 2014<br style="" class="">(5) Conference Dates: 24-26 September, 2014<br style="" class=""> <br style="" class=""><br style="" class="">General Co-Chairs<br style="" class="">Guojun Wang, Central South University, China<br style="" class="">Athanasios V. Vasilakos, National Technical University of Athens, Greece <br style="" class=""><br style="" class="">Program Co-Chairs<br style="" class="">Gregorio Martinez, University of Murcia, Spain<br style=""
class="">Yang Xiang, Deakin University, Australia<br style="" class=""><br style="" class="">Program Committee Members(In alphabetical order)<br style="" class="">Li Bai, Temple University, USA<br style="" class="">Atsuo Hazeyama, Tokyo Gakugei University, Japan<br style="" class="">Michel Hurfin, Irisa, INRIA, France<br style="" class="">Qasim Raza Iqbal, Jaguar Land Rover Cars Ltd, UK<br style="" class="">Xin Jin, Pennsylvania State University, USA<br style="" class="">Satoshi Kurihara, Osaka University, Japan<br style="" class="">Jiang (Leo) Li, Howard University, USA<br style="" class="">Jorge Martinez-Bauset, Universidad Politecnica de Valencia, Spain<br style="" class="">Homayoun Nikookar, Delft University of Technology, Holland<br style="" class="">Thomas Noel, University of Strasbourg, France<br style="" class="">Masayuki Okamoto, TOSHIBA<br style="" class="">Rubem Pereira, Liverpool John Moores University, UK<br style="" class="">Ali Shahrabi,
Glasgow Caledonian University, UK<br style="" class="">Kuei-Ping Shih, Tamkang University, Taiwan<br style="" class="">Evi Syukur, Monash University, Australia<br style="" class="">Johnson Thomas, Oklahoma State University, USA<br style="" class="">Eric Totel, CentraleSupelec / IRISA / INRIA, France<br style="" class="">Honggang Wang, University of Massachusetts Dartmouth, USA<br style="" class="">Yufeng Wang, Nanjing University of Posts and Telecommunications, China<br style="" class="">Zhiyong Xu, Suffolk University, USA<br style="" class="">Jon (Jong-Hoon) Youn, University of Nebraska at Omaha, USA<br style="" class="">Sijing Zhang, University of Bedfordshire, UK<br style="" class=""><br style="" class="">Publicity Co-Chairs<br style="" class="">Scott Fowler, Linkoping University, Sweden<br style="" class="">Md. Zakirul Alam Bhuiyan, Central South University, China<br style="" class=""> <br style="" class="">Steering Committee<br style=""
class="">Vipin Chaudhary, University at Buffalo, SUNY, USA<br style="" class="">Jingde Cheng, Saitama University, Japan<br style="" class="">Yuanshun Dai, University of Tennessee, USA<br style="" class="">Thomas Grill, Johannes Kepler Univ. Linz, Austria<br style="" class="">Runhe Huang, Hosei University, Japan<br style="" class="">Qun Jin, Waseda University, Japan<br style="" class="">Ismail Khalil, Johannes Kepler Univ. Linz, Austria<br style="" class="">Xiaolin (Andy) Li, University of Florida, USA<br style="" class="">Jianhua Ma, Hosei University, Japan<br style="" class="">Guojun Wang, Central South University, China<br style="" class="">Laurence T. Yang, St. Francis Xavier University, Canada<br style="" class="">Qiangfu Zhao, The University of Aizu, Japan<br style="" class=""><br style="" class="">Webmaster<br style="" class="">Bo Wang, Central South University, China <br style="" class=""><br style="" class="">Contact<br style="" class=""><br
style="" class="">Please email inquiries concerning IEEE UbiSafe 2014 to:<br style="" class="">Prof. Guojun Wang: csgjwang AT gmail DOT com <br style="" class="">and the symposium organizers: UbiSafe2014 AT gmail DOT com<br style="" class=""><br style="" class="">Copyright @ Trusted Computing Institute, CSU<br style="" class="">http://trust.csu.edu.cn/<br style="" class="">--------------------------------------------------------------------------------------------------------------------<br style="" class=""><br style="" class=""><div style="" class=""><br style="" class=""></div></div></body></html>