Call For Participation
Last modified
2015-07-09 18:18
Call For Participation The 2015 World Congress in Computer Science, Computer Engineering, and Applied Computing July 27-30, 2015, Las Vegas, USA http://www.world-academy-of-science.org/ This is an invitation to attend The 2015 World Congress in Computer Science, Computer Engineering, and Applied Computing. The congress is composed of 20 major tracks composed of: 14 tutorials; 720 research presentations divided into 141 sessions and workshops; and 16 keynotes, invited lectures, and panel discussions, ... - all will be held simultaneously, same location and dates: July 27-30, 2015. Attendees will have full access to all conferences' sessions, tracks, and tutorials. Registration is required to attend. As of now, 59% of registrants are from academia, 23% from industry; 17% from government and funding agencies; and 1% unknown (correct as of July 6). About half of the attendees are from outside USA; from 77 nations. The congress has participants, speakers, authors affiliated with over 170 different universities (including many from the top 50 ranked institutions), many major IT corporations (including, Microsoft, Google, Apple, SAP, Oracle, Amazon, Yahoo, Samsung, IBM, Ebay, GE, Siemens, and others), government research agencies (NSF, NIH, DoE, US Air Force, a number of security agencies, and others), and national laboratories (including, NASA, ANL, LLNL, Sandia, ORNL, Lawrence Berkeley National Lab, Los Alamos National Lab, ...) In addition, we will also have speakers discussing Intellectual Property issues as well as other related topics. See below for: A. General Information B. Broad Topical Scopes C. Registration Information (Deadline: July 22, 2015) D. Congress Schedules/Programs E. Location of congress (hotel) F. Partial list of planned Tutorials and Featured Keynotes G. Partial list of organized sessions H. Misc Information We look forward to seeing you July 27-30, 2015. -----------------------------cut here----------------------------- A. GENERAL INFORMATION: http://www.world-academy-of-science.org/ B. BROAD TOPICAL SCOPES: Advances in Big Data Analytics (ABDA); Parallel and Distributed Processing Techniques and Applications (PDPTA); Health Informatics and Medical Systems (HIMS); Bioinformatics and Computational Biology (BIOCOMP); Biomedical Engineering and Sciences (BIOENG); Image Processing, Computer Vision, and Pattern Recognition (IPCV); Artificial Intelligence (ICAI); Security and Management (SAM); Software Engineering Research and Practice (SERP); e-Learning, e-Business, Enterprise Information Systems, and e-Government (EEE); Wireless Networks (ICWN); Data Mining (DMIN); Internet Computing and Big Data (ICOMP); Frontiers in Education in Computer Science and Computer Engineering (FECS); Scientific Computing (CSC); Modeling, Simulation and Visualization Methods (MSV); Embedded Systems and Applications (ESA); Grid and Cloud Computing and Applications (GCA); Foundations of Computer Science (FCS); and Information & Knowledge Engineering (IKE). C. REGISTRATION INFORMATION: (Deadline: July 22, 2015) http://www.world-academy-of-science.org/worldcomp15/ws/registration D. CONGRESS SCHEDULES/PROGRAMS: The detailed schedule will be available in mid July (under the tab "Program") at: http://www.world-academy-of-science.org/ E. LOCATION OF CONGRESS: http://www.world-academy-of-science.org/worldcomp15/ws/location Attendees are to reserve their hotel rooms as soon as possible. A limited number of rooms are available at the reduced negotiated rate - reservations will be honored on the first-come first-served basis. F. PLANNED TUTORIALS AND FEATURED KEYNOTES: (partial list) http://www.world-academy-of-science.org/worldcomp15/ws/tutorials http://www.world-academy-of-science.org/worldcomp15/ws/keynotes In addition to the above, there are a number of focused invited talks and lectures in individual tracks (these are not listed in the above links but will be listed in the individual schedules for each conference track.) Tutorials are free to conference registrants - Tutorial titles include (partial list): most tutorials are 3 hours long: -> Cyberwarfare, Cybercrime and Cybersecurity -> Energy-Aware Resource Management for Computing Systems -> Best Practices for Developing Real-World Mobile Apps, Software as a Service (SaaS) and Web Services -> Building Dependable Distributed Systems -> What Should We Know About Computational Humor -> Introduction to Cryptography and Network Security -> JavaFX Quickstart - Moving Beyond Swing for Rich User Interfaces -> Human Motion Tracking and Recognition with Microsoft Kinect -> eMaintenance: Knowledge Discovery in Asset Data by the Means of Data Mining -> Application of MATLAB in Science and Engineering -> Analyzing and Protecting RFID and Card Access Systems -> Data Privacy for Emerging Mobile Cloud Apps -> Integrative Big-Data Analysis for Translational Genomics Research Partial/featured list of Keynotes/Invited Talks: -> Computing the Context at the End of the Non-Semantic Era Prof. Victor Raskin Distinguished Professor of English and Linguistics and Professor of Computer Science and of Computer and Information Technology (Courtesy); Co-Founder, Associate Director, and Charter Fellow of Center for Education and Research in Information Assurance and Security (CERIAS); Purdue University, Indiana, USA -> Lessons from Commercializing Ideas from Colleges Around the World: What College Students, Faculty and Researchers Must Do to be Successful Dr. Sandeep Chatterjee EVx Global (www.evxglobal.com); Named Young Global Leader by the World Economic Forum for his professional accomplishments, commitment to society and potential to contribute to shaping the future of the world. -> Artificial Neurogenesis Dr. James A. Crowder Chief Engineer, Raytheon Intelligence, Information, and Services; Aurora, Colorado, USA; Chief Mentor/Scientist of the Automation, Robotics and Artificial Intelligence Research Lab - Alexandria School of Innovation, Douglas County, Colorado, USA -> The Infinity Computer and Numerical Computations with Infinities and Infinitesimals Prof. Yaroslav D. Sergeyev, Ph.D., D.Sc., D.H.C. Inventor of the Infinity Computer; Distinguished Professor, Head of Numerical Calculus Laboratory, University of Calabria, Rende, Italy; and Professor (part-time), Lobachevsky State University, Nizhni Novgorod, Russia -> Data Science: The Road Ahead Dr. Peter Geczy National Institute of Advanced Industrial Science and Technology (AIST), Japan -> Evolving Systems: Theory, Implementation, Application Prof. Igor Schagaev London Metropolitan University, London, UK; Research Advisor of ITACS Ltd, UK -> Funding Enabling Technologies Dr. Steve Richfield Founder of Savant AI Holdings, USA -> Systems Genomics Approaches for Streamlined Big-Data Integrative Genomics Analysis Dr. Mary Yang Director of MidSouth Bioinformatics Center; Director of the Joint Bioinformatics Ph.D. Program of University of Arkansas Little Rock Donaghey College of Engineering & Information Technology and University of Arkansas for Medical Sciences, Arkansas, USA -> Data Mining for RUL Estimation of Complex Assets Prof. Diego Galar Division of Operation and Maintenance Engineering, Lulea University of Technology, Lulea, Sweden -> Panel: Virtual Intelligence vs. Artificial Intelligence: The Good, The Bad, and the Ugly PANEL CHAIR/Moderator: Dr. James A. Crowder, Chief Engineer, Raytheon Intelligence, Information and Services, Aurora, Colorado, USA; PANELISTS: Prof. Victor Raskin*, Dr. Julia Taylor**, Dr. John N. Carbone*** *Distinguished Professor of English and Linguistics and Professor of Computer Science and of Computer and Information Technology (Courtesy); Co-Founder, Associate Director, and Charter Fellow of Center for Education and Research in Information Assurance and Security (CERIAS); Purdue University, Indiana, USA **Assistant Professor, Computer and Information Technology; Fellow of Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University, Indiana, USA ***Engineering Fellow, Raytheon Intelligence, Information and Services, Aurora, Colorado, USA -> Panel: Security Challenges PANEL CHAIR/Moderator: Prof. George Markowsky Professor and Associate Director, School of Computing and Information Science; Chair Int'l Advisory Board of IEEE IDAACS; Director 2013 Northeast Collegiate Cyber Defense Competition; Cooperating Prof. School of Policy & Int'l Affairs UMaine; University of Maine, Orono, USA G. PARTIAL LIST OF ORGANIZED SESSIONS (multiple speakers per session): Some of these sessions are further divided into more focused sessions and many have topics that overlap the topics of other sessions (correct as of July 6, 2015) -> High Performance Computing, Distributed and Parallel Processing, Databases -> Big Data, Data Centers and Cloud Computing -> Big Data Search, Mining Methods, Clustering, Knowledge Extraction and Engineering -> Applications of Big Data + Software Tools -> Big Data Analytics and Related Issues -> Bioinformatics -> Protein Classification and Structure Prediction, and Folding -> Computational Structural Biology and Drug Design -> Gene Expression, Regulatory Networks, and Sequencing -> Signal Processing and Imaging Science -> Computational Biology -> Medical Devices and Supporting Systems -> Biomedical Engineering and Imaging Science -> Computational Science and Optimization Methods -> Modeling and Simulation Frameworks -> Fuzzy Logic and Systems + Data Science -> Semantic Web and Web Services -> Simulation and Computational Modeling Methods -> Finite Element Methods and Finite Difference Methods -> Cellular Automata -> Scientific Computing, Algorithms and Applications -> Real-World Data Mining Applications, Challenges, and Perspectives -> Regression, Classification, Clustering, Association -> Segmentation, Clustering, Association + Multimedia Mining -> Management Issues, Web Tools + Prediction and Forcasting Methods -> e-Business, e-Commerce, Enterprise Information Systems -> e-Learning + Educational Concepts and Tools, and Academia Related Issues -> Embedded Systems and Novel Application -> Embedded Microcontollers + Optimizations -> HPC + Virtual Machines + Fault Tolerant Devices -> Resource Constrained Devices -> Power Aware Computing and Energy Minimization -> Graph and Network Based Algorithms + Formal Methods -> Optimization Methods + Search and Indexing Algorithms -> Foundation of Computer Science + Education -> Use of Robots, Gamification, and Other Technologies in Education -> Teaching Methodologies, Curriculum and Course Development -> Adaptive Learning Systems + Experiential Learning -> Online and Massive Open Online Courses -> Assessment Strategies + Student Outcomes + and Accreditation -> Case Studies, Capstone Projects to Enhance Learning -> Science, Technology, Engineering and Mathematics - STEM Education -> Flipping the Classroom -> Recruiting Students to Computer Science, Retention Methods and Strategies + Addressing Diversity Issues -> Teaching and Testing Tools and Methods, e-Textbooks -> Cloud Computing, Cloud Services and Security + Mobile Computing -> Scalable Computing + Data Centers -> Novel Methods and Systems to Enhance Diagnosis + Tools for Hospital Emergency Rooms -> Elderly Care: Systems, Methods, and Novel Practices + Assistive Technologies -> Healthcare and Medical Information Systems, Monitoring Systems -> Healthcare and Cloud Infrastructure + Mobile Systems + Wearables -> Computer Algorithms and Systems + Surgery Planning + Drug Discovery and New Frameworks for Prediction and Early Detection of Diseases -> Informatics for Education and Research in Health and Medicine -> Robotics and Applications - hardware and software -> Genetic Algorithms + Evolutionary Strategies -> Fuzzy Logic and Sets, Fuzzy Control and Applications -> Knowledge Discovery and Machine Learning -> Knowledge Base Systems, Representation, Discovery + Information Engineering Methods and Related Issues -> Intelligent Linguistic Technologies -> Machine Translation and Natural Language Processing -> Artificial Intelligence: Theory, Algorithms and Applications + Cognitive Science -> Pattern Recognition and Supporting Algorithms -> Neural Networks -> Internet and Web Computing, Infrastructures + Security and Privacy -> Mobility: Mobile Computing and Applications -> Wireless Sensor Networks -> Security, Privacy, and Related Systems and Algorithms -> Ad-Hoc Networks, MANET -> Green Networks and Energy Efficient Systems -> Information and Knowledge Extraction, Representation and Sharing -> Big Data Analytics + Data Warehouse Design + Social Media + Business Intelligence and Recommender Systems -> Knowledge Engineering and Information Fusion + Knowledge Discovery and Semantic Web -> Information Retrieval AND Ontology Based Methods -> Legislation and Intellectual Property Issues -> Identity Management Methods -> Recognition and Detection Methods: Face, Gesture, Object, Character -> Image Segmentation Methods -> Wavelet Transformation, Analysis, Applications + Watermarking Methods, Security, Privacy, and Encryption Methods -> Motion Segmentation, Tracking Algorithms + Video Processing, Analysis and Applications -> Pattern Recognition and Feature Detection, Extraction and Classification -> Imaging Science Algorithms for 2D and 3D -> Computer Vision + Medical Imaging + Assistive Technologies -> Soft Computing in Image Processing and Computer Vision -> Modeling, Visualization, and Virtual Environments -> Simulation, Numerical Methods, and Applications -> Resource Management, Resource Allocation, Scheduling, and Data Management -> Distributed Processing, and Applications -> Communication Topologies and Interconnection Networks -> Software Tools and Systems and Parallelizing Compilers -> Mathematical Modeling and Problem Solving -> Parallel Processing Algorithms, Systems, and Applications -> Cloud Computing and Next Generation -> Mobile Computing, Ad Hoc Networks, and Wireless Sensor Networks -> Hardware and Software Reconfigurability -> Network on Chip (NOC) and Embedded Systems -> HPC for Complex Systems -> Biometrics + Forensics + Security Education -> Cybersecurity Education -> Computer Security + Security Applications -> Cryptographic Technologies and Hardware Security -> Security Management -> Network Security + Cybersecurity Education -> Embedded Wearable Security + Covert Communication and Information Assurance -> Security Applications + Cryptology + Biometrics -> Formal Methods + Process and Product Line Improvement + Agile Development + Workflow Management + Project Management -> Testing, Verification, Validation Methods + Security Analysis, and Software Quality Issues -> Software Engineering and Software Scalability -> Modeling Languages, UML + Petri Nets, SOA and Applications + Portability + Requirements Engineering and Aspect Oriented Software Engineering -> Software Architecture and Frameworks + Enterprise Architecture H. MISC INFORMATION: To get a feeling about the conferences' atmosphere, see some delegates photos available at: http://worldcomp.phanfare.com/ http://worldcomp.phanfare.com/6626396 (to see a slide show, click on "Start SlideShow" tab at the url above.) Publication: Measurable Scientific Impact of Congress: As of December 14, 2014, papers published in the conference proceedings that have been held as part of this congress, have received over 27,914 citations (includes 3,346 self-citations). Citation data is obtained from Microsoft Academic Search. The citation data does not even include more than 15,000 other citations to papers in conferences whose first offerings were initiated by this congress. CONTACT: Inquiries should be sent to: sc@world-comp.org