posted by system || 3477 views || tracked by 3 users: [display]

DAWAM 2008 : 3rd Int. Workshop on Dependability Aspects on Data WArehousing and Mining Applications

FacebookTwitterLinkedInGoogle

Link: http://www.ares-conference.eu/conf/index.php?option=com_content&task=view&id=35
 
When Mar 4, 2008 - Mar 7, 2008
Where Barcelona, Spain
Submission Deadline Nov 16, 2007
Categories    databases   data warehousing   data mining
 

Call For Papers

Overview

Nowadays, the rapid growth of information technologies has brought
tremendous opportunities for data sharing, integration, and analysis
across multiple distributed, heterogeneous data sources. In the past
decade, data warehousing and mining are the well-known technologies
used for data analysis and knowledge discovery in vast domain of
applications.

Data mining technology has emerged as a means of identifying
patterns and trends from large quantities of data. Data mining has
used a data warehousing model of gathering all data into a central
site, then running an algorithm against that data.

A growing attention has been paid to the study, development and
application of data warehousing and mining. Nevertheless,
dependability aspects in these applications such as availability,
reliability, integrity, privacy, and security issues are still being
investigated. For example, in data warehousing applications, privacy
considerations may prevent the approach of collecting data into the
centralized warehouse because each data source has different privacy
policy. Furthermore, the complexity of security increases as
different sources of information are combined. Reliable, consistent
and trustworthy of information are also significant requirements in
data warehousing applications. Data mining has been shown to be
beneficial in confronting various types of attacks to computer
systems such as fraud detection, intrusion prevention. In some
applications, e.g. clinic information system, government management,
business competitive information, it is required to apply the mining
algorithms without observing the confidential data values thus
demands the privacy preservation. There are also many challenging
issues that need further investigation in the context of data mining
from both privacy and security perspectives such as mining of
imbalanced data, bioinformatics data, streaming data, ubiquitous
computing data, grid computing data etc.

The goals of this workshop are to bring together users, engineers and
researchers (from industry and academy) alike to present their recent
work, discuss and identify problems, synergize different views of
techniques and policies, and brainstorm future research directions on
various dependability aspects of data warehousing and data mining
applications. We strongly encourage researchers and practitioners
with interest in the areas of reliability, availability, privacy and
security, databases, data warehousing, data mining, and statistics
to submit their experience, and/or research results.

Topics related to any of dependability aspects in data warehousing
and mining, theory, systems and applications are of interest. These
include, but are not limited to the following areas:

Dependability and fault tolerance
High Availability and Disaster Recovery
Survivability of evaluative systems
Reliability and Robustness Issues
Accuracy and reliability of responses
Reliable and Failure Tolerant Business Process Integration
Reliable Event Management and Data Stream Processing
Failure Tolerant and trustworthy Sensor Networks
Highly available data warehouses for business processes integration
Handling different or incompatible formats, and erroneous data
Privacy and security policies and social impact of data mining
Privacy preserving data integration
Access control techniques and secure data models
Encryption & Authentication
Pseudonymization and Encryption
Anonymization and pseudonymization
Trust management, and security
Security in Aggregation and Generalization
User Profile Based Security
Secure multi-party computation
Secondary use of personal data, clinic data, credit record
Fraud and misuse detection
Intrusion detection and tolerance
Data mining applications for terrorist detection
Private queries by a (semi-trusted) third party
Query authentication, logging, auditing, access control and authorization policies


The program of the workshop will be a combination of invited talks,
paper/poster presentations and discussions.
Important Dates

Submission Deadline: November, 16th 2007
Author Notification: December, 17th 2007
Author Registration: December, 31st 2007
Proceedings Version: January, 15th 2007
Conference/Workshop: March 10-13th, 2008
Submission Guidelines

Authors are invited to submit research and application papers in IEEE
Computer Society Proceedings Manuscripts style (two columns,
single-spaced, including figures and references, using 10 fonts, and
number each page). You can confirm the IEEE Computer Society
Proceedings

Author Guidelines at the following web page:

URL: http://www.ieee.org/portal/cms_docs/pubs/confpubcenter/pdfs/samplems.pdf
http://www.icst.org/download/authorskit/ieeetemplate.doc

Submission are classified into 2 categories (1) full paper (8
pages) and (2) short paper (5 pages) representing original, previously unpublished work. Submitted papers will be carefully evaluated based on originality, significance, technical soundness, and clarity of exposition.

Contact author must provide the following information: paper title,
authors' names, affiliations, postal address, phone, fax, and e-mail
address of the author(s), about 200-250 word abstract, and about five
keywords and register at our ARES website:

http://www.ares-conference.eu/conf/

You can also prepare your paper in PDF file and send it to the workshop co-chair: Prof. Bhavani Thuraisingham, The University of Texas at Dallas, USA ( bhavani.thuraisingham@utdallas.eduThis e-mail address is being protected from spam bots, you need JavaScript enabled to view it ) or Dr. Nguyen Manh Tho, Institute of Software Technology, Vienna University of Technology, Austria ( tho@ifs.tuwien.ac.atThis e-mail address is being protected from spam bots, you need JavaScript enabled to view it )

Submission of a paper implies that should the paper be accepted, at
least one of the authors will register and present the paper in the
conference. Accepted papers will be given guidelines in preparing
and submitting the final manuscript(s) together with the
notification of acceptance.

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
ICDM 2024   IEEE International Conference on Data Mining
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
ICoSR 2025   2025 4th International Conference on Service Robotics
DMML 2025   6th International Conference on Data Mining & Machine Learning
AMLDS 2025   IEEE--2025 International Conference on Advanced Machine Learning and Data Science
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
CSITEC 2025   11th International Conference on Computer Science, Information Technology
PAKDD 2025   29th Pacific-Asia Conference on Knowledge Discovery and Data Mining
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing