posted by user: mitrokat || 4390 views || tracked by 5 users: [display]

SI Personal and Ubiquous Computing 2010 : Special Issue User-Driven RFID Applications and Challenges, Journal of Personal and Ubiquitous Computing (Springer)

FacebookTwitterLinkedInGoogle

Link: http://lasecwww.epfl.ch/~katerina/CFP/CFP_RFID.pdf
 
When N/A
Where N/A
Submission Deadline Oct 15, 2010
Notification Due Dec 15, 2010
Final Version Due Mar 14, 2011
Categories    rfid technology   rfid applications   rfid security & privacy   ubiquitous computing
 

Call For Papers

Call for Papers
Journal of Personal and Ubiquitous Computing (Springer)
Special Theme on "User-Driven RFID Applications and Challenges"
--------------------------------------------------------------------
*****Overview*****

Radio Frequency Identification (RFID) systems are emerging as one of the most pervasive computing technologies due to their low cost and their broad applicability. RFID communication is fast, convenient and its application can substantially save time, improve services, reduce labor cost, thwart product counterfeiting and theft and maintain quality standards. Common applications range from highway toll collection, supply chain management, public transportation, controlling building access, animal tracking to developing smart home appliances and remote keyless entry for automobiles.

While RFID technology provides promising benefits such as inventory visibility and business process automation, some significant challenges need to be overcome before these benefits can be realized. One important issue is how to process and manage RFID data, which is typically in large volume, noisy and unreliable, time-dependent, dynamically changing, and of varying ownership. Another issue is how to seamlessly integrate low-level RFID data into (existing) enterprise information infrastructures (e.g., upper-level business processes). Finally, RFID systems present a number of inherent vulnerabilities with serious potential security implications. Indeed, given the ability of inexpensively tagging and thus monitoring a large number of items and/or people, RFID raises some serious security and privacy concerns. RFID systems are vulnerable to a broad range of malicious attacks ranging from passive eavesdropping to active interference.

This special issue aims at presenting the latest developments, trends, and research challenges and solutions for RFID Technology. Topics of interest include, but are not limited to:

- Innovative RFID-enabled applications.
- RFID and physical user interfaces.
- RFID security & privacy.
- Case studies and field trials.
- Next generation RFID technologies.
- Behaviour analysis and situation awareness.
- RFID case studies, field trials, industrial applications.
- Data management issues in RFID applications.
- Integrated RFID and Sensor networks.
- Web services and RFID.
- Performance evaluation of RFID systems and applications.

*****Submission Guidelines*****

Papers submitted to this special issue for possible publication must be original and must not be under consideration for publication in any other journal or conference. Papers in the issue are expected to be substantially extended and revised from conference or workshop versions.

******Important Dates******

- Manuscript submission deadline: 15th of October 2010
- Reviews due: 15th of December 2010
- Revised papers due: 31st of January 2011
- Final Decision: 28th of February 2011
- Camera-ready papers due: 14th of March 2011
- Tentative Publication date: Summer/Fall issue, 2011



******Guest Editors******

Dr. Katerina Mitrokotsa
School of Computer & Communication Sciences,
Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland
katerina.mitrokotsa@epfl.ch

Dr. Michael Sheng
School of Computer Science
The University of Adelaide, Australia
qsheng@cs.adelaide.edu.au

Dr. Sherali Zeadally
Department of Computer Science and
Information Technology,
University of the District of Columbia, USA
szeadally@udc.edu

Dr. Zakaria Maamar
College of Information Technology,
Zayed University, U.A.E
zakaria.maamar@zu.ac.ae



Related Resources

ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
NLPD 2025   6th International Conference on NLP & Big Data
SI: Model-Driven Performance Engg in CPS 2025   IET CPS Theory & Applications, Special Issue: Model-Driven System-Performance Engineering for CPS
EDUR 2025   3rd International Conference on Educational Research
ICSNC 2025   The Twentieth International Conference on Systems and Networks Communications
UbiComp4VRU 2025   International Workshop on Ubiquitous Computing for Vulnerable Road Users
ISCAI 2025   2025 4th International Symposium on Computing and Artificial Intelligence
SI - AI&Cyber - Applied Sciences (MDPI) 2025   Special Issue on Artificial Intelligence and Cybersecurity: Challenges and Opportunities
CENTRIC 2025   The Eighteenth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
SI_Fault_IoV_OTJ 2025   SI on Tools, Techniques, and Applications for Fault Tolerant and Reliable Vehicular Ad-hoc Networks (VANET) and Internet of Vehicles (IoV), The Open Transportation Journal