ICIW 2012 : The Seventh International Conference on Internet and Web Applications and Services
Conference Series : International Conference on Internet and Web Applications and Services
Call For Papers
The seventh International Conference on Internet and Web Applications and Services) continues a series of co-located events that covers the complementary aspects related to designing and deploying of applications based on IP&Web techniques and mechanisms.
ICIW 2012 comprises five complementary tracks. They focus on Web technologies, design and development of Web-based applications, and interactions of these applications with other types of systems. Management aspects related to these applications and challenges on specialized domains are aided at too. Evaluation techniques and standard position on different aspects are part of the expected agenda.
Internet and Web-based technologies led to new frameworks, languages, mechanisms and protocols for Web applications design and development. Interaction between web-based applications and classical applications requires special interfaces and exposes various performance parameters.
Web Services and applications are supported by a myriad of platforms, technologies, and mechanisms for syntax (mostly XML-based) and semantics (Ontology, Semantic Web). Special Web Services based applications such as e-Commerce, e-Business, P2P, multimedia, and GRID enterprise-related, allow design flexibility and easy to develop new services. The challenges consist of service discovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when designing such applications.
Entertainment systems became one of the most business-oriented and challenging area of distributed real-time software applications’ and special devices’ industry. Developing entertainment systems and applications for a unique user or multiple users requires special platforms and network capabilities.
Particular traffic, QoS/SLA, reliability and high availability are some of the desired features of such systems. Real-time access raises problems of user identity, customized access, and navigation.
Particular services such interactive television, car/train/flight games, music and system distribution, and sport entertainment led to ubiquitous systems. These systems use mobile, wearable devices, and wireless technologies.
Interactive game applications require particular methodologies, frameworks, platforms, tools and languages. State-of-the-art games today can embody the most sophisticated technology and the most fully developed applications of programming capabilities available in the public domain.
The impact on millions of users via the proliferation of peer-to-peer (P2P) file sharing networks such as eDonkey, Kazaa and Gnutella was rapidly increasing and seriously influencing business models (online services, cost control) and user behavior (download profile). An important fraction of the Internet traffic belongs to P2P applications.
P2P applications run in the background of user’s PCs and enable individual users to act as
downloaders, uploaders, file servers, etc. Designing and implementing P2P applications raise particular requirements. On the one hand, there are aspects of programming, data handling, and intensive computing applications; on the other hand, there are problems of special protocol features and networking, fault tolerance, quality of service, and application adaptability
Additionally, P2P systems require special attention from the security point of view. Trust, reputation, copyrights, and intellectual property are also relevant for P2P applications.
On-line communications frameworks and mechanisms allow distribute the workload, share business process, and handle complex partner profiles. This requires protocols supporting interactivity and real-time metrics.
Collaborative systems based on online communications support collaborative groups and are based on the theory and formalisms for group interactions. Group synergy in cooperative networks includes online gambling, gaming, and children groups, and at a larger scale, B2B and B2P cooperation.
Collaborative systems allow social networks to exist; within groups and between groups there are problems of privacy, identity, anonymity, trust, and confidentiality. Additionally, conflict, delegation, group selection, and communications costs in collaborative groups have to be monitored and managed.
Building online social networks requires mechanism on popularity context, persuasion, as well as technologies, techniques, and platforms to support all these paradigms.
During the last years, different web applications based on the use of Internet environments have been introduced to help teachers and students in the learning-teaching process. These web applications, mainly supported by Internet systems and services, are changing the traditional educational process not only in Higher Education (HE) qualifications, but also in open learning for any type of course. Nowadays, there exist different public and commercial Virtual Learning Environments (VLE) aimed at helping teachers to manage courses and contents, as well as to support the students’ learning process. In this sense, VLE are an important factor contributing towards the change from traditional educational methodologies to new paradigms including active teaching. This implies not only a shift in the way of tackling learning and teaching, but also new challenges for software engineers and developers. Virtual Learning Environments have to be built bearing in mind their mandatory use through the Internet, thus requiring important characteristics and capabilities such as security, good latency, several tools for interoperability, storage management, etc.
Also, the age of information and communication has revolutionized the way companies do business, especially in providing competitive and innovative services. Business processes not only integrates departments and subsidiaries of enterprises but also are extended across organizations and to interact with governments. On the other hand, wireless technologies and peer-to-peer networks enable ubiquitous access to services and information systems with scalability. This results in the removal of barriers of market expansion and new business opportunities as well as threats. In this new globalized and ubiquitous environment, it is of increasing importance to consider legal and social aspects in business activities and information systems that will provide some level of certainty. There is a broad spectrum of vertical domains where legal and social issues influence the design and development of information systems, such as web personalization and protection of users privacy in service provision, intellectual property rights protection when designing and implementing virtual works and multiplayer digital games, copyright protection in collaborative environments, automation of contracting and contract monitoring on the web, protection of privacy in location-based computing, etc.
We solicit research and industrial contributions. ICIW 2012 will offer tutorials, plenary sessions, and panel sessions.
The ICIW 2012 will have the following tracks:
Internet and Web-based Applications and Services
Web Services-based Systems and Applications
ENSYS Entertainment Systems
P2PSA P2P Systems and Applications
ONLINE Online Communications, Collaborative Systems, and Social Networks
SERCOMP Service Computing
SLAECE Social and Legal Aspect of Internet Computing
VEWAeL Virtual Environments and Web Applications for eLearning
ECC Enterprise cloud computing
We solicit both academic, research, and industrial contributions. We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals.
Industrial presentations are not subject to the format and content constraints of regular submissions. We expect short and long presentations that express industrial position and status.
Tutorials on specific related topics and panels on challenging areas are encouraged.
The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.
All topics and submission formats are open to both research and industry contributions.
IWAS : Internet and Web-based Applications and Services
Web technologies, frameworks, languages, mechanisms
Web applications design and development
Interaction with/from Web-based applications
Web-based applications’ features
Management of Web-based applications
Evaluation of Web applications
Specialized Web applications
Aggregating multimedia documents
E-business, appliances, and services
IP Grid Management and Grid Services
IP-based convergent solutions and next generation networks
Standards, case studies and special groups on web-based applications
E-business system design, development, and management for SMEs
WSSA : Web Services-based Systems and Applications
Model-driven development of context-aware services
Context-aware service models, architectures and frameworks
Model-driven development of semantic Web services
Web services foundation, architectures, frameworks, languages
Web services architecture and business continuity
Special Web services mechanisms
Semantic Web, Ontology, and Web services
Web service applications
Data Management aspects in Web Services
Autonomic e-Business integration and collaboration
Web service based Grid computing and P2P computing
Web services based applications for e-Commerce
Multimedia applications using Web Services
Automatic computing for Web services
Web services challenges on trust, security, performance, scalability
Enterprise Web services
Web services discovery, announcing, monitoring and management
Platforms, technologies, mechanisms and case studies
Grid architectures, middleware and toolkits
ENSYS: Entertainment Systems
Developing entertainment systems and applications
Platforms for entertainment systems
Speech technology & its usability for entertainment systems
Networking requirements for entertainment systems
Traffic generated by entertainment applications
QoS/SLA on entertainment systems
Reliability and high availability of entertainment systems
Identify aspects in entertainment systems
Real-time access to entertainment systems
Customized access entertainment systems
Navigation and entertainment systems
Integration and interoperability aspects in entertainment systems
Entertainment systems and applications
Networking and system support for entertainment systems
Wireless and mobile technologies for entertainment
Wireless multimedia for entertainment
Systems for music and movie distribution
Games on mobile and resource-constrained devices
Mobile video entertainment systems
Car/flight/train entertainment systems
Ubiquitous entertainment systems
Technologies for sport and entertainment
WiFi wireless home entertainment systems
Wearable technologies for entertainment
P2PSA: P2P Systems and Applications
P2P architectures, techniques, paradigms
P2P programming and data handling
P2P security features
Data and compute intensive applications
P2P networks and protocols
P2P Trust and reputation management
Fault tolerance in P2P, quality of availability, accounting in P2P
Self-adaptiveness in P2P overlay networks
Self-configurable P2P systems
Case studies, benchmarking
Copyright and intellectual property,
Electronic marketplace, Digital asset management and trading systems
Platforms, environments, testbeds
ONLINE: Online Communications, Collaborative Systems, and Social Networks
Theory, frameworks, mechanisms, and tools for online communication
Methodologies and languages for on-line communications
Web services and XML use for online communications
Tools for assessing online work, distributed workload
Shared business processes
Collaborative groups and systems
Theory and formalisms of group interactions
Group synergy in cooperative networks
Online gambling, gaming, children groups
Identity features, risks, jurisdiction for online communications
Specifics emergency and e-coaching on online communications
B2B and B2E cooperation
Privacy, identify, security on online communications
Individual anonymity, group trust, and confidentiality on online groups
Conflict, delegation, group selection
Community costs in collaborative groups
Building online social networks with popularity contexts, persuasion, etc.
Technology support for collaborative systems
Techniques, mechanisms, and platforms for remote cooperation
SERCOMP: Service computing
Business process integration and management
Collective Intelligence for Service Computing
Data Mining of Actual Services
Digital EcoSystems Infrastructure
Economics and Economic Experiments
Human Modeling in Services
Intelligent Agents and Multi-Agent Systems
Intra- and Inter-enterprise services
Knowledge Discovery for Service Computing
Nature Inspired Computing Techniques for Service Computing
Optimization of Service Processes
Psychological Approaches to Services
Self Organizing Infrastructure
Sensing of Human Behaviors
Service-centric business models and their economics
Service discovery, repository and registry
Service evaluation, measurements and delivery audit
Service interaction, service ontologies and service composition
Service Oriented computing
Society and business services (public, utility, business, healthcare, consulting, etc.)
Ubiquitous and pervasive services (technology, context, security)
Value Creation in Services
Web-based basics on service modeling, deployment and maintenance
SLAECE: Social and Legal Aspect of Internet Computing
Principles, theories, and challenges of legal and social aspects
Strategies, modeling, and requirements engineering of legal and social aspects
Architectures, implementations, and deployment consideration of legal and social aspects
Cyber threats, emerging risks, systemic concerns, and emergency preparedness
Social computing and lifestyle computing
Service marketing and customer relationship management
Market structures and emerging business models
Emerging legal issues due to new computing environment
File / information sharing networks and user behavior
Knowledge modeling, management, and application
Negotiation and contracting as well as contract monitoring and enforcement
E-democracy, e-policy, and governance
Legal and social ontologies
Privacy and copyright in collaborative environments and social networks
Intellectual property rights
Trust, security, and privacy
Identity management and access control
Security and privacy in location-based services
VEWAeL: Virtual Environments and Web Applications for eLearning
Web Technologies and Tools for Educational Purposes
Services for E-Learning Platforms
Virtual Learning Environments (VLE)
Course Management Systems
Web applications for Teaching
Social Implications of E-Learning
Teaching-Learning Experiences using the Internet for Educational Purposes
E-learning in the European Higher Education Area (EHEA) and other HE contexts
Web protocols for VLE
Security for VLE
QoS for VLE
Storage management in VLE
ECC: Enterprise cloud computing
Architectures for enterprise clouds
Principles, concepts and methodologies of enterprise cloud computing
Tools, technologies, methodologies and frameworks for enterprise cloud computing
Enterprise IS architectures such as application, information and technology architectures
Synergies between SOA, Grid Computing and Cloud Infrastructures
Quality of Service (QoS) models
'Elastic' and on-demand allocation and management of resources to meet business needs
Benefits, issues and limitations of enterprise clouds
Security, data integrity, legal and governance issues for enterprise clouds
Management, monitoring an governance issues
Portability of architectures, applications and data between cloud providers
Reliability and maintenance of cloud-based business architectures
Architectures for Software as a Service, Platform as a Service and Infrastructure as a Service
Network architecture using Storage Clouds
Experience reports with designing, building and using Cloud infrastructure
Novel application architectures, best practices, case studies and surveys
INSTRUCTION FOR THE AUTHORS
Authors of selected papers will be invited to submit extended versions to one of the IARIA Journals.
Publisher: XPS (Xpert Publishing Services)
Archived: ThinkMindTM Digital Library (free access)
Submitted for indexing:
- ISI Thompson Conference Proceedings Citation Index (CPCI)
- Elsevier's EI Compendex Database, EI’s Engineering Information Index
- DBLP, IET INSPEC, and other relevant specialized indexes.
- Other indexes are being considered
Submission (full paper) January 5, 2012
Notification February 23, 2012
Registration March 7, 2012
Camera ready March 7, 2012
Only .pdf or .doc files will be accepted for paper submission. All received submissions will be acknowledged via an automated system.
Regular Papers (up to 6-10 page article)
Final author manuscripts will be 8.5" x 11", not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Helpful information for paper formatting can be found on the here.
Your paper should also comply with the additional editorial rules.
Once you receive the notification of paper acceptance, you will be provided by the publisher an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.
Work in Progress (short paper up to 4 pages long)
Work-in-progress contributions are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as work in progress. Authors should submit a four-page (maximum) text manuscript in IEEE double-column format including the authors' names, affiliations, email contacts. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings.
For more details, see the Work in Progress explanation page
Posters (poster or collection of 6 to 8 slides, including industrial presentations)
Posters are intended for ongoing research projects, concrete realizations, or industrial applications/projects presentations. Acceptance will be decided based on a 1-2 page abstract and/or 6-8 .pdf slide deck submitted through the conference submission website. The poster may be presented during sessions reserved for posters, or mixed with presentation of articles of similar topic. The slides must have comprehensive comments. One big Poster and/or the associated slides should be used for discussions, once on the conference site.
For more details, see the Posters explanation page.
Ideas (2 page proposal of novel idea)
This category is dedicated to new ideas in their early stage. Contributions might refer to PhD dissertation, testing new approaches, provocative and innovative ideas, out-of-the-box, and out-of-the-book thinking, etc. Acceptance will be decided based on a maximum 2 page submission through the conference submission website. The contributions for Ideas will be presented in special sessions, where more debate is intended. The Idea contribution must be comprehensive, focused, very well supported (details might miss, obviously). A 6-8 slide deck should be used for discussions, once on the conference site.
For more details, see the Ideas explanation page.
Technical marketing/business/positioning presentations
The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will not be published in the conference’s CD Proceedings. Presentations' slide decks will be posted on the IARIA's site. Please send your presentations to firstname.lastname@example.org.
Tutorials provide overviews of current high interest topics. Proposals should be for three hour tutorials. Proposals must contain the title, the summary of the content, and the biography of the presenter(s). The tutorials' slide decks will be posted on the IARIA's site. Please send your proposals to email@example.com
The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies. The panel's slide deck will be posted on the IARIA's site.
For more information, firstname.lastname@example.org
We welcome workshop proposals on issues complementary to the topics of this conference. Your requests should be forwarded to email@example.com.