[Elsnet-list] CFP: Dependability Aspects in DWH and Data Mining (DAWAM 2006), Vienna - Austria, April 20-22, 2006

Nguyen Manh Tho tho at ifs.tuwien.ac.at
Mon Nov 28 23:39:02 CET 2005

(Apologies for multiple copies due to cross postings. Please send to 

interested colleagues and students)



International Workshop “Dependability Aspects on Data WArehousing and Mining
applications” DAWAM 2006.




in conjunction with The First International Conference on Availability,
Reliability and Security - ARES 2006 





Nowadays, the rapid growth of information technologies has brought
tremendous opportunities for data sharing, integration, and analysis across
multiple distributed, heterogeneous data sources. In the past decade, data
warehousing and mining are the well-known technologies used for data
analysis and knowledge discovery in vast domain of applications. Data mining
technology has emerged as a means of identifying patterns and trends from
large quantities of data. Data mining has used a data warehousing model of
gathering all data into a central site, then running an algorithm against
that data.


A growing attention has been paid to the study, development and application
of data warehousing and mining. Nevertheless, dependability aspects in these
applications such as availability, reliability, integrity, privacy, and
security issues are still being investigated. For example, in data
warehousing applications, privacy considerations may prevent the approach of
collecting data into the centralized warehouse because each data source has
different privacy policy. Furthermore, the complexity of security increases
as different sources of information are combined. Reliable, consistent and
trustworthy of information are also significant requirements in data
warehousing applications. Data mining has been shown to be beneficial in
confronting various types of attacks to computer systems such as fraud
detection, intrusion prevention. In some applications, e.g. clinic
information system, government management, business competitive information,
it is required to apply the mining algorithms without observing the
confidential data values thus demands the privacy preservation. There are
also many challenging issues that need further investigation in the context
of data mining from both privacy and security perspectives such as mining of
imbalanced data, bioinformatics data, streaming data, ubiquitous computing
data, grid computing data etc.


The goals of this workshop are to bring together users, engineers and
researchers (from industry and academy) alike to present their recent work,
discuss and identify problems, synergize different views of techniques and
policies, and brainstorm future research directions on various dependability
aspects of data warehousing and data mining applications. We strongly
encourage researchers and practitioners with interest in the areas of
reliability, availability, privacy and security, databases, data
warehousing, data mining, and statistics to submit their experience, and/or
research results. 


Topics related to any of dependability aspects in data warehousing and
mining, theory, systems and applications are of interest. These include, but
are not limited to the following areas:

· Dependability and fault tolerance

· High Availability and Disaster Recovery

· Survivability of evaluative systems

· Reliability and Robustness Issues

· Accuracy and reliability of responses

· Reliable and Failure Tolerant Business Process Integration

· Reliable Event Management and Data Stream Processing

· Failure Tolerant and trustworthy Sensor Networks

· Highly available data warehouses for business processes integration

· Handling different or incompatible formats, and erroneous data

· Privacy and security policies and social impact of data mining

· Privacy preserving data integration

· Access control techniques and secure data models

· Encryption & Authentication

· Pseudonymization and Encryption

· Anonymization and pseudonymization

· Trust management, and security 

· Security in Aggregation and Generalization

· User Profile Based Security 

· Secure multi-party computation

· Secondary use of personal data, clinic data, credit record

· Fraud and misuse detection

· Intrusion detection and tolerance

· Data mining applications for terrorist detection

· Private queries by a (semi-trusted) third party

· Query authentication, logging, auditing, access control and authorization


The program of the workshop will be a combination of invited talks,
paper/poster presentations and discussions.


Important Dates 


Submission Deadline: December, 31st 2005

Author Notification: January, 20th 2006

Author Registration: February, 1st 2006

Proceedings Version: February, 1st 2006


Submission Guidelines 


Authors are invited to submit research and application papers in IEEE
Computer Society Proceedings Manuscripts style (two columns, single-spaced,
including figures and references, using 10 fonts, and number each page). You
can confirm the IEEE Computer Society Proceedings Author Guidelines at the
following web page:


URL: http://computer.org/cspress/instruct.htm

or  http://www.tinmith.net/tabletop2006/IEEE/Format/instruct.htm 



Submission are classified into 3 categories (1) full paper (8 pages), (2)
short paper (5 pages), and (3) poster (2 pages) representing original,
previously unpublished work. Submitted papers will be carefully evaluated
based on originality, significance, technical soundness, and clarity of


Contact author must provide the following information: paper title, authors'
names, affiliations, postal address, phone, fax, and e-mail address of the
author(s), about 200-250 word abstract, and about five keywords and register
at our ARES website:




Prepare your paper in PDF file and send it to the workshop co-chair: Dr.
Nguyen Manh Tho, Institute of Software Technology, Vienna University of
Technology, via email: tho at ifs.tuwien.ac.at


Submission of a paper implies that should the paper be accepted, at least
one of the authors will register and present the paper in the conference.
Accepted papers will be given guidelines in preparing and submitting the
final manuscript(s) together with the notification of acceptance.




All accepted papers (full and short papers) will be published as ISBN
proceedings published by IEEE Computer Society. Based on quality and referee
reviews, some papers not suitable for acceptance as full paper will be
accepted for presentation at DAWAM 2006 in Poster category and will be also
included in the IEEE Proceedings.

A selected number of papers will be nominated to be published as special
issues in appropriate journals such as Journal of automatic and trusted
computing (JoATC), e-Signature Law Journal (Pario Communications Limited)
(LJI) (Sweet & Maxwell).



Workshop Organizer Co-chairs 


Jimmy Huang, Prof.,

School of Information Technology,

York University,

Toronto, Ontario

Canada M3J 1P3

jhuang at yorku.ca


Josef Schiefer, Ph.D.

Senactive IT-Dienstleistungs GmbH,

Phorusgasse 8

A1040 Vienna, Austria

josef.schiefer at senactive.com


Nguyen Manh Tho, Ph.D. (main contact)

Institute of Software Technique and Interactive System,

Vienna University of Technology,

Favoriten strasse 9-11/188

A1040 Vienna, Austria

tho at ifs.tuwien.ac.at


Program Committee


Aijun An, York University, Canada 

Pawan Chowdhary, IBM T J Watson Research Center, USA 

LiWu Chang, Naval Research Laboratory, USA 

Josep Domingo-Ferrer, Rovira i Virgili University of Tarragona, Spain 

Elena Ferrari, University of Insubria at Como, Italy 

Ulrich Flegel, University of Dortmund, Germany 

Tyrone Grandison, IBM Almaden Research, USA 

Jun-Jang (JJ) Jeng, IBM T.J. Watson Research Center, USA 

Hillol Kargupta, University of Maryland, Baltimore County, USA and Agnik,

Zongwei Luo, University of Hong Kong, Hong Kong 

Taneli Mielikäinen, University of Helsinki, Finland 

Daniel E. O'Leary, University of Southern California, USA 

Stanley Oliveira, Embrapa Information Technology, Brazil 

Arnon Rosenthal, MITRE Corporation, USA 

Ben Soh, La Trobe University, Australia 

David Taniar, Monash University, Australia 

Juan Trujillo, University of Alicante, Spain 

Vassilios S. Verykios, University of Thessaly, Greece 

Justin Zhan, University of Ottawa, Canada 

Sheng Zhong, State University of New York at Buffalo, USA




-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://stratus.let.uu.nl/pipermail/elsnet-list/attachments/20051128/426babb3/attachment-0001.html

More information about the Elsnet-list mailing list