Sitemap | Impressum
web2.0 Diaspora Vimeo Wir in der taz Wir bei Mastodon A-FsA Song RSS Twitter Youtube Unsere Artikel bei Tumblr Unsere Bilder bei Flickr Aktion FsA bei Wikipedia Spenden Facebook Bitmessage Spenden über Betterplace Zugriff im Tor-Netzwerk https-everywhere

Funchal/Spanien: 4th International Workshop on RFID Technology - Concepts, Applications, Challenges - IWRT 2010

Beginn: Di 8. Jun 00:00:00 CEST 2010
Ende:   Mi 9. Jun 23:59:59 CEST 2010
Ort:   Hotel Tivoli Madeira Rua Simplício dos Passos Gouveia, 29 9004-576 Funchal Madeira, Portugal
Geodaten: (0),(0)
Kartenausschnitt anzeigen:

Kontakt: http://www.iceis.org/Workshops/iwrt/iwrt2010-cfp.htm

Diesen Termin als .ics Kalendereintrag herunterladen:  

4th International Workshop on
RFID Technology - Concepts, Applications, Challenges - IWRT 2010

8-9 June, 2010 - Funchal, Madeira, Portugal

In conjunction with the 12th International Conference on Enterprise Information Systems (ICEIS 2010)

Co-chairs

Michael Sheng
The University of Adelaide
Australia
e-Mail

Zakaria Maamar
Zayed University
Dubai, U.A.E.
e-Mail

Sherali Zeadally
University of the District of Columbia
U.S.A.
e-Mail

Katerina Mitrokotsa
Technical University of Delft
The Netherlands
e-Mail

Background and Goals

Radio Frequency Identification (RFID) systems are emerging as one of the most pervasive computing technologies due to their low cost and their broad applicability. RFID systems consist of tiny integrated circuits equipped with antennas (RFID tags) that communicate with their reading devices (RFID readers) using radio-frequency waves without line of sight. This creates tremendous opportunities for linking various objects from real world. These objects are numbered, identified, cataloged, and tracked. RFID systems present many advantages and features that cannot be found in other ubiquitous computing environments. RFID communication is fast, convenient and its application can substantially save time, improve services, reduce labor cost, thwart product counterfeiting and theft, increase productivity gains and maintain quality standards. Common applications range from highway toll collection, supply chain management, public transportation,controlling building access, animal tracking, developing smart home appliances and remote keyless entry for automobiles to locating children. In addition, RFID technology also offers a viable approach to implement physical user interfaces. The services available in the local environment are advertised by RFID tags. Users browse the services and activate the desired service by simply touching the corresponding tag with a mobile terminal that is equipped with an RFID reader. In the near future, these user interfaces would introduce RFID tags into our everyday lives.

While RFID provides promising benefits such as inventory visibility and business process automation, some significant challenges need to be overcome before these benefits can be realized. One important issue is how to process and manage RFID data, which is typically in large volume, noisy and unreliable, time-dependent, dynamically changing, and of varying ownership. Another issue is how to seamlessly integrate low-level RFID data into (existing) enterprise information infrastructures (e.g., upper-level business processes). Finally, RFID systems present a number of inherent vulnerabilities with serious potential security implications. Indeed, given the ability of inexpensively tagging and thus monitoring a large number of items and/or people, RFID raises some serious security and privacy concerns. RFID systems are vulnerable to a broad range of malicious attacks ranging from passive eavesdropping to active interference. RFID privacy and security are stimulating research areas that involve rich interplay among many disciplines, such as signal processing, hardware design, supply-chain logistics, privacy rights, and cryptography.

The workshop's objective is to provide a forum for researchers, practitioners, and users to exchange new ideas, developments, and experience on issues related to this emerging field.

Topics of interest
We welcome papers that focus on novel RFID technologies and applications. Topics of interests include, but are not limited to:

  • Data management issues in RFID applications
  • Innovative RFID-enabled applications
  • RFID and physical user interfaces
  • Security/privacy and RFID
  • RFID and sensor networks
  • Web services and RFID
  • RFID and semantic Web
  • RFID standards
  • RFID case studies and field trials
  • RFID middleware
  • Next generation RFID technologies
  • Commercial experience with RFID
  • RFID network management
  • COTS and Open Source RFID infrastructure
  • Integration of RFID with other applications
  • Performance evaluation
  • Business process redesign and RFID
  • Intrusion Detection in RFID systems
  • Behavior analysis
  • Situation awareness

Workshop Format
The workshop will consist of oral presentations.

Important Dates
Regular Paper Submission: March 08, 2010
Authors Notification: April 06, 2010
Final Paper Submission and Registration: April 21, 2010

Workshop Program Committee

Gildas Avoine, Catholic University of Louvain, Belgium
Thierry Bodhuin, University of Sannio, Italy
Leonid Bolotnyy, University of Virginia, U.S.A.
Mike Burmester, Florida State University, U.S.A.
Jiming Chen, Zhejiang University, China
Maria V. Bueno-Delgado, Polytechnic University of Cartagena, Spain
Christos Dimitrakakis, University of Amsterdam, The Netherlands
Rajit Gadh, UCLA, U.S.A.
Gerhard Hancke, Royal Holloway University of London, U.K.
Julio Cesar Hernadez-Castro, University of Portsmouth, U.K.
Sozo Inoue, Kyushu Institute of Technology, Japan
Xue Li, The University of Queensland, Australia
Weifa Liang, The Australian National University, Australia
Tomas S. Lopez, University of Cambridge, U.K.
Konstantinos Markantonakis, Royal Holloway University of London, U.K.
John Mo, RMIT University, Australia
Pedro Peris-Lopez, Delft University of Technology, The Netherlands
Jukka Riekki, University of Oulu, Finland
Francesco Rizzo, Joint Research Centre of the European Commission, Italy
Michele Ruta, Technical University of Bari, Italy
Damien Sauveron, University of Limoges/CNRS, France
Dave Singelee, Katholieke U. Leuven, Belgium
Bela Stantic, Griffith University, Australia
Jan C.A. van der Lubbe, Delft University of Technology, The Netherlands
Claire Vishik, Intel Corporation, U.K.
Fusheng Wang, Emory University, U.S.A.
Laurence T. Yang, St. Francis Xavier University, Canada
Yan Zhang, Simula Research Laboratory, Norway
Holger Ziekow, International Computer Science Institute, Berkeley, U.S.A.
Yanjun Zuo, The Univeristy of North Dakota, U.S.A.

Paper Submission and Review
Prospective authors are invited to submit papers in any of the topics listed above.
Instructions for preparing the manuscript (in Word and Latex formats) are available at the conference Paper Templates web page. Please also check the web page with the Submission Guidelines.
Papers should be submitted electronically via the web-based submission system at: http://www.insticc.org/Primoris

All the submitted papers will be reviewed by at least 3 reviewers. We will also implement a rebuttal phase during the paper selection process. Authors will be invited to supply a response to the reviewers' comments. The paper selection will be based on both reviewers' comments and authors' responses.

Publications
All accepted papers will be published by INSTICC Press in the workshop proceedings book, under an ISBN reference, and on CD-ROM support.
The best papers of the workshop will be considered for further publication in a forthcoming special issue of a well-known international journal planned shortly after the workshop.

Registration Information
At least one author of an accepted paper must register for the workshop. If the registration fees are not received by April 21, 2010, the paper will not be published in the workshop proceedings book.

Secretariat Contacts
ICEIS Workshops - IWRT 2010
e-mail: iceis.workshops.secretariat@insticc.org

Zurück zur Terminliste



Kommentar abgeben

Für eine weitere vertrauliche Kommunikation empfehlen wir, unter dem Kommentartext einen Verweis auf einen sicheren Messenger, wie Session, Bitmessage, o.ä. anzugeben.

Geben Sie bitte noch die im linken Bild dargestellte Zeichenfolge in das rechte Feld ein, um die Verwendung dieses Formulars durch Spam-Robots zu verhindern.

CC Lizenz   Mitglied im European Civil Liberties Network   Bundesfreiwilligendienst   Wir speichern nicht   World Beyond War   Tor nutzen   HTTPS nutzen   Kein Java   Transparenz in der Zivilgesellschaft

logos Mitglied im European Civil Liberties Network Creative Commons Bundesfreiwilligendienst Wir speichern nicht World Beyond War Tor - The onion router HTTPS - verschlüsselte Verbindungen nutzen Wir verwenden kein JavaScript Für Transparenz in der Zivilgesellschaft