From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Original-To: caml-list@sympa.inria.fr Delivered-To: caml-list@sympa.inria.fr Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) by sympa.inria.fr (Postfix) with ESMTPS id 36A317F860 for ; Sun, 16 Mar 2014 14:22:26 +0100 (CET) Received-SPF: None (mail2-smtp-roc.national.inria.fr: no sender authenticity information available from domain of announce@cs.ucy.ac.cy) identity=pra; client-ip=194.42.17.130; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="announce@cs.ucy.ac.cy"; x-sender="announce@cs.ucy.ac.cy"; x-conformance=sidf_compatible Received-SPF: PermError (mail2-smtp-roc.national.inria.fr: cannot correctly interpret sender authenticity information from domain of announce@cs.ucy.ac.cy) identity=mailfrom; client-ip=194.42.17.130; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="announce@cs.ucy.ac.cy"; x-sender="announce@cs.ucy.ac.cy"; x-conformance=sidf_compatible Received-SPF: None (mail2-smtp-roc.national.inria.fr: no sender authenticity information available from domain of postmaster@theano.cs.ucy.ac.cy) identity=helo; client-ip=194.42.17.130; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="announce@cs.ucy.ac.cy"; x-sender="postmaster@theano.cs.ucy.ac.cy"; x-conformance=sidf_compatible X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: Ai8CAIOkJVPCKhGCnGdsb2JhbABZDoMzrC4BAY09gT2DO4UIFg4BAQEBAQgUCTyCSUsFgTMXCgmHfaENqkmGb44GCgcBhQ8EjHGNB4UafY1UQYFnCRc X-IPAS-Result: Ai8CAIOkJVPCKhGCnGdsb2JhbABZDoMzrC4BAY09gT2DO4UIFg4BAQEBAQgUCTyCSUsFgTMXCgmHfaENqkmGb44GCgcBhQ8EjHGNB4UafY1UQYFnCRc X-IronPort-AV: E=Sophos;i="4.97,664,1389740400"; d="scan'208,217";a="63059458" Received: from theano.cs.ucy.ac.cy ([194.42.17.130]) by mail2-smtp-roc.national.inria.fr with ESMTP; 16 Mar 2014 14:22:23 +0100 Received: from localhost (localhost [127.0.0.1]) by theano.cs.ucy.ac.cy (Postfix) with ESMTP id 3E0D31AFF for ; Sun, 16 Mar 2014 15:22:23 +0200 (EET) X-Virus-Scanned: amavisd-new at cs.ucy.ac.cy Received: from theano.cs.ucy.ac.cy ([127.0.0.1]) by localhost (theano.cs.ucy.ac.cy [127.0.0.1]) (amavisd-new, port 10024) with LMTP id OLRJC2e4AwNy for ; Sun, 16 Mar 2014 15:22:21 +0200 (EET) Received: from nireas.cs.ucy.ac.cy (nireas.cs.ucy.ac.cy [194.42.16.48]) by theano.cs.ucy.ac.cy (Postfix) with ESMTP id 754A31BFF for ; Sun, 16 Mar 2014 15:16:31 +0200 (EET) Received: from [10.16.11.106] (Georges-Mac-Pro.in.cs.ucy.ac.cy [10.16.11.106]) by nireas.cs.ucy.ac.cy (Postfix) with SMTP id 49C1C29FF6 for ; Sun, 16 Mar 2014 13:57:21 +0200 (EET) Message-Id: Mime-Version: 1.0 From: Announce Announcements To: "cs.cmu.edu," Date: Sun, 16 Mar 2014 13:54:51 +0200 Content-Type: multipart/alternative; Boundary="--=BOUNDARY_3161354_OEHX_BLTI_NPFL_FBDI" X-CSatUCY-Information: Please contact support@cs.ucy.ac.cy for help. X-CSatUCY-MailScanner-ID: 49C1C29FF6.A55A3 X-CSatUCY-MailScanner: Found to be clean X-CSatUCY-SpamCheck: not spam, SpamAssassin (score=-1.439, required 5, ALL_TRUSTED -1.44, HTML_MESSAGE 0.00) X-CSatUCY-From: announce@cs.ucy.ac.cy X-CSatUCY-Watermark: 1395580520.74323@H8VJvedMgmL09Tw3RIf6Fg X-Validation-by: announce@cs.ucy.ac.cy Subject: [Caml-list] ICTAI 2014: Second Call for Papers This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ----=BOUNDARY_3161354_OEHX_BLTI_NPFL_FBDI Content-Type: text/plain; charset=iso-8859-1; format=flowed Content-Transfer-Encoding: quoted-printable *** SECOND CALL FOR PAPERS *** 26th IEEE International Conference on Tools with Artificial Intelligence ICTAI 2014 (pending IEEE approval) November 10-12, 2014, Limassol, Cyprus http://ictai2014.cs.ucy.ac.cy Aim & Scope The annual IEEE International Conference on Tools with Artificial Intelligence (ICTAI) provides a major international forum where the creation and exchange of ideas related to artificial intelligence are fostered among academia, industry, and government agencies. The conference facilitates the cross-fertilization of these ideas and promotes their transfer into practical tools, for developing intelligent systems and pursuing artificial intelligence applications. The ICTAI encompasses all technical aspects of specifying, developing and evaluating the theoretical underpinnings and applied mechanisms of the AI-based components of computer tools such as algorithms, architectures and languages. Topics (not limited to) AI Foundations - Evolutionary computing, Bayesian and Neural Networks - Decision/Utility Theory and Decision Optimization - Search, SAT, and CSP - Description Logic and Ontologies AI in Domain Specific Applications - AI in Natural Language Processing and Understanding - AI in Computational Biology, Medicine and Biomedical Applications - AI in WWW, Communication, Social Networking, Recommender Systems, Games and E-Commerce - AI in Finance and Risk Management AI in Computer Systems - AI in Robotics, Computer Vision and Games - AI in Software Engineering, Real-Time and Embedded Applications, and Sensor Networks - AI in Cloud Computing, Data-Intensive Applications and Online/Streaming and Multimedia Systems - AI in Web search and Information Retrieval - AI in Computer Security, Data Privacy, and Information Assurance AI in Data Analytics and Big Data - Visualization Analytics for Big Data - Computational Modeling for Big Data - Large-scale Recommendation and Social Media Systems - Cloud/Grid/Stream Data Mining for Big Velocity Data - Semantic-based Big Data Mining Machine Learning and Data Mining - Data pre-processing, reduction and feature selection - Learning Graphical Models and Complex Networks - Active, Cost-Sensitive, Semi-Supervised, Multi-Instance, Multi-Label and Multi-Task Learning - Transfer/Adaptive, Rational and Structured Learning - Preference/Ranking, Ensemble, and Reinforcement Learning Knowledge Representation, Reasoning and Cognitive Modelling - Knowledge Representation, Reasoning - Knowledge Extraction, Management and Sharing - Case-Based Reasoning and Knowledge-based Systems - Cognitive Modelling and Semantic Web AI and Decision Systems - Decision Guidance and Support Systems - Optimization-based recommender systems - Group, distributed, and collaborative decisions - Crowd-sourcing and collective intelligence decision making - Strategic, tactical and operational level decisions - Decision making in social and mobile networks Uncertainty in AI - Uncertainty and Fuzziness Representation and Reasoning - Approximate/Exact Probabilistic Inference - Knowledge Discovery and Data Mining for Uncertain Data Paper Submission The submissions should contain original, high quality, not submitted or published elsewhere work. Papers should be submitted electronically through the EasyChair system in pdf format and should conform to IEEE specifications (single-spaced, double-column, 10-point font size, up to 8 pages). Paper Presentation Each accepted paper should be presented by one of the authors and accompanied by at least one full registration fee payment, to guarantee publication in the proceedings. All accepted papers will be included in proceedings of ICTAI 2014 that will be published by the IEEE Computer Society. IJAIT special issue Extended versions of the best papers of the conference will be invited for publication in a special issue of the International Journal on Artifici= al Intelligence Tools (IJAIT) (SCI Indexed). Important Dates Paper submission: June 30, 2014 Paper notification: July 30, 2014 Camera-ready paper: August 30, 2014 Point of Contact George A. Papadopoulos Department of Computer Science University of Cyprus george-at-cs-dot-ucy-dot-ac-dot-cy -------------------------------------------------------------------- This is not SPAM. If you want to be removed from this list, please send an email to [announce@cs.ucy.ac.cy] with the single word 'remove' in the subject of the email. ----=BOUNDARY_3161354_OEHX_BLTI_NPFL_FBDI Content-Type: text/html; charset=iso-8859-1 Content-Transfer-Encoding: quoted-printable HTML Message
*** SECOND CALL FOR PAPERS ***

26th IEEE Int= ernational Conference on Tools with Artificial Intelligence
ICTAI 2014
(pending IEEE approval)

November 10-12, 2014, Limassol, Cyprus=

http://ictai2014.cs.ucy.= ac.cy


Aim & Scope
The annual IEEE Internation= al Conference on Tools with Artificial
Intelligence (ICTAI) provides a m= ajor international forum where
the creation and exchange of ideas relate= d to artificial intelligence
are fostered among academia, industry, and = government agencies.
The conference facilitates the cross-fertilization = of these ideas and
promotes their transfer into practical tools, for dev= eloping intelligent
systems and pursuing artificial intelligence applica= tions. The ICTAI
encompasses all technical aspects of specifying, develo= ping and
evaluating the theoretical underpinnings and applied mechanisms=
of the AI-based components of computer tools such as algorithms,
arc= hitectures and languages.

Topics (not limited to)

= AI Foundations
- Evolutionary computing, Bayesian and Neural Network= s
- Decision/Utility Theory and Decision Optimization
- Search, SAT, = and CSP
- Description Logic and Ontologies

AI in Domain Specif= ic Applications
- AI in Natural Language Processing and Understandin= g
- AI in Computational Biology, Medicine and Biomedical Applications- AI in WWW, Communication, Social Networking, Recommender Systems,
= Games and E-Commerce
- AI in Finance and Risk Management

AI i= n Computer Systems
- AI in Robotics, Computer Vision and Games
- = AI in Software Engineering, Real-Time and Embedded Applications,
and = Sensor Networks
- AI in Cloud Computing, Data-Intensive Applications and=
Online/Streaming and Multimedia Systems
- AI in Web search and I= nformation Retrieval
- AI in Computer Security, Data Privacy, and Inform= ation Assurance

AI in Data Analytics and Big Data
- Visual= ization Analytics for Big Data
- Computational Modeling for Big Data - Large-scale Recommendation and Social Media Systems
- Cloud/Grid/Str= eam Data Mining for Big Velocity Data
- Semantic-based Big Data Mining <= br>
Machine Learning and Data Mining
- Data pre-processing, re= duction and feature selection
- Learning Graphical Models and Complex Ne= tworks
- Active, Cost-Sensitive, Semi-Supervised, Multi-Instance,
= Multi-Label and Multi-Task Learning
- Transfer/Adaptive, Rational and St= ructured Learning
- Preference/Ranking, Ensemble, and Reinforcement Lear= ning

Knowledge Representation, Reasoning and Cognitive Modelling<= br>- Knowledge Representation, Reasoning
- Knowledge Extraction, Ma= nagement and Sharing
- Case-Based Reasoning and Knowledge-based Systems<= br>- Cognitive Modelling and Semantic Web

AI and Decision Systems=
- Decision Guidance and Support Systems
- Optimization-based rec= ommender systems
- Group, distributed, and collaborative decisions
-= Crowd-sourcing and collective intelligence decision making
- Strategic,= tactical and operational level decisions
- Decision making in social a= nd mobile networks

Uncertainty in AI
- Uncertainty and Fuz= ziness Representation and Reasoning
- Approximate/Exact Probabilistic I= nference
- Knowledge Discovery and Data Mining for Uncertain Data
Paper Submission
The submissions should contain original, high q= uality, not submitted
or published elsewhere work. Papers should be subm= itted electronically
through the EasyChair system in pdf format a= nd should conform to IEEE
specifications (single-spaced, double-column, = 10-point font size, up to 8
pages).

Paper Presentation
= Each accepted paper should be presented by one of the authors and
accomp= anied by at least one full registration fee payment, to guarantee
public= ation in the proceedings. All accepted papers will be included in
procee= dings of ICTAI 2014 that will be published by the IEEE Computer
Society.=

IJAIT special issue
Extended versions of the best papers = of the conference will be invited
for publication in a special issue of = the International Journal on Artificial
Intelligence Tools (IJAIT) (SCI = Indexed).

Important Dates
Paper submission: June 30, 2014<= br>Paper notification: July 30, 2014
Camera-ready paper: August 30, 2014=

Point of Contact
George A. Papadopoulos
Department of = Computer Science
University of Cyprus
george-at-cs-dot-ucy-dot-ac-dot= -cy

-----------------------------------= ---------------------------------
This is not SPAM. If you want to be re= moved from this list,
please send an email to [announce@cs.ucy.ac.cy] wi= th the
single word 'remove' in the subject of the email.
----=BOUNDARY_3161354_OEHX_BLTI_NPFL_FBDI--