Special Sessions

The submission deadline for special session proposals is now closed.

CISDA 2012 also solicits proposals for special sessions with the technical scope of the symposium, generally focusing on a special hot topic. Papers submitted to special sessions are to be peer reviewed with the same criteria used for the contributed papers. Researchers interested in organizing special sessions are invited to submit formal proposals to the Special Sessions Co-Chairs. Special sessions will be accepted on a rolling basis until the deadline.


Accepted Special Sessions

The following special sessions have been accepted:

Autonomy for Unmanned Systems, Computers and Sensor Networks

Organizers: Misty Blowers, Air Force Research Labs, USA
Contact: Misty.Blowers -at- rl.af.mil

Modern advancements in sensing, communication, and robotics has resulted in the ability to collect a vast amount of data in a short amount of time. Users will need to be able to act based on voluminous data with an ever-tighter speed of response in a complex environment. This means autonomy is not an option, but a necessity. Both human and machine reasoners must work together in this environment, but the current state of autonomous systems are insufficient to effectively partner with their human counterparts. Current "autonomous" systems have two major challenges: Adaptation, where evolving situation dynamics break engineered system assumptions; and Scalability, whereas realistic, highly faceted, and distributed tasks are beyond the current capabilities of autonomous systems,
even with more computing power available. This session will focus on the automated collection, processing, analysis, and dissemination of relevant information, and on technologies that will enable distributed autonomous assets to make intelligent coordinated adaptations to plans/policies that optimize performance in dynamic and realistically complex domains. Topics of interest include, but are not limited to:

Biometric Technologies, Systems and Applications

Organizers: Qinghan Xiao, DRDC Ottawa, Canada, Kevin Jia, International Game Technology, USA and Fabio Scotti, University of Milan, Italy
Contact: qinghan81 -at- gmail.com, Kevin.Jia -at- IGT.com and fscotti -at- dti.unimi.it

A special session of Biometric Technologies, Systems and Applications will provide an interdisciplinary forum for researchers and practitioners, from industry, government, and academia, to share their research and experiences in the field of Computational Intelligence in Biometrics . The focus of this special session is on innovative, new technologies designed to address important issues in the development of Biometrics. Topics of interest include but are not limited to:

Computational Intelligence and Social Media

Organizers: John Verdon, DRDC Ottawa, Canada
Contact: john.verdon -at- drdc-rddc.gc.ca

Military and security communities are hard-pressed to develop the capabilities required to exploit the huge volumes of data, the new forms of information, and rapidly changing content of Social Media (SM) such as blogs, wikis, videos, social graph based systems (such as Facebook, Twitter) and many other SM systems that are being deployed. SM is also in its infancy, so there is a huge potential for SM to evolve far beyond its current capabilities and types of information.

Computational Intelligence techniques (Neural network, Evolutionary computation, Fuzzy Systems, Particle Swarms, etc) have often been based on, and and have been related to, highly complex, structured, and dynamic natural systems in [biology, neuroscience, brain, psychology, sociology]. This may make them particularly well suited for the extraction of intelligence from existing forms of SM, for the [modeling, prediction, control] of SM activity, as well as for providing some capability of keeping up with rapidly evolving and new forms of SM. Papers that deal with massive datasets are of particular interest, and, naturally, papers should relate to defense and security needs, applications, and tool-sets. Security & Defense needs and Social Media [some examples from Forrester 2011, Verdon 2012] topics include, but are not limited to:

Security Issues in Emerging Wireless Technologies

Organizers: Srini Sampalli, Dalhousie University, Canada
Contact: srini -at- cs.dal.ca

There has been a phenomenal growth in wireless technologies and mobile communication systems in the last few years. Advances in near field communications (NFC), wireless sensor networks, smartphones and mobile cloud computing platforms have ushered in a new era of applications in a wide variety of areas such as mobile commerce, military, healthcare, education and environment, to name a few. Security stands out as a critical issue in the design and deployment of applications with these wireless technologies, especially when they are characterized by sensitive and time-critical information transfers. This design challenge stems from a number of factors. Firstly, a common characteristic of such wireless systems is their severe resource constraint, since they typically consist of small sensors or chips with limited computational power and bandwidth. This makes the deployment of sophisticated and advanced cryptographic algorithms infeasible. Secondly, deploying security has always been a bigger challenge in wireless networks as compared to their wired counterparts, due to their inherent free space and broadcast transmission. Thirdly, there is a lack of strong security standards in the design of protocols for wireless networks. This special session will focus on the latest security threats, vulnerabilities, and attacks on emerging wireless technologies, and techniques to mitigate them. Topics of interest include, but are not limited to, the following: