* * * * * * * * * * * * * * * * * * * * * * * *
LINGUIST List logo Eastern Michigan University Wayne State University *
* People & Organizations * Jobs * Calls & Conferences * Publications * Language Resources * Text & Computer Tools * Teaching & Learning * Mailing Lists * Search *
* *
LINGUIST List 20.517

Wed Feb 18 2009

Calls: Lang Documentation/United Kingdom;Comp Ling/United Kingdom

Editor for this issue: Kate Wu <katelinguistlist.org>

LINGUIST is pleased to announce the launch of an exciting new feature: Easy Abstracts! Easy Abs is a free abstract submission and review facility designed to help conference organizers and reviewers accept and process abstracts online. Just go to: http://www.linguistlist.org/confcustom, and begin your conference customization process today! With Easy Abstracts, submission and review will be as easy as 1-2-3!
        1.    Chaithra Puttaswamy, 3L Student Conference on Language Documentation and Description
        2.    Galyna Akmayeva, The 4th International Conference for Internet Technology and Secured Transactions

Message 1: 3L Student Conference on Language Documentation and Description
Date: 18-Feb-2009
From: Chaithra Puttaswamy <cp28soas.ac.uk>
Subject: 3L Student Conference on Language Documentation and Description
E-mail this message to a friend

Full Title: 3L Student Conference on Language Documentation and Description

Date: 03-Jul-2009 - 03-Jul-2009
Location: London, United Kingdom
Contact Person: Conference Organiser
Meeting Email: 3lstudentconferencegmail.com
Web Site: http://www.hrelp.org/events/3L/student.html

Linguistic Field(s): Language Documentation

Call Deadline: 11-May-2009

Meeting Description:

The Student Conference on Language Documentation and Description is organised by
the students of Endangered Languages Academic Programme at the School of
Oriental and African Studies, University of London on 3rd July 2009. This
conference is part of the 3L Summer School on Language Documentation and
Description 2009. The one-day conference aims to provide a platform for
students to share their work with their peers and senior scholars and receive
constructive feedback.

Call for Papers

Students are invited to submit an abstract of no more than 400 words in English
or French by 11 May 2008. Each presentation will be of 20 minutes duration
followed by 10 minutes for questions. The abstracts should be submitted online
from http://linguistlist.org/confcustom/3lstudentconf09

Preference will be given to students who are accepted to attend the Summer
School, though non-attendees are also invited to submit abstracts and may be
selected to present at the conference. Note that students presenting at the
conference who are not enrolled in the Summer School will be asked to pay a
participation fee of £10 to help cover costs. Participation fee includes:
- Conference booklet
- Refreshments and biscuits during coffee breaks
- Lunch

Language Documentation as theory and practice
Applied aspects of Language Documentation
New techniques and technology for documenting and describing lesser known
Community-oriented language documentation
Documentation and Description - a balancing act
Language revitalization

Important Dates
Deadline for submission of abstracts: 11 May 2009
Notification of Accepted Papers: 30 May 2009
Conference: 3 July 2009

The conference will take place in rooms G50 and G51 located in the SOAS Main
Building, Thronhaugh Street, Russell Square, London WC1H 0XG.

For any enquiry please contact: 3lstudentconferencegmail.com

Organizing Committee
Mike Franjieh
Chaithra Puttaswamy
Radu Voica
Message 2: The 4th International Conference for Internet Technology and Secured Transactions
Date: 17-Feb-2009
From: Galyna Akmayeva <infoicitst.org>
Subject: The 4th International Conference for Internet Technology and Secured Transactions
E-mail this message to a friend

Full Title: The 4th International Conference for Internet Technology and Secured
Short Title: ICITST-2009

Date: 09-Nov-2009 - 12-Nov-2009
Location: London, United Kingdom
Contact Person: Galyna Akmayeva
Meeting Email: infoicitst.org
Web Site: http://www.icitst.org

Linguistic Field(s): Computational Linguistics

Call Deadline: 31-May-2009

Meeting Description:

The ICITST is an international refereed conference dedicated to the advancement
of the theory and practical implementation of secured Internet transactions and
to fostering discussions on information technology evolution. The ICITST aims
to provide a highly professional and comparative academic research forum that
promotes collaborative excellence between academia and industry.

Call for Papers

The objectives of the ICITST are to bridge the knowledge gap between academia
and industry, promote research esteem in secured Internet transactions and the
importance of information technology evolution to secured transactions. The
ICITST-2009 invites research papers that encompass conceptual analysis, design
implementation and performance evaluation.

All the accepted papers will appear in the proceedings published by IEEE and
fully indexed by IEEE Xplore. All the ICITST papers are indexed by DBLP.

The topics in ICITST-2009 include but are not confined to the following areas:
- Application of agents
- Application security
- Blended Internet security methods
- Biometrics
- Boundary issues of Internet security
- Broadband access technologies
- Challenges of content authoring
- Data mining security
- E-society
- Globalisation of information society
- Government, and corporate Internet security policy
- Internet architecture
- Infonomics
- IPSec quality of services
- Patentability
- Regulation, self-regulation, and co-regulation Web services
- Secured database systems
- Synchronising e-security
- Technology-enabled information
- Trust, privacy, and data security
- Wireless transactions
- Context-Awareness and its Data mining for Ubi-com service
- Human-Computer Interface and Interaction for Ubi-com
- Smart Homes and its business model for Ubi-com service
- Intelligent Multimedia Service and its Data management for Ubi-com
- USN / RF-ID for Ubi-com service
- Network security issues, protocols, data security in Ubi-com
- Database protection for Ubi-com
- Privacy Protection and Forensic in Ubi-com
- Multimedia Security in Ubi-com
- Quality of Service Issues
- Authentication and Access control for data protection in Ubi-com
- Information visualization
- Web services
- Service, Security and its Data management for U-commerce
- New novel mechanism and Applications for Ubi-com
- Information Management
- Multimedia Information Systems
- Information Retrieval
- Natural Language Processing
- Digital Libraries
- Data and Information Quality Management
- Data Grids, Data and Information Quality
- Database Management
- Web Databases
- Temporal and Spatial Databases
- Data Mining
- Web Mining including Web Intelligence and Web 3.0
- E-Learning, eCommerce, e-Business and e-Government
- Web Metrics and its applications
- XML and other extensible languages
- Semantic Web and Ontology
- Human-Computer Interaction
- Artificial Intelligence and Expert Systems
- Knowledge Management
- Ubiquitous Systems
- Peer to Peer Data Management
- Interoperability
- Mobile Data Management
- Data Models for Production Systems and Services
- Data Exchange issues and Supply Chain
- Data Life Cycle in Products and Processes
- Case Studies on Data Management, Monitoring and Analysis
- Security and Access Control
- Information Content Security
- Mobile, Ad Hoc and Sensor Network Security
- Distributed information systems

Read more issues|LINGUIST home page|Top of issue

Please report any bad links or misclassified data

LINGUIST Homepage | Read LINGUIST | Contact us

NSF Logo

While the LINGUIST List makes every effort to ensure the linguistic relevance of sites listed
on its pages, it cannot vouch for their contents.