7th International Conference on Semantic Technologies forIntelligence, Defense, and Security
|Start||2012/10/23 12:00:00 AM (iCal)|
|End||2012/10/26 12:00:00 AM|
|Camera ready due:||2012/09/18|
Event in series STIDS
The 7th International Conference on Semantic Technologies for Intelligence, Defense, and Security (STIDS 2012) will be held in October 2012 at the confortable facilities of the Mason Inn Conference Center. The main conference will be held on October 24-25, with a tutorial session on October 23 and a classified session for those with TS/SCI clearances only on October 26.
STIDS provides a forum for academia, government and industry to share the latest research on semantic technology for defense, intelligence and security applications. Semantic technology is a fundamental enabler to achieve greater flexibility, precision, timeliness and automation of analysis and response to rapidly evolving threats.
The conference is an opportunity for collaboration and cross-fertilization between researchers and practitioners of semantic-based technologies with particular experience in the problems facing the Intelligence, Defense, and Security communities. It will feature invited talks from prominent semantic technology researchers and recognized leaders from the target application domains.
To facilitate interchange among communities with a clear commonality of interest but little history of interaction, STIDS will host two separate tracks. The Research Track will showcase original, significant research on semantic technologies applicable to problems in intelligence, defense or security. Submissions to the research track are expected to clearly present their contribution, demonstrate its significance, and show the applicability to problems in the target applications domain. The Applications Track provides a forum for presenting implemented semantic-based applications to intelligence, defense, or security, as well as to discuss and evaluate the use of semantic techniques in these areas. Of particular interest are comparisons between different technologies or approaches and lessons learned from applications. By capitalizing on this opportunity, STIDS could spark dramatic progress toward transitioning semantic technologies from research to the field.
Both tracks welcome the submission of papers on semantic technologies applied to the fields of Intelligence, Defense, and Security. We are especially interested in papers on the following top.css:
- Creating an interoperable suite of public-domain semantic technology/ontologies relevant to intelligence, defense, and security covering areas such as:
- Biology and health
- Command and Control and Situation Awareness
- Conditions that foster or inhibit outbreak of violence
- Controlled substance interception
- Course-of-action planning
- Cyberspace: Computer network operations (defense, exploitation, counter-attack)
- Emergency response
- Ethnicity, religion, culture and polit.css
- Financial Analysis
- Human factors
- Infrastructure protection
- Information sharing
- Intelligence collection, analysis, and dissemination
- International law
- ISR (Intelligence, Surveillance, Reconnaissance)
- Money laundering
- Predictive analysis
- Risk analyt.css
- Science and Technology (S&T)
- Social networks
- Spatial and temporal phenomena
- Vulnerability assessment
- Ontologies and reasoning under conditions of uncertainty
- Semantic technology and ontological Issues related to:
- Source credibility and evidential pedigree
- Use of sensing devices including security, e.g. global infrastructure grid (GIG), images and intelligence collection in general
- Usability issues relating to semantic technology
- Best practices in ontological engineering
Both tracks will accept submissions of technical papers. Each submission will be evaluated for acceptability by at least three members of the Program Committee. Decisions about acceptance will be based on relevance to the above topic list, originality, potential significance, topicality and clarity. Because all accepted papers are to be presented at the conference, we require that at least one of the submitting authors must be a registered participant committed to attend STIDS 2012.
Submissions are accepted only in electronic format and should be sent via the conference’s submission site: http://www.easychair.org/conferences/?conf=stids2012.
Papers must closely follow the US Letter version of the IEEE format for conference proceedings. For complete details and to download MS Word and Latex templates (choose the US Letter size), see IEEE’s Manuscript Template webpage at: http://www.ieee.org/conferences_events/conferences/publishing/templates.html.
Technical papers must not exceed 8 pages, including figures. Submissions exceeding this limit will not be reviewed. In addition, papers that, at the time of submission, are under review for or have already been published in or accepted for publication in a journal or another conference will not be accepted to the STIDS conference. All papers must be unclassified and suitable for release in a public forum.
- Rommel N. Carvalho (George Mason University)
- Werner Ceusters (SUNY at Buffalo)
- Paulo C. G. Costa (George Mason University)
- Mike Dean (Raytheon BBN Technologies)
- Katherine Goodier (L-3)
- Simon Spero (UNC Chapel Hill)
- Richard Haberlin (EMSolutions Inc.)
- Terry Janssen (Lockheed Martin)
- Mieczyslaw Kokar (Northeastern University)
- Kathryn Laskey (George Mason University, USA)
- Nancy Lawler (U.S. Department of Defense)
- Daniel Maxwell (KaDSci, LLC)
- Leo Obrst (MITRE)
- Mary Parmelee (MITRE Corporation)
- Lenard Simpson (Optech Inc.)
- Barry Smith (SUNY Buffalo)
- Gheorghe Tecuci (George Mason University)
- Andreas Tolk (Old Dominion University)
- Brian Ulicny (VIStology, Inc.)
- Amanda Vizedom (Wind River Consulting, LLC)
- Duminda Wijesekera (George Mason University)