Monthly Archives: January 2010

2010 International Conference in Literature and Psychology

For more information go to: http://www.clas.ufl.edu/ipsa/2010/index.html

Our 2010 annual International Literature and Psychology Conference will take place in P�cs, Hungary June 23-28, 2010. Its organizer, <a onmouseover="email = new Array('b','o','k','a','y','a','@','t','-','o','n','l','i','n','e','.','h','u'); this.href='mailto:'; for(i=0;i text = new Array(‘A’,’n’,’t’,’a’,’l’,’ ‘,’B’,’�’,’k’,’a’,’y’); for(i=0; i<text.length; i++) { document.write(text[i]); } Antal B�kay was also the host of our very first Psyart conference in 1983.

P�cs is an old university town in southwest Hungary. It was declared a World Historical Site by UNESCO, and for one year, in 2010, it will be holding the title of Cultural Capital of Europe. P�cs was a major Roman city in the second and third centuries, then a medieval center, with the first Hungarian university founded in 1367. Today it has 150,000 inhabitants and a university with 30,000 students. It has a mild dry Mediterranean climate. P�cs is near the Croatian border. Budapest is 200 km (130 miles), Vienna is 260 km (160 miles), and the Dalmatian coast is 400 km (250 miles) away.

You can find information on the city on its official web-site (http://en.pecs.hu/) and on the site of the Cultural Capital Program (http://en.pecs2010.hu/).

The local organizers of the conference are the University of P�cs, the Psychoanalysis Ph.D. Program, the local branch of the Hungarian Academy of Sciences, and Imago East-West.

The site of the conference is the Academy House, the research center of the Hungarian Academy of Sciences.

Papers should be short, 20 minutes at most. Ours is a very convivial conference, but the one complaint we get again and again is that speakers do not stick to the time limit! Please begin now to think about observing this time limit, so as to allow for the maximum number of presenters. Normal speaking rate is 140 words per minute, and, for clarity, a scholarly presentation should be somewhat slower. Our standard 20-minute limit allows you to speak about 2400 words. An additional 5 minutes are allotted for discussion after each paper, and the remaining time will serve for discussion at the end of the session. For each session, there will be a moderator responsible for keeping speakers within twenty minutes. The moderator speaks last in the session, and it is therefore to his or her self-interest to keep to the schedule.

Papers may be in English, French, or German, and they may deal with any application of psychology to the study of literature, film, or the other arts. And, if submitted for publication in the journal after the conference, they can be as long or short as you like. Please prepare your abstract and add it to the registration form below. Abstracts must be less than 150 words. Any excess will simply be ignored. Also, please,in a separate e-mail, e-mail your abstract to our program assistant, <a onmouseover="email = new Array('s','e','a','s','o','n','a','l','s','u','s','a','n','@','g','m','a','i','l','.','c','o','m'); this.href='mailto:'; for(i=0;i text = new Array(‘S’,’u’,’s’,’a’,’n’,’ ‘,’W’,’a’,’s’,’h’,’i’,’n’,’g’,’t’,’o’,’n’); for(i=0; i<text.length; i++) { document.write(text[i]); } Susan Washington.

We recommend that speakers in English who are not native speakers of English accompany their talks with PowerPoint. Please prepare your abstract and add it to the registration form below. Abstracts must be less than 150 words. Any excess will simply be ignored.

The deadline for sending us your title and abstract and registration fee is April 1 or the time at which we receive 65 abstracts, titles and registration fees, whichever comes sooner. Papers with completed registration, i.e., all three items submitted, by the deadline are assured a slot on the program. Abstracts submitted after then will be put on a waiting list and will be put on the program as cancellations permit.

For a complete registration, we require three items:

  1. a completed registration form (see below) including paper title
  2. title and brief abstract of paper (150 words maximum; excess will be omitted). These abstracts enable us to place your paper in an appropriate session. We will also publish them online and distribute the abstracts at the conference.
  3. A registration fee of $295 U.S. You will find instructions for payment after the registration form below. The $295 includes a $25 tax-deductible donation to the PsyArt Foundation, as voted in 2005. This figure has been made necessary by our loss of financial support from the University of Florida and the weakening of the dollar against the euro, which has increased our expenses. The registration fee is refundable (except for the $25 donation) for any reason until May 1, but not thereafter for any reason. The donation makes you a member of PsyArt, entitled–and encouraged–to attend and vote at the annual meeting of PsyArt which will take place on June 27 at the conference in P�cs.

Information Seeking in Context (ISIC) 2010

Faculty of Letters, University of Murcia, Spain.

September 28, 2010 – October 2, 2010

ISIC: the Information Behaviour Conference intends to reflect this interdisciplinary character through attracting papers from researchers in all of these areas. The unifying characteristic, which we see as essential in developing a programme is the relationship between the needs or requirements of the information user, the means for the satisfaction of those needs and the uses to which those means are put in practice organizations or disciplines. Thus, papers that deal solely with technological aspects of system design, for example, will not be appropriate for the conference.

Previous ISIC conferences have been held in:

  • Tampere, Finland 1996
  • Sheffield, U.K. 1998
  • G�teborg, Sweden 2000
  • Lisbon, Portugal 2002
  • Dublin, Ireland 2004
  • Sidney, Australia 2006
  • Vilnius, Lithuania 2008

The 8th ISIC conference will be held from September 29 to  October 2, 2010 in the University of Murcia, Spain.

A one day doctoral workshop will precede the conference on September 28, 2010.

Conference Information

AGE- two calls

“Ageism in the Academy.” NWSA session sponsored by the Aging and Ageism
Caucus. Although colleges and universities are presently set up to serve
mainly 18 to 25 year-olds, there is no reason, other than the problematic
association of aging and old age with decline and deterioration, why these
institutions cannot adjust their schedules and requirements to encourage
sustained degree-oriented coursework by adults of any age.  Papers should
address the ways in which ageism in the academy affects older women students
who have returned to finish a degree or obtain an advanced degree and/or
those who have just begun their traditional college education.  250+-word
abstracts or full papers to Pamela Gravagne,  <mailto:pgravagn@unm.edu>
pgravagn@unm.edu, by 15 February 2010.

 

“Bringing the “Outsider” of Age into the Women’s Studies Classroom.” NWSA
session sponsored by the Aging and Ageism Caucus. As with issues of race and
class, Women’s Studies has a longstanding reluctance to engage with the
issues, theory and politics of age.   In this panel, we are interested in
exploring strategies for introducing age into the women’s studies classroom.
We seek papers that address pedagogical approaches to and challenges with
bringing the lens of age into discussions of gender, sexuality, race, class,
disability, nation, etc. 250+ abstracts to Erin Gentry Lamb,
<mailto:lambeg@hiram.edu> lambeg@hiram.edu, by 15 February 2010.

True/ Stories of Censorship Battles in American Libraries

We are compiling a book for ALA Publications with the working title
True/ Stories of Censorship Battles in American Libraries/. The proposal
for this book arose out of a presentation called “Banned Books Exposed”
that we have been giving for several years.

We are seeking essays by and about librarians in public, school, and
academic libraries who have experienced challenges to remove material
from library collections.

These essays should be no more than 2500 words in length, and should
provide details of a full challenge experience, from initial contact
through ultimate resolution. Essays can be a first person narrative or a
case study description. We will also welcome short descriptions of
interactions that may not have ended in a formal challenge or request
for reconsideration. These anecdotes should reflect the concerns of
either the patron or the librarian or both. Sad, funny, scary,
confusing, misunderstood, groundless, highly-charged, low-key – somehow,
the reader should be able to identify with the event.

Tips on writing: Explain the situation and how you were involved. How
was the issue resolved? What lessons were learned? If you experienced
this situation again, what would you do differently? What resources did
you draw upon (don’t list resources; tell us about the resources and why
they were helpful)? Had you received any training on handling challenges
prior to the situation you describe? Have you received any since? Did
your library have a procedure in place? If not, does it have one now?

Writers should include the facts of the challenge. If this is
information based on a personal experience, please share your thoughts
and feelings about the confrontation, dealing with administrators, and
dealing with the public.

Email submissions to: nyebarco@gmail.com <mailto:nyebarco@gmail.com>

Your submissions should be submitted with the following information:

1. Title your essay.

2. Include a 100 word biographical statement.

Your submissions should follow these formatting rules:

1. Text should be attached as a .doc or .rtf (please do not send .docx
documents).

2. Your Name should be the document label (example JaneSmith.doc)

3. If you have questions about style, please consult /The Chicago Manual
of Style/, 15th edition, as your general guide to punctuation,
capitalization, quotation, abbreviation, source citation, use of italic,
etc.

Submitting an essay does not guarantee publication. If you have
questions about your essay and/or topic, please contact us.Contributors
will be asked to sign an ALA Writer Agreement before publication.
Compensation: a complimentary copy of the final publication and a
discount on additional copies.Deadline for submissions: *March 31, 2010*.

Here’s our challenge to /you: /share your experiences! Get on the
Bannedwagon!

nyebarco@gmail.com <mailto:nyebarco@gmail.com>

Kathy Barco & Valerie Nye

Assessing the Impact of International Human Rights Rhetoric on African Lives: The Case of Gender-Based Violence

Proposed Special Issue of the *African Studies Review*: “Assessing the
Impact of International Human Rights Rhetoric on African Lives: The Case of
Gender-Based Violence”
 
Edited by Tonia St.Germain, J.D. and Susan Dewey, Ph.D.

A significant gap exists between the discourses and practices of
international human rights law throughout the world, and this is
particularly pronounced in the case of gender-based violence (GBV) in
Africa. Accordingly, this special issue will bring together research
assessing the impact of anti-GBV legislation and policy throughout Africa,
with a particular focus upon African women’s everyday experiences of it in
zones of both conflict and peace. This is a timely topic given the amount of
international attention GBV has begun to draw in the international political
sphere. In observance of International Women’s Day in 2009, United Nations
Secretary-General Ban Ki-moon described violence against women as “an attack
on all of us…that destroys health, perpetuates poverty [and] strikes against
equality and empowerment” (United Nations 2009). An estimated 80% of
refugees/displaced persons fleeing contemporary conflict are women and
children, all of whom are uniquely vulnerable to gender-based violence in
the form of rape, sex trafficking, forced marriage or pregnancy and
associated HIV infection (Carpenter 2007; Enloe 2000; Mertus 2000;
Stiglmayer 1994).

Yet such gendered risks are by no means confined to conflict zones, as
women, girls and GLBTQ persons are routinely victimized through domestic
violence, harmful cultural practices, and the feminization of poverty even
in peacetime. Scholars have argued that noble rhetoric such as gender
mainstreaming, and the “women’s rights are human rights” campaign ignore the
fact that violence against women continues to be an unavoidable reality in
most post-conflict and peace zones (Meintjes, Turshen and Pillay 2002;
Mookherjee 2009; Tiessen 2007). This special issue will address the very
real harm that victims of gender-based violence suffer while offering
recommendations on how law, policy and financial resources could more
effectively address these issues in Africa from a gender-sensitive
perspective.

We particularly welcome papers that deal with the following: [1] the
international women’s movement as it relates to GBV; [2] agenda-based
responses to GBV, including amongst religious and feminist organizations and
the “aid” they bring to girls, women, and GLBTQ persons (Coomaraswamy 2002);
[3] the failure of such legislation and/or policy, whether in terms of lack
of political will or particular gendered cultural practices embedded at the
community level; [4] special issues related to medical and social service
provision to victims in specific African cultural contexts.

This compilation seeks to challenge the limited scope of current published
research by encouraging contributions from outside North America and Europe.
Papers based upon research in any area of Africa are welcome. Papers that
use gender, race, ethnicity, class, and sexual orientation as a category of
analysis are encouraged. Only original work will be accepted, and six to
eight papers will be chosen from the submissions. Papers should by
approximately 10,000 words excluding notes and bibliography. Please send a
250 word abstract to susancdewey@gmail.com by May 1, 2010. Completed paper
submission date is September 1, 2010.

Works Cited
Carpenter, Charli, ed. 2007 Born of War: Protecting Children of Sexual
Violence Survivors in      Conflict Zones. Kumarian Press.

Coomaraswamy, Radhika. Report to U.N. Commission on Human Rights, 10 April
2002.

Enloe, Cynthia 2000 Maneuvers: The International Politics of Militarizing
Women’s Lives.

Berkeley: The University of California Press.

Fisher, Siobhan 1996 Occupation of the Womb: Forced Impregnation as
Genocide. Duke Law

Journal 46(73): 91-133.

Meintjes, Sheila, Meredith Turshen and Anu Pillay 2002 The Aftermath: Women
in Post-

Conflict Transformation. Zed Books.

Mertus, Julie 2000 War’s Offensive on Women: The Humanitarian Challenge in
Bosnia, Kosovo

and Afghanistan. Kumarian Press.

Mookherjee, Monica 2009 Women’s Rights as Multicultural Claims:
Reconfiguring Gender and

Diversity in Political Philosophy. Edinburgh University Press.

Stiglmayer, Alexandra, ed. 1994 Mass Rape: The War Against Women in
Bosnia-Herzegovina.

University of Nebraska Press.

Tiessen, Rebecca 2007 Everywhere/Nowhere: Gender Mainstreaming in
Development Agencies.

Kumarian Press.

United Nations 2009 “Violence Against Women ‘An Attack on all of us”,
Declares Secretary       General as U.N. Holds Event to Commemorate
International Day.”

Best Practices in Library Instruction

The Library Instruction Round Table of the Pennsylvania Library Association is calling for proposals to present at the upcoming spring workshop, “Best Practices in Library Instruction.” Presenters are being requested for a panel discussion featuring programs that have been successful in providing library instruction to a particular group  (e.g. adults, children, students, etc.), represent an innovate delivery of library instruction, and which have resulted in a best practice. All types of libraries are encouraged to present.

 

The LIRT workshop will be help on Friday, April 16, 2010 at the Dixon University Center in Harrisburg from 9:30-3:00 p.m. The panel presentation on best practices will be from 11:00 a.m.-12:00 p.m.

 

Interested presenters should complete a registration form by clicking on the following link… LIRT Presenter Form

 

The LIRT will review the submissions and invitations to present will be sent out in early February. Deadline for presenter submissions is January 29, 2010.

 

Any questions should be submitted to Barb Zaborowski, LIRT Chair, at bzabor@pennhighlands.edu

 

The 8th IEEE International Conference on Web Services (ICWS 2010)

ICWS 2010 Submission Site is Open:

::::::::::::::::::::::::: CALL FOR PAPERS :::::::::::::::::::::::::
July 5-10, 2010, Miami, FL, USA

Theme: Innovations for Web-based Services

Sponsored by:
IEEE Computer Society Technical Committee on Services Computing
Services Society (http://www.servicessociety.org) (Approval Pending)

*************************************** NEWS **********************
Call For Papers: IEEE Transactions on Services Computing (TSC,
http://computer.org/tsc). Special theme issues from ICWS 2010 will be
published in TSC.

Call For Papers: International Journal of Web Services Research (JWSR,
http://www.servicescomputing.org/jwsr/) has been indexed by SCI-E and
EI. According to Thomson Scientific, JWSR is listed in the 2008
Journal Citation Report with an Impact Factor of 1.200. The journal
ranks #47 of 99 in the Computer Science, Information Systems and ranks
#37 of 86 in Computer Science, Software Engineering.

Call For papers: International Journal of Business Process Integration
********************************************************************

ICWS 2010 organizing committee invites you to participate in the
eighth edition of ICWS, to be held in Miami, FL, USA.

ICWS has been a prime international forum for both researchers and
industry practitioners to exchange the latest fundamental advances in
the state of the art and practice of Web services, identify emerging
research topics, and define the future of Web-based services. ICWS
2010 is sponsored by IEEE Computer Society. It is the eighth year of
gathering to formally explore “Services” Science and Technology in the
field of Services Computing, which was formally promoted by IEEE
Computer Society since 2003.

ICWS 2010 will be co-located with the 6th IEEE 2010 World Congress on
Services (SERVICES 2010), the 3rd IEEE 2010 International Conference
on Cloud Computing (CLOUD 2010), and the 7th IEEE 2010 International
Conference on Services Computing (SCC 2010) to grow itself to
continute to be the most prestigious professional conference dedicated
to Web services.

The technical program of ICWS 2010 will include a refereed research
track, an application and industry track, a work-in-progress track,
and a poster track. The research track will highlight foundational
work that strives to push beyond the limits of existing Web services
platforms and products, including experimental efforts, innovative
systems and investigations that identify weaknesses in the existing
Web services models.

The ICWS 2010 research track seeks original, UNPUBLISHED research
papers reporting substantive new work in various aspects of Web
services. Research papers must properly cite related work and clearly
indicate their contributions to the field of Web services. All topics
relevant to Web services are of interest, but the conference program
committee particularly encourages submissions related to the following
aspects of Web services:

Foundations of Web Services

        * Service-Oriented Architecture (SOA) and Evolutions
        * Models, methodologies, and tools (including analysis,
design, modeling, and composition)
        * Publishing, discovery, and selection (including in mobile
settings)
        * Validation and testing (including risk assessment and tracking)
        * Management and governance (including monitoring, QoS, privacy,
trust)
        * Formal methods (including modeling and specification, data
and process semantics, type systems, security, QoS, and other
properties)
        * Standards and implementation and deployment technologies

Web-based Services

        * Web 2.0 and Web X.0 concepts in Web services settings
        * Software as a Service (SaaS)
        * Service As Software
        * Cloud Computing
        * Technologies for building and operating massive data centers
(including middleware)

Web Services Applications beyond Web

        * Applications (including mobile, scientific, Grid and
utility, autonomic, and embedded computing)
        * Business process management (including business protocols,
business intelligence, service level agreements, and business
licensing models)

All submitted manuscripts will be peer-reviewed by at least 3 program
committee members. Accepted papers will appear in the conference
proceedings published by the IEEE Computer Society Press. Extended
versions of selected papers published in the ICWS 2010 will be invited
through a fast review channel for potential publication in the IEEE
Transactions on Services Computing (TSC), International Journal of Web
Services Research (JWSR) and the International Journal of Business
Process Integration and Management (IJBPIM). Both the ICWS Proceedings
and JWSR are included in EI Compendex. JWSR is also indexed in SCI-E.

Submitted manuscripts will be limited to 10 (IEEE Proceedings style)
pages and REQUIRED to be formatted using the IEEE Proceedings
template. Unformatted papers and papers beyond 10 pages will not be
reviewed. Electronic submission of manuscripts (in PDF or Word format)
is required. Detailed instructions for electronic paper preparation
and submission, panel proposals, tutorial proposals, workshop
proposals, and review process can be found at
each accepted paper is required to register to the conference and
present the paper. One Best Paper award and one Best Student Paper
award will be granted at ICWS 2010. The first author of the best
student paper must be a full-time student.
If your paper is application or solution oriented, you can consider
submitting it to ICWS 2010 Applications and Industry Track.
Manuscripts submitted to the Research Track focusing on application or
solution descriptions may be recommended to the Applications and
Industry Track for further consideration if the session slots are
available. Submitted papers with novel ideas but not accepted by the
Research Track and Applications and Industry Track may also be
recommended for potential consideration by the chairs of the
Work-in-Progress Track and Poster Track of ICWS 2010, and other tracks
and workshops of SERVICES 2010.

ICWS Program Committee requires that authors adopt the keywords and
index terms in Services Computing “M” from the IEEE CS taxonomy
(computer.org/tsc).

Important Dates:
==============
Abstract Submission Deadline: Feb. 15, 2010
Paper Submission Due Date:  Feb. 15, 2010
Decision Notification (Electronic): April 15, 2010
Camera-Ready Copy Due Date & Pre-registration Due:  April 30, 2010

Organizing Committee
=================
General Chairs
Stephen S. Yau, Arizona State University, USA
Ernesto Damiani, University of Milan, Italy

Program Co-Chairs
Calton Pu, Georgia Tech, USA
Sharad Singhal, HP Labs, USA

Program Vice Chair
Jia Zhang, Northern Illinois University, USA

Application and Industry Track Chairs
Wu Chou, Avaya Labs Research, Avaya, USA
Hemant Jain, University of Wisconsin, Milwaukee, USA

Work-in-Progress Track Chairs
Jorge Cardoso, SAP Research, Germany and University of Madeira, Portugal

Industry Sponsorship Chairs
Paul Hofmann, SAP Research, USA

Ph.D. Symposium Chairs
Zhihong Mao, University of Pittsburgh, USA

Local Arrangement Chairs
Jinpeng Wei, Florida International University, USA

Registration Chairs
Qun Zhou, IBM T.J. Watson Research Center, USA

Global SOA/Cloud Industry Summit Chairs
Tony Shan, CTS Inc, USA
Shigeru Hosono, NEC Internet Systems Research Laboratories, Kanagawa, Japan

Publicity Chairs
Manish Gupta, IBM Indua Research Lab, India
Althea Liang, Singapore Management University, Singapore

Tutorial Chairs
Rachida Dssouli, Concordia University, Canada

Panel Chairs
Bhavani Thuraisingham, University of Texas, Dallas, USA

Workshop Coordinating Chairs
Christian Huemer, University of Vienna, Austria
Zhixiong Chen, Mercy College, USA
Shiyong Lu, Wayne State University, USA

SERVICES CUP Chairs
Yuhong Yan, Concordia University, Canada

Innovation Show Case Chairs
Wing-Kwong Chan, City of University of Hong Kong, Hong Kong
Ali Bahrami, Boeing Research and Technology, USA
Manish Bhide, IBM India Research Lab, India

IEEE ICWS 2010 Program Committee (more to be confirmed)

Marco Aiello, University of Groningen, Netherlands
Mikio Aoyama, Nanzan University, Japan
Danilo Ardagna, Politecnico di Milano, Italy
Boualem Benatallah, University of New South Wales, Australia
Elisa Bertino, Purdue University, USA
Athman Bouguettaya, CSIRO ICT Center, Australia
Christoph Bussler, Merced Systems, Inc., USA
Wing-Kwong Chan, City University of Hong Kong, Hong Kong
Shiping Chen, CSIRO ICT Center, Australia
Ying Chen, IBM China Research Lab, China
Dickson K.W. Chiu, Dickson Computer Systems, Hong Kong, China
Wu Chou, Avaya Labs Research, Avaya, USA
Florian Daniel, University of Trento, Italy
Tharam Dillon, Curtin University, Australia
Marlon Dumas, University of Tartu, Estonia
Schahram Dustdar, Vienna University of Technology, Austria
Elena Ferrari , University of Insubria at Como, Italy
Piero Fraternali, Politecnico di Milano, Italy
Dimitrios Georgakopoulos, CSIRO ICT Center, Canberra, ACT, Australia
Nils Gruschka, NEC Research, Europe
Mohand-Said Hacid, University Claude Bernard Lyon, France
Patrick C. K. Hung, University of Ontario Institute of Technology, Canada
Toru Ishida, Kyoto University, Japan
Arun Iyengar IBM T.J. Watson Research Center, USA
Hai Jin, HUST, China
Rania Khalaf, IBM T.J. Watson Research Center, USA
Axel Kupper, Institute for Informatics, DE
Xiaoqing (Frank) Liu, Missouri University, USA
Shiyong Lu, Wayne State University, USA
Tiziana Margaria, University of Potsdam, Germany
Carolyn McGregor, University of Ontario Institute of Technology, Canada
Hong Mei, Peking University, China
Louise Moser, U.C. Santa Barbara, USA
Gilles Muller, Ecoles des Mines de Nantes, France
Sushil Prasad, Georgia State University, USA
Thierry Priol, Inria, France
Manfred Reichert, University of Ulm, Germany
Liuba Shrira, Brandeis University, USA
Gautam Shroff, Tata Consultancy Services, India
George Spanoudakis, City University, UK
Vijayan Sugumaran, Tata Consultancy Services, India
Kunal Verma, Accenture Technology Labs, USA
Andreas Wombacher, University of Twente, Netherlands
Liang-Jie Zhang, IBM T.J. Watson Research Center, USA
Nianjun (Joe) Zhou, IBM Research, USA
Rong Chang, IBM T.J. Watson Research Center, USA
Hamid Motahari Nezhad, HP Labs, USA
I-Ling Yen, UT Dallas, USA
Lakshmish Ramaswamy, UGA, USA
Annika Hinze, U. Waikato, NZ
M. Brian Blake, Univ. Notre Dame, USA
Prasad Joshi, Infosys, USA
Wang-Chien Lee, Penn State, USA
Charles Consel Dr. Inria, France
Prashant Doshi Professor UGA, USA
Claude Godart, Univ. Nancy, Lorraine Univ., FR
Steffen Staab, Univ. Koblenz-Landau, DE
Alexander Schill, TU Dresden, DE
Tevfik Bultan, UCSB, USA
Christoph Meinel, Univ. Postdam, DE
Sven Graupner, HP Labs, USA
Sujoy Basu, HP Labs, USA

Review Policy
=============
IEEE Policy and professional ethics require that referees treat the
contents of papers under review as privileged information not to be
disclosed to others before publication. It is expected that no one
with access to a paper under review will make any inappropriate use of
the special knowledge that access provides. Contents of abstracts
submitted to conference program committees should be regarded as
privileged as well, and handled in the same manner. The Conference
Publications Chair shall ensure that referees adhere to this practice.

Organizers of IEEE conferences are expected to provide an appropriate
forum for the oral presentations and discussions of all accepted
papers. An author, in offering a paper for presentation at an IEEE
conference, or accepting an invitation to present a paper, is expected
to be present at the meeting to deliver the paper. In the event that
circumstances unknown at the time of submission of a paper preclude
its presentation by an author, the program chair should be informed on
time, and appropriate substitute arrangements should be made. In some
cases it may help reduce no-shows for the Conference to require
advance registration together with the submission of the final
manuscript.

The Third IEEE International Conference on Cloud Computing (CLOUD 2010)

Call for Papers
(Accepting paper submissions from Nov. 1, 2009)

July 5-10, 2010, Miami, Florida, USA

(Download a full-page color poster (in November 2009 and December 2009
Issues of the Communications of ACM and IEEE Computer) for the largest
Services Computing event in 2010!)
Sponsored by the Technical Committee on Services Computing (IEEE
Computer Society), the Third IEEE 2010 International Conference on
Cloud Computing (CLOUD 2010) will be co-located with the 6th IEEE 2010
World Congress on Services (SERVICES 2010), the 8th IEEE 2010
International Conference on Web Services (ICWS 2010), and the 7th IEEE
2010 International Conference on Services Computing (SCC 2010) to grow
itself to continue to be the most prestigious professional conference
dedicated to cloud computing.

“Change we are leading” is the theme of CLOUD 2010. Cloud Computing
has become a scalable services consumption and delivery platform in
the field of Services Computing. The technical foundations of Cloud
Computing include Service-Oriented Architecture (SOA) and
Virtualizations of hardware and software. The goal of Cloud Computing
is to share resources among the cloud service consumers, cloud
partners, and cloud vendors in the cloud value chain. The resource
sharing at various levels results in various cloud offerings such as
infrastructure cloud (e.g. hardware, IT infrastructure management),
software cloud (e.g. SaaS focusing on middleware as a service, or
traditional CRM as a service), application cloud (e.g. Application as
a Service, UML modeling tools as a service, social network as a
service), and business cloud (e.g. business process as a service).

In the fast growing Services Computing community, we have launched a
series of events to promote and grow Cloud Computing in the past
years. In 2002, we promoted Business Grid to share business processes
and applications. In early 2008, The IEEE Transactions on Services
Computing (TSC) has adopted Cloud Computing to be included in the
taxonomy as a body of knowledge area of Services Computing. In July
2008, the IEEE International Conference on Services Computing (SCC
2008) has delivered a keynote panel “Business Cloud: Bridging The
Power of SOA and Cloud Computing” and a keynote “Cloud Computing”. In
September 2008, the 2008 IEEE International Conference on Web Services
(ICWS 2008) has delivered a keynote “Web Services:
Software-as-a-Service (SaaS), Communication, and Beyond” and a panel
“Cloud Computing and IT as a Service: Opportunities and Challenges” to
further motivate the community members to define Cloud Computing in
various areas.

Based on the technology foundations and industry driving forces, the
2009 International Conference on Cloud Computing (CLOUD 2009) is
created to provide a prime international forum for both researchers
and industry practitioners to exchange the latest fundamental advances
in the state of the art and practice of Cloud Computing, identify
emerging research topics, and define the future of Cloud Computing.
CLOUD 2009 is the hot-topic conference co-located with the 2009 World
Congress on Services (SERVICES 2009). The two well-established theme
conferences, the 2009 IEEE International Conference on Web Services
(ICWS 2009) held in July 2009 in USA and the 2009 IEEE International
Conference on Services Computing (SCC 2009) held in September 2009 in
India, also enjoyed the success of launching CLOUD-I 2009 and CLOUD-II
2009.  CLOUD 2009 was jointly sponsored by IEEE Computer Society
Technical Committee on Services Computing (TC-SVC) and Services
Society. As a community, we have ac!
 accomplished very well around CLOUD 2009’s theme “Change We Can Lead” in
2009.

To discuss this emerging enabling technology of the modern services
industry, CLOUD 2010 invites you to join the largest academic
conference to explores modern services and software sciences in the
field of Services Computing, which was formally promoted by IEEE
Computer Society since 2003. From technology foundation perspective,
Services Computing has become the default discipline in the modern
services industry.

CLOUD 2010 tries to attract researchers, practitioners, and industry
business leaders in all the following areas to help define and shape
cloud computing, and its related modernization strategy and directions
of the services industry.  You are invited to submit research,
engineering, and business innovation papers to the following areas:

.Infrastructure Cloud
.Software Cloud
.Application Cloud
.Business Cloud
.Service-Oriented Architecture in Cloud Computing .Vituralization of
Hardware Resources .Virtualization of Software Resources .Cloud
Computing Consulting Methods .Design Tool for  Cloud Computing
.Maintenance and Management of Cloud Computing .Cloud Computing
Architecture .Cloud Applications in Vertical Industries Paper
Submission and Review Process

Please use the submission page
right tracks and events to submit your papers.

All submitted manuscripts will be peer-reviewed by at least 3 program
committee members. Please note that the same paper should NOT be
submitted to other conferences or events simultaneously. Such
duplicate submissions will be rejected from all conferences without
review.

At least one author of each accepted paper is required to register to
the conference and present the paper.  Only the accepted and presented
papers will be published in the CD-ROM version and online version of
the Proceedings of the 2010 IEEE International Conference on Cloud
Computing (CLOUD 2010), which will be published by the IEEE Computer
Society Press. Extended versions of selected best papers published in
CLOUD 2010 will be invited for potential publication in the
International Journal of Web Services Research (JWSR), the
International Journal of Business Process Integration and Management
(IJBPIM), and IEEE Transactions on Services Computing (TSC). The CLOUD
2010 Proceedings is expected to be included in EI Compendex and other
indexing systems. JWSR is indexed in SCI-E and EI Compendex.

Submitted manuscripts will be limited to 8 (IEEE Proceedings style)
pages and required to be formatted using the IEEE Proceedings
template. Electronic submission of manuscripts (in PDF or Word format)
is required. Detailed instructions for electronic paper preparation
and submission, panel proposals, tutorial proposals, and review
process can be found from this web site.

CLOUD 2010 Organizing Committee

General Chairs
Stephen S. Yau, Arizona State University, USA
Liang-Jie Zhang, IBM T.J. Watson Research, USA

Program Co-Chairs
Wu Chou, Avaya Labs Research, Avaya, USA
Adrezej M Goscinski, Deakin University, Australia

Application and Industry Track Chairs
Claudio Bartolini, HP Labs, USA
Min Luo, IBM Software Group, USA

Work-in-Progress Track Chairs
Jian Yang, Macquarie University, Australia
Swami Sivasubramanian, Amazon, USA

Industry Sponsorship Chairs
Paul Hofmann, SAP Research, USA

Ph.D. Symposium Chairs
Zhihong Mao, University of Pittsburgh, USA

Local Arrangement Chairs
Jinpeng Wei, Florida International University, USA

Registration Chairs
Qun Zhou, IBM T.J. Watson Research Center, USA

Global SOA/Cloud Industry Summit Chairs
Tony Shan, CTS Inc, USA
Shigeru Hosono, NEC Internet Systems Research Laboratories, Kanagawa, Japan

Publicity Chairs
Manish Gupta, IBM Indua Research Lab, India
Althea Liang, Singapore Management University, Singapore

Tutorial Chairs
Rachida Dssouli, Concordia University, Canada

Panel Chairs
Bhavani Thuraisingham, University of Texas, Dallas, USA

Workshop Coordinating Chairs
Christian Huemer, University of Vienna, Austria
Zhixiong Chen, Mercy College, USA
Shiyong Lu, Wayne State University, USA

SERVICES CUP Chairs
Yuhong Yan, Concordia University, Canada

Innovation Show Case Chairs
Wing-Kwong Chan, City of University of Hong Kong, Hong Kong
Ali Bahrami, Boeing Research and Technology, USA
Manish Bhide, IBM India Research Lab, India

IEEE CLOUD 2010 Program Committee (more to be confirmed)

Aameek Singh, IBM Almaden Research Center, USA
Alexander Lazovik, University of Groningen (RuG), Netherlands
Anand Ranganathan, IBM TJ Watson Research Center, USA
Andy Ju An Wang, Southern Polytechnic State University, USA
Athman Bouguettaya, CSIRO ICT Center, Canberra, ACT, Australia
Atilla Elci, Eastern Mediterranean University, Turkey
Axel Kupper, Deutsche Telekom Laboratories/TU Berlin, DE
Azzel Taleb-Bendiab, Liverpool John Moores University, UK
Berthold Reinwald, IBM Almaden Research Center, USA
Bharat K. Bhargava, Purdue University, USA
Boualem Benatallah, University of New South Wales, Australia
Brahim Medjahed, University of Michigan, USA
Brian Cooper, Yahoo! Research, USA
Carolyn McGregor, University of Ontario Institute of Technology, Canada
Ching-Hsien Hsu, Chung Hua University, Taiwan
Cho-Li Wang, University of Hong Kong, China
Christoph Bussler, Merced Systems, Inc., USA
Claude Godart, Nancy University and INRIA, France
Danilo Ardagna, Politecnico di Milano, Italy
David Cheung, University of Hong Kong, China
Dawn Jutla, Saint Mary’s University, Canada
Dejan S. Milojicic, HP Laboratories, USA
Dickson K.W. Chiu, Dickson Computer Systems, Hong Kong, China
Dimitrios Georgakopoulos, CSIRO ICT Center, Canberra, ACT, Australia
Dunlu Peng, Fudan University, China
Elena Ferrari, Politiche e dell’Informazione, University of Insubria
at Como, Italy
Elisa Bertino, Purdue University, USA
Ernesto Damiani, University of Milan, Italy
Feng Liu, Avaya Labs, USA
Frank Leymann, University of Stuttgart, Germany
Geng Lin, Cisco, USA
George Spanoudakis, City University, UK
Gianluigi Zavattaro, University of Bologna, Italy
Haibin Zhu, Nipissing University, Canada
Heiko Ludwig, IBM Research, USA
Hong Cai, IBM China Software Development Lab, China
Hong Zhu, Oxford Brookes University, UK
Hongji Yang, Montfort University, UK
Huaigu Wu, SAP Labs, Canada
Ignacio Martin, Llorente Universidad Complutense de Madrid, Spain
J.P. Martin-Flatin, NetExpert, Switzerland
Jacek Kitowski, University of Science and Technology – AGH, Poland
Janaka L. Balasooriya, Arizona State University, USA
Jeff Kephart, IBM T.J. Watson Research Center, USA
Jeffrey J.-P. Tsai, University of Illinois at Chicago, USA
Jeffrey T.Kreulen, IBM Almaden Research Center, USA
Jia Zhang, Northern Illinois University, USA
Jian Yang, Macquaire University, Australia
Jiannong Cao, Hong Kong Polytechnic University, Hong Kong
Jianxin Li, Beihang University, China
Josef Schiefer, Vienna University of Technology, Austria
Jun Shen, University of Wollongong, Australia
Kazuo Iwano, IBM, Japan
Ken Hopkinson, Air Force Institute of Technology, USA
Kerry Taylor, CSIRO, Australia
Khalil El-Khatib, University of Ontario Institute of Technology, Canada
Konstantin Laufer, Loyola University Chicago, USA
Krzysztof Ostrowski, Cornell University, USA
Kumar Bhaskaran, IBM T.J. Watson Research Center, USA
Kunal Verma, Accenture Technology Labs, USA
Leslie Liu, IBM T.J Watson Research Center, USA
Li Li, Avaya Labs, USA
Liana L. Fong, IBM T.J. Watson Research Center, USA
Liang-Jie Zhang, IBM T.J. Watson Research, USA
Ling Liu, Georgia Institute of Technology, USA
Liuba Shrira, Brandeis University, USA
Louise Moser, UC Santa Barbara, USA
Ludmila Cherkasova, HP Laboratories, USA
Luigi Lo Iacono, NEC Lab
M. Brian Blake, George Town University, USA
Malolan Chetlur, IBM India Research Lab, India
Manfred Reichert, University of Ulm, Germany
Marco Aiello, University of Groningen, Netherlands
Marcus Fontoura, Yahoo Research, USA
Mario Bravetti, University of Bologna, Italy
Masoom Alam SERG, IMSciences, Pakistan
Massimo Paolucci, Docomo Euro-Labs, Germany
Michael Hafner, University of Innsbruck, Austria
Michael Maximilien, IBM Almaden Research Center, USA
Michiaki Tatsubori, IBM Tokyo Research Laboratory, Japan
Mikio Aoyama, Nanzan University, Japan
Min Luo, IBM Software Group, USA
Minglu Li, Shanghai Jiao Tong University, China
Naohiko Uramoto, IBM Tokyo Research Laboratory, Japan
Nianjun (Joe) Zhou, IBM Research, USA
Nikolai Joukov, IBM T.J. Watson Research Center
Niranjan Iyengar Varadharajan, Infosys Technologies Limited, India
Nirmit Desai, IBM India Research Lab, India
Norbert Ritter, University of Hamburg, Germany
Ofer Biran, IBM Haifa Research Lab, Israel
Onyeka Ezenwoye, South Dakota State University, USA
Patrick C. K. Hung, University of Ontario Institute of Technology, Canada
Paul Buhler, College of Charleston, USA
Qi Yu, Rochester Institute of Technology, USA
Rajkumar Buyya, The University of Melbourne, Australia
Rania Khalaf, IBM T.J. Watson Research Center, USA
Raymond Wong, University of New South Wales & NICTA, Australia
Robert van Engelen, Florida State University, USA
Roger (Buzz) King, University of Colorado at Boulder, USA
Rong Chang, IBM T.J. Watson Research Center, USA
Sandip Agarwala, IBM Almaden Research Center, USA
Satoshi Hada, IBM Tokyo Research Lab, Japan
Savitha Srinivasan, IBM Almaden Research Center, USA
SeogChan Oh, GM Research, USA
Sheikh Iqbal Ahamed, Marquette University, USA
Shiping Chen, CSIRO ICT Centre, Australia
Shiyong Lu, Wayne State University, USA
Soo Dong Kim, Soongsil University, Korea
Srinivas Padmanabhuni, Infosys India
Sujoy Basu, HP Labs – Palo Alto, USA
Surya Nepal, CSIRO, Australia
Swami Sivasubramanian, Amazon, USA
Tharam Dillon, Curtin University, Australia
Thierry Priol, Inria, France
Thomas E. Potok, Oak Ridge National Lab (ORNL), USA
Tiziana Margaria, University of Potsdam, Germany
Tony Shan, IBM Global Technology Services, USA
Toyotaro Suzumura, IBM Research, Tokyo Research Laboratory
Vadim Ermolayev, Zaporozhye National University, Ukraine
Vijay K. Gurbani, Bell Laboratories, Alcatel-Lucent, USA
Vijay Naik, IBM T.J. Watson Research Center, USA
Vladimir Getov, University of Westminster, UK
Weimin Zheng, Tsinghua University, China
William Cheng-Chung Chu, Tunghai University, Taiwan
Wolf Zimmermann, Martin-Luther-Universitat Halle-Wittenberg, Germany
Wu Chou, Avaya Labs Research, Avaya, USA
Xiaoling Wang, Fudan University, China
Xiaoqing (Frank) Liu, Missouri University of Science and Technology, USA
Xumin Liu, Rochester Institute of Technology, USA
Yanbo Han, Chinese Academy of Sciences, China
Ying Chen, IBM China Research Lab, China
Yong Woo Lee, The University of Seoul, Korea
Yuan-Chwen You, National Sun Yat-Sen University, Taiwan
Yuqing Gao, IBM T.J. Watson Research Center, USA
Yuqing Sun, Shandong University, China
Zaki Malik, Wayne State University, USA
Nils Gruschka, NEC Research, Europe

Technical Steering Committee:

Carl K. Chang, Ph.D.
Department Chair and Professor, Iowa State University, USA

Ephraim Feig, Ph.D.
President, Innovations-to-Market, USA

Hemant Jain, Ph.D.
Professor, University of Wisconsin at Milwaukee , USA

Frank Leymann, Ph.D.
Professor, University of Stuttgart, Germany

Liang-Jie Zhang, Ph.D. (Chair)
Research Staff Member and Founding Chair of Services Computing
Professional Interest Community, IBM T.J. Watson Research Center, USA

Paper Review Policy

IEEE CLOUD 2010’s Policy and professional ethics require that referees
treat the contents of papers under review as privileged information
not to be disclosed to others before publication. It is expected that
no one with access to a paper under review will make any inappropriate
use of the special knowledge, which that access providers. Contents of
abstracts submitted to conference program committees should be
regarded as privileged as well, and handled in the same manner. The
Conference Publications Chair shall ensure that referees adhere to
this practice.

Organizers of IEEE conferences are expected to provide an appropriate
forum for the oral presentation and discussion of all accepted papers.
An author, in offering a paper for presentation at an IEEE conference,
or accepting an invitation to present a paper, is expected to be
present at the meeting to deliver the paper. In the event that
circumstances unknown at the time of submission of a paper preclude
its presentation by an author, the program chair should be informed on
time, and appropriate substitute arrangements should be made. In some
cases it may help reduce no-shows for the Conference to require
advance registration together with the submission of the final
manuscript.
Important Dates:

Paper Submission Due Date:  March 6, 2010 (Accepting paper submissions
from Nov. 1, 2009) Decision Notification (Electronic): April 15, 2010
Camera-Ready Copy Due Date & Pre-registration Due:  April 30, 2010

Cisters in the Struggle: Exploring Trans Families, Relationships and Communities from the Cisgendered Ally Perspective(s).

CFP: National Women’s Studies Association (NWSA) Conference; November 
11-14, 2010. Denver, CO.

Title:  Cisters in the Struggle: Exploring Trans Families, 
Relationships and Communities from the Cisgendered Ally Perspective(s).

As Trans Studies continues to emerge as an academic (sub) discipline, 
this panel aims to explore the socio-personal relations between 
transgendered individuals and their cisgendered allies. I am searching 
for theoretical and/or autobiographical contributions to this panel 
that address some aspect of this topic. This could include, but is not 
limited to projects on transgender marriages/partnerships; transgender 
parenthood; how to be an effective ally; and participating in trans 
communities as a cisgendered person. In this session, I hope to look 
at the ways in which transgender issues influence and shape not only 
the lives of trans-people, but also the lives of those who love them. 
Projects that include intersectional analysis with issues of race, 
class, sexuality, nation, age, and ability among other categories are 
especially encouraged.

If would like to be a part of this panel, or have questions, please 
contact me at carte489@umn.edu. Submissions to the panel should be 
emailed to me by February 20, 2010, and must include: your name, 
institutional affiliation, U.S. postal address, email address, phone 
number, the title of your talk, and a 50-100 word abstract on your 
planned project.  Each panel member will speak for 10-15 minutes 
leaving time afterward for Q&A.

I look forward to hearing from you!

Angela Carter

Feminist Studies, Ph.D. Student

University of Minnesota

carte489@umn.edu.

Gender Performance, Transgender Perspectives

Call for Proposals for a panel session at the 2010 National Women’s 
Studies Association (NWSA) Conference, to be held November 11-14, 2010 
in Denver, Colorado.

Stephanie Dykes, an independent scholar on transgender issues, and 
Angela Carter, a doctoral student at the University of Minnesota, are 
organizing a panel for the 2010 conference of the National Women’s 
Studies Association conference, which will be held in Denver, Colorado 
from November 11 ­ 14, 2010.

We are organizing a panel on the topic of “Gender Performance: 
Transgender Perspectives” This panel will address the conference 
thematic areas of Complicating the Queer and “Outsider” Feminisms.

If you are interested in being considered as a member of this panel, 
please submit a title and abstract (50 ­ 100 words), along with your 
name, institutional affiliation, and contact information (mailing 
address, e-mail(s), and telephone number or numbers) by February 20 to 
Stephanie Dykes, Ph.D. at stephanie_new@hotmail.com. You may also 
submit additional information, including the rationale for how your 
proposal relates to the theme of this panel, and any other information 
that you believe will be of assistance in helping Dr. Dykes and Ms. 
Carter make their selection decisions.

We are looking for empirical, theoretical and activist contributions 
to the
topic of trans and gender non-conforming individual’s performance of 
gender, including, but not limited to, drag, passing, stealth, gender 
performance, and gender attribution.

If your proposal is not accepted for this panel, you will still have 
the option to submit your proposal as an individual for consideration 
by the NWSA.

Please note that each panel member is responsible for her or his own 
expenses related to this conference, including but not limited to, 
membership in the NWSA, conference fees, transportation to and from 
the conference, lodging, meals, and any other cost associated with 
this conference. Furthermore, NWSA guidelines state that

“All participants on the 2010 NWSA program must be current (2010) 
members of NWSA, including the pre-conferences and general conference. 
Membership in NWSA runs from January 1-December 31, 2010. … 
Participants must be current members and pre-registered for the 
conference by August 31, 2010 or risk being removed from the printed 
program book.”

Each participant selected to be on this panel must commit to attending 
the 2010 NWSA conference.
Questions? Contact Angela Carter, carte489@umn.edu