C4I Center



     MENU

   STIDS 2012 Home

About--
   Topic list
  Program Committee
   Venue & Local info
   Registration
   Sponsors

Program--
   Keynote Speakers  
   Tutorials  
   Best Paper Award  
   Agenda & Papers  
   Download Agenda  
   Proceedings  

   Call for Papers  
   Important dates  
   Submission details  
   Download CFP  
   Attendees  


   C4I Home


OIC Logo

SEMANTIC TECHNOLOGY FOR
INTELLIGENCE, DEFENSE, AND SECURITY

                STIDS 2012



CALL FOR PAPERS


AUDIENCE

The conference is an opportunity for collaboration and cross-fertilization between researchers and practitioners of semantic-based technologies with particular experience in the problems facing the Intelligence, Defense, and Security communities. It will feature invited talks from prominent ontologists and recognized leaders from the target application domains.

To facilitate interchange among communities with a clear commonality of interest but little history of interaction, STIDS will host two separate tracks. The Research Track will showcase original, significant research on semantic technologies applicable to problems in intelligence, defense or security. Submissions to the research track are expected to clearly present their contribution, demonstrate its significance, and show the applicability to problems in the target applications domain. The Applications Track provides a forum for presenting implemented semantic-based applications to intelligence, defense, or security, as well as to discuss and evaluate the use of semantic techniques in these areas. Of particular interest are comparisons between different technologies or approaches and lessons learned from applications. By capitalizing on this opportunity, STIDS could spark dramatic progress toward transitioning semantic technologies from research to the field.


TOPICS

Both tracks welcome the submission of papers on semantic technologies applied to the fields of Intelligence, Defense, and Security. We are especially interested in papers on the following topics:

  • Creating an interoperable suite of public-domain semantic technology/ontologies relevant to intelligence, defense, and security covering areas such as:
    • Biology and health
    • Command and Control and Situation Awareness
    • Conditions that foster or inhibit outbreak of violence
    • Controlled substance interception
    • Course-of-action planning
    • Cyberspace: Computer network operations (defense, exploitation, counter-attack)
    • Emergency response
    • Ethnicity, religion, culture and politics
    • Financial Analysis
    • Human factors
    • Infrastructure protection
    • Information sharing
    • Intelligence collection, analysis, and dissemination
    • International law
    • ISR (Intelligence, Surveillance, Reconnaissance)
    • Money Laundering
    • Predictive analysis
    • Resiliency
    • Risk analytics
    • Science and Technology (S&T)
    • Social networks
    • Spatial and temporal phenomena
    • Vulnerability assessment
  • Ontologies and reasoning under conditions of uncertainty
  • Semantic technology and ontological issues related to:
    • Source credibility and evidential pedigree
    • Use of sensing devices including security e.g. global infrastructure grid (GIG),
      images and intelligence collection in general
  • Usability issues relating to semantic technology
  • Best practices in ontological engineering
DATES

System ready for submissions:   June 15, 2012
Paper submissions due:    July 31, 2012               Extended
Notification of acceptance:    September 4, 2012       Extended
Camera-ready papers due:    September 18, 2012
Presentations due:    October 17, 2012

Tutorials      October 23
Main Conference      October 24-26
Early Bird Registration rates until      September 25


SUBMISSION DETAILS

Both tracks will accept submissions of technical papers. Each submission will be evaluated for acceptability by at least three members of the Program Committee. Decisions about acceptance will be based on relevance to the above topic list, originality, potential significance, topicality and clarity. Because all accepted papers are to be presented at the conference, we require that at least one of the submitting authors must be a registered participant committed to attend STIDS 2012.

Submissions are accepted only in electronic format and should be sent via the conference's submission site. Papers must closely follow the US Letter version of the IEEE format for conference proceedings. For complete details and to download MS Word and LaTeX templates (choose the US Letter size), see IEEE's Manuscript Template webpage at: IEEE's Manuscript Template webpage. .

Technical papers must not exceed 8 pages, including figures. Submissions exceeding this limit will not be reviewed. In addition, papers that, at the time of submission, are under review for or have already been published in or accepted for publication in a journal or another conference will not be accepted to the STIDS conference. All papers must be unclassified and suitable for release in a public forum.


PRESENTATION AND PUBLICATION

All papers accepted to either track in STIDS 2012 will be presented during the conference and published in the conference proceedings, which will be available as a separate publication after the Conference.


Download PDF




Last updated: 03/19/2013