20.517, Calls: Lang Documentation/United Kingdom;Comp Ling/United Kingdom

LINGUIST Network linguist at LINGUISTLIST.ORG
Wed Feb 18 16:49:01 UTC 2009


LINGUIST List: Vol-20-517. Wed Feb 18 2009. ISSN: 1068 - 4875.

Subject: 20.517, Calls: Lang Documentation/United Kingdom;Comp Ling/United Kingdom

Moderators: Anthony Aristar, Eastern Michigan U <aristar at linguistlist.org>
            Helen Aristar-Dry, Eastern Michigan U <hdry at linguistlist.org>
 
Reviews: Randall Eggert, U of Utah  
       <reviews at linguistlist.org> 

Homepage: http://linguistlist.org/

The LINGUIST List is funded by Eastern Michigan University, 
and donations from subscribers and publishers.

Editor for this issue: Kate Wu <kate at linguistlist.org>
================================================================  

LINGUIST is pleased to announce the launch of an exciting new feature:  Easy Abstracts! Easy Abs is a free abstract submission and review facility designed to help conference organizers and reviewers accept and process abstracts online.  Just go to: http://www.linguistlist.org/confcustom, and begin your conference customization process today! With Easy Abstracts, submission and review will be as easy as 1-2-3!

===========================Directory==============================  

1)
Date: 18-Feb-2009
From: Chaithra Puttaswamy < cp28 at soas.ac.uk >
Subject: 3L Student Conference on Language Documentation and Description

2)
Date: 17-Feb-2009
From: Galyna Akmayeva < info at icitst.org >
Subject: The 4th International Conference for Internet Technology and Secured Transactions
 

	
-------------------------Message 1 ---------------------------------- 
Date: Wed, 18 Feb 2009 11:45:42
From: Chaithra Puttaswamy [cp28 at soas.ac.uk]
Subject: 3L Student Conference on Language Documentation and Description

E-mail this message to a friend:
http://linguistlist.org/issues/emailmessage/verification.cfm?iss=20-517.html&submissionid=206027&topicid=3&msgnumber=1
  

Full Title: 3L Student Conference on Language Documentation and Description 

Date: 03-Jul-2009 - 03-Jul-2009
Location: London, United Kingdom 
Contact Person: Conference Organiser
Meeting Email: 3lstudentconference at gmail.com
Web Site: http://www.hrelp.org/events/3L/student.html 

Linguistic Field(s): Language Documentation 

Call Deadline: 11-May-2009 

Meeting Description:

The Student Conference on Language Documentation and Description is organised by
the students of Endangered Languages Academic Programme at the School of
Oriental and African Studies, University of London on 3rd July 2009. This
conference is part of the 3L Summer School on Language Documentation and
Description 2009. The one-day conference aims to provide a platform for 
students to share their work with their peers and senior scholars and receive 
constructive feedback. 

Call for Papers

Students are invited to submit an abstract of no more than 400 words in English
or French by 11 May 2008. Each presentation will be of 20 minutes duration
followed by 10 minutes for questions. The abstracts should be submitted online
from http://linguistlist.org/confcustom/3lstudentconf09

Preference will be given to students who are accepted to attend the Summer
School, though non-attendees are also invited to submit abstracts and may be 
selected to present at the conference. Note that students presenting at the 
conference who are not enrolled in the Summer School will be asked to pay a 
participation fee of £10 to help cover costs. Participation fee includes:
- Conference booklet 
- Refreshments and biscuits during coffee breaks 
- Lunch

Themes
Language Documentation as theory and practice 
Applied aspects of Language Documentation
New techniques and technology for documenting and describing lesser known 
languages
Community-oriented language documentation
Documentation and Description - a balancing act
Language revitalization 

Important Dates
Deadline for submission of abstracts: 11 May 2009
Notification of Accepted Papers: 30 May 2009
Conference: 3 July 2009

The conference will take place in rooms G50 and G51 located in the SOAS Main 
Building, Thronhaugh Street, Russell Square, London WC1H 0XG.

Enquiries
For any enquiry please contact: 3lstudentconference at gmail.com

Organizing Committee
Mike Franjieh
Chaithra Puttaswamy
Radu Voica



	
-------------------------Message 2 ---------------------------------- 
Date: Wed, 18 Feb 2009 11:45:52
From: Galyna Akmayeva [info at icitst.org]
Subject: The 4th International Conference for Internet Technology and Secured Transactions

E-mail this message to a friend:
http://linguistlist.org/issues/emailmessage/verification.cfm?iss=20-517.html&submissionid=205986&topicid=3&msgnumber=2
 
	
Full Title: The 4th International Conference for Internet Technology and Secured
Transactions 
Short Title: ICITST-2009 

Date: 09-Nov-2009 - 12-Nov-2009
Location: London, United Kingdom 
Contact Person: Galyna Akmayeva
Meeting Email: info at icitst.org
Web Site: http://www.icitst.org 

Linguistic Field(s): Computational Linguistics 

Call Deadline: 31-May-2009 

Meeting Description:

The ICITST is an international refereed conference dedicated to the advancement 
of the theory and practical implementation of secured Internet transactions and 
to fostering discussions on information technology evolution. The ICITST aims 
to provide a highly professional and comparative academic research forum that 
promotes collaborative excellence between academia and industry. 

Call for Papers

The objectives of the ICITST are to bridge the knowledge gap between academia 
and industry, promote research esteem in secured Internet transactions and the 
importance of information technology evolution to secured transactions. The 
ICITST-2009 invites research papers that encompass conceptual analysis, design 
implementation and performance evaluation.

All the accepted papers will appear in the proceedings published by IEEE and 
fully indexed by IEEE Xplore. All the ICITST papers are indexed by DBLP.

The topics in ICITST-2009 include but are not confined to the following areas:
-  Application of agents 
-  Application security 
-  Blended Internet security methods 
-  Biometrics 
-  Boundary issues of Internet security 
-  Broadband access technologies 
-  Challenges of content authoring 
-  Data mining security 
-  E-society 
-  Globalisation of information society 
-  Government, and corporate Internet security policy 
-  Internet architecture 
-  Infonomics 
-  IPSec quality of services 
-  Patentability 
-  Regulation, self-regulation, and co-regulation Web services 
-  Secured database systems 
-  Synchronising e-security 
-  Technology-enabled information 
-  Trust, privacy, and data security 
-  Wireless transactions 
-  Context-Awareness and its Data mining for Ubi-com service 
-  Human-Computer Interface and Interaction for Ubi-com 
-  Smart Homes and its business model for Ubi-com service 
-  Intelligent Multimedia Service and its Data management for Ubi-com 
-  USN / RF-ID for Ubi-com service 
-  Network security issues, protocols, data security in Ubi-com 
-  Database protection for Ubi-com 
-  Privacy Protection and Forensic in Ubi-com 
-  Multimedia Security in Ubi-com 
-  Quality of Service Issues 
-  Authentication and Access control for data protection in Ubi-com 
-  Information visualization 
-  Web services
-  Service, Security and its Data management for U-commerce 
-  New novel mechanism and Applications for Ubi-com 
-  Information Management 
-  Multimedia Information Systems 
-  Information Retrieval 
-  Natural Language Processing 
-  Digital Libraries 
-  Data and Information Quality Management 
-  Data Grids, Data and Information Quality 
-  Database Management 
-  Web Databases 
-  Temporal and Spatial Databases 
-  Data Mining 
-  Web Mining including Web Intelligence and Web 3.0 
-  E-Learning, eCommerce, e-Business and e-Government 
-  Web Metrics and its applications 
-  XML and other extensible languages 
-  Semantic Web and Ontology 
-  Human-Computer Interaction 
-  Artificial Intelligence and Expert Systems 
-  Knowledge Management 
-  Ubiquitous Systems 
-  Peer to Peer Data Management 
-  Interoperability 
-  Mobile Data Management 
-  Data Models for Production Systems and Services 
-  Data Exchange issues and Supply Chain 
-  Data Life Cycle in Products and Processes 
-  Case Studies on Data Management, Monitoring and Analysis 
-  Security and Access Control 
-  Information Content Security 
-  Mobile, Ad Hoc and Sensor Network Security 
-  Distributed information systems


 





-----------------------------------------------------------
LINGUIST List: Vol-20-517	

	



More information about the LINGUIST mailing list