[Humanist] 28.413 pubs: LLC 29.4; cfp for History of Humanities, Defense & Security

Humanist Discussion Group willard.mccarty at mccarty.org.uk
Sat Oct 18 07:48:34 CEST 2014

                 Humanist Discussion Group, Vol. 28, No. 413.
            Department of Digital Humanities, King's College London
                Submit to: humanist at lists.digitalhumanities.org

  [1]   From:    "oxfordjournals-mailer at alerts.stanford.edu"               (53)
        Subject: Lit Linguist Computing Vol. 29, No. 4

  [2]   From:    "Bod, Rens" <L.W.M.Bod at uva.nl>                             (4)
        Subject: New Chicago journal "History of Humanities" has been

  [3]   From:    Andrew Prescott <Andrew.Prescott at glasgow.ac.uk>          (100)
        Subject: Call for Book Chapters: Recent Advances in Computational
                Intelligence in Defense and Security

        Date: Fri, 17 Oct 2014 06:53:45 +0000
        From: "oxfordjournals-mailer at alerts.stanford.edu"
        Subject: Lit Linguist Computing Vol. 29, No. 4

Literary and Linguistic Computing Table of Contents Alert
Special Issue [lsquo ]Computational Models of Narrative[rsquo ]
Vol. 29, No. 4
December 2014


  Mark A. Finlayson, Floris Bex, Pablo Gervás, and Deniz Yuret
  Lit Linguist Computing 2014 29: 465-466

 Original Articles

  Arguments as a new perspective on character motive in stories
  Floris Bex, Katie Atkinson, and Trevor Bench-Capon
  Lit Linguist Computing 2014 29: 467-487

  Annotating with Propp’s Morphology of the Folktale: reproducibility and 
  Bernhard Fisseni, Aadil Kurji, and Benedikt Löwe
  Lit Linguist Computing 2014 29: 488-510

  Composing narrative discourse for stories of many characters: A case 
  study over a chess game
  Pablo Gervás
  Lit Linguist Computing 2014 29: 511-531

  Narrative similarity as common summary: Evaluation of behavioral and 
  computational aspects
  Elektra Kypridemou and Loizos Michael
  Lit Linguist Computing 2014 29: 532-560

  Cognitive models of discourse comprehension for narrative generation
  James Niehaus and R. Michael Young
  Lit Linguist Computing 2014 29: 561-582

  An NLP-based cross-document approach to narrative structure discovery
  Nils Reiter, Anette Frank, and Oliver Hellwig
  Lit Linguist Computing 2014 29: 583-605

  Can believable characters act unexpectedly?
  Antoine Saillenfest and Jean-Louis Dessalles
  Lit Linguist Computing 2014 29: 606-620

  Towards modeling expressed emotions in oral history interviews: Using 
  verbal and nonverbal signals to track personal narratives
  Khiet P. Truong, Gerben J. Westerhof, Sanne M. A. Lamers, and Franciska 
  de Jong
  Lit Linguist Computing 2014 29: 621-636

        Date: Fri, 17 Oct 2014 13:43:07 +0000
        From: "Bod, Rens" <L.W.M.Bod at uva.nl>
        Subject: New Chicago journal "History of Humanities" has been launched.

New Chicago journal "History of Humanities" has been launched.

Call for submissions: http://www.press.uchicago.edu/pressReleases/2014/October/1410HOH.html

Best wishes,

Rens Bod

        Date: Fri, 17 Oct 2014 14:32:32 +0000
        From: Andrew Prescott <Andrew.Prescott at glasgow.ac.uk>
        Subject: Call for Book Chapters: Recent Advances in Computational Intelligence in Defense and Security

Call for Book Chapters

Upcoming Book: "Recent Advances in Computational Intelligence in Defense and Security"

To be published in: Springer's Studies in Computational Intelligence Series

Website: http://www.ieeeottawa.ca/ci/cids-book/

Abstract submission deadline: October 30, 2014

Volume Co-Editors:
    Rami Abielmona, Larus Technologies Corporation, Canada
    Rafael Falcon, Larus Technologies Corporation, Canada
    Nur Zincir-Heywood, Dalhousie University, Canada
    Hussein Abbass, Australian Defense Force Academy, Australia


Given the rapidly changing and increasingly complex nature of global security, we continue to witness a remarkable interest within the defense and security communities in novel, adaptive and resilient techniques that can cope with the challenging problems arising in this domain. These challenges are brought forth not only by the overwhelming amount of data reported by a plethora of sensing and tracking modalities, but also by the emergence of innovative classes of decentralized, mass-scale communication protocols and connectivity frameworks such as cloud computing, sensor networks, intelligent transportation systems and the Internet of Things. Realizing that traditional techniques have left many important problems unsolved, and in some cases, not addressed, further efforts have to be undertaken in the quest for algorithms and methodologies that can accurately detect and easily adapt to emerging threats.

We sense there is a need for gathering a representative set of the most recent undertakings having to do with novel applications of Computational Intelligence (CI) techniques to the defense and security sectors.

This volume aims at publishing high-quality research efforts rooted in Computational Intelligence as applied to defense and security problems. First-class contributions addressing research challenges in these areas and their CI-based solutions (i.e., neural networks, fuzzy systems, evolutionary computation, swarm intelligence, rough sets, granular computing, and other emerging learning or optimization techniques) are solicited.

Submission Topics

Papers should present original work validated via analysis, simulation or experimentation, including but not limited to the following topics:

Advanced Architectures for Defense Operations
-    Multi-Sensor Data Fusion
-    Hard-Soft Data Fusion
-    Context-Aware Data Fusion
-    Employment of Autonomous Vehicles
-    Intelligence Gathering and Exploitation
-    Mine Detection
-    Situation Assessment
-     Impact Assessment
-    Process and User Refinement
-    Automatic Target Recognition
-    Mission Weapon Pairing and Assignment
-    Sensor Cueing and Tasking
-    Self-Healing Systems

Modeling and Simulation of Defense Operations
-    Logistics Support
-    Mission Planning and Execution
-    Resource Management
-    Red Teaming
-    Computational Red Teaming
-    Course of Action Generation and Recommendation
-    Models for War Games
-    Risk-Aware Decision Support
-    Multi-Agent Based Simulation
-     Critical Infrastructure Protection
-    Strategic Planning
-     Counterterrorism and Counterinsurgency
-     Behavioral or Cognitive Learning
-     Human Modeling: Behavior, Emotion, Motion

Security Applications
-    Surveillance
-    Suspect Behavior Profiling
-     Anomaly Detection
-    Automated Handling of Dangerous Situations or People
-    Stationary or Mobile Object Detection, Recognition and Classification
-    Intrusion Detection Systems
-    Cyber-Security
-    Air, Maritime & Land Security
-    Network Security
-     Biometrics Security
-     Authentication Technologies

security and defense; surveillance; computational intelligence; target tracking; mission planning;
multi-sensor data fusion; intrusion detector; maritime domain awareness; multi-agent systems; unmanned aerial vehicles;

Technical Program Committee (preliminary)

Andrzej Najgebauer, Military University of Technology, Poland
David Van Veldhuizen, Air Force Research Laboratory, USA
Krzysztof Slot, Technical University of Lodz, Poland
Moufid Harb, Larus Technologies Corporation, Canada
Sansanee Auephanwiriyakul, Chiang Mai University, Thailand
Suresh Sundaram, Nanyang Technological University, Singapore
Timothy Havens, Michigan State University, USA
Branko Ristic, DSTO, Australia
Dmitry Gorodnichy, Canadian Border Services Agency, Canada
Fred Petty, US Naval Research Laboratory, USA
Vincenzo Piuri, University of Milan, Italy
Nathalie Japkowicz, University of Ottawa, Canada
James Dankert, BAE Systems, USA
Srinivas Mukkamala, ICASA, USA
Misty Blowers, Air Force Research Lab, USA
Alain Auger, DRDC Valcartier, Canada

Submission Guidelines

Authors should only submit original work that has neither appeared elsewhere for publication, nor is presently under review for another refereed publication. Extensions of previously published works are welcome as long as the contributions made in the extended version are significant to warrant publication.

Please follow the instructions posted on http://www.ieeeottawa.ca/ci/cids-book/author_guidelines.html

Important Dates:

   * Abstract submission deadline: October 30, 2014

   * Abstract notification deadline: November 30, 2014

   * Full chapter submission deadline: January 31, 2015

   * Full chapter notification deadline: March 31, 2015

   * Camera-ready submission deadline: May 31, 2015

   * Volume publication expected: Late August, 2015

More information about the Humanist mailing list