Youry's Blog

Youry's Blog

Archive for the ‘Conferences’ Category

Potential, possible, or probable predatory scholarly open-access publishers and journals

leave a comment »

My updates:

AIRCC’s International Journal of Computer Science and Information Technology (IJCSIT) (see below about AIRCC)

International Journal of Computer Science and Information Technologies  http://www.ijcsit.com see more about this journal here: http://scholarlykitchen.sspnet.org/2009/06/10/nonsense-for-dollars/

LIST OF STANDALONE JOURNALS (just for myself only). Copy from http://scholarlyoa.com/individual-journals/

Potential, possible, or probable predatory scholarly open-accesfs journals

This is a list of questionable, scholarly open-access journals. We recommend that scholars read the available reviews, assessments and descriptions provided here, and then decide for themselves whether they want to submit articles, serve as editors or on editorial boards.  The criteria for determining predatory journals are here.

We hope that tenure and promotion committees can also decide for themselves how importantly or not to rate articles published in these journals in the context of their own institutional standards and/or geo-cultural locus.  We emphasize that journals change in their business and editorial practices over time. This list is kept up-to-date to the best extent possible but may not reflect sudden, unreported, or unknown enhancements

Last updated October 5, 2014

Appeals: If you are a publisher and would like to appeal your firm’s inclusion on this list, please go here.

LIST OF PUBLISHERS Beall’s List: copy from http://scholarlyoa.com/publishers/

Potential, possible, or probable predatory scholarly open-access publishers

This is a list of questionable, scholarly open-access publishers. We recommend that scholars read the available reviews, assessments and descriptions provided here, and then decide for themselves whether they want to submit articles, serve as editors or on editorial boards.  The criteria for determining predatory publishers are here.

We hope that tenure and promotion committees can also decide for themselves how importantly or not to rate articles published in these journals in the context of their own institutional standards and/or geocultural locus.  We emphasize that journal publishers and journals change in their business and editorial practices over time. This list is kept up-to-date to the best extent possible but may not reflect sudden, unreported, or unknown enhancements.

Last updated October 4, 2014

Appeals: If you are a publisher and would like to appeal your firm’s inclusion on this list, please go here.

Advertisements

Written by youryblog

October 5, 2014 at 5:05 PM

Posted in Conferences, Research

Conferences and workshops, CS Journals

leave a comment »

Written by youryblog

August 25, 2012 at 3:02 PM

Posted in Conferences

International Workshop on Security and Performance in Cloud Computing

leave a comment »

International Workshop on Security and Performance in Cloud Computing
http://hpcs11.cisedu.info/conference/workshops/workshop-15—spcloud

(SPCLOUD 2011)
As part of (workshop no. 15)
The 2011 International Conference on High Performance Computing & Simulation
(HPCS 2011)

SCOPE AND OBJECTIVES
Cloud computing systems open a new perspective on almost every aspect of computing. Some security issues raised by cloud computing are alleviated by virtualization but the performance overheads should be balanced against this advantage. Dynamic scalability or “elasticity” will help generalize high-performance computing and very large data sets in applications. But the actual gains in performance depend heavily on the predictability of physical and virtualized resources. Consequently, the balancing of performance against security and the adaptation of HPC or VLDB techniques to cloud computing are of strategic importance and will have long-lasting scientific content.

The SPCLOUD workshop will bring together researchers and IT practitioners to present new results and ongoing work on the themes of security and performance in the cloud.

The Workshop topics include (but are not limited to) the following:

* Reliability and Security of Cloud Environments
* Monitoring for Cloud-Based Applications
* Cryptography and Crypto-Protocols for Cloud Computing Systems
* Parallel Computing With Cloud-Based Systems
* Very Large Databases In The Cloud: Transactions, Backup, Security, Scalability
* Security and Virtualization. Insiders Threats
* Risk Management in Cloud Computing Environments
* Usability and Human Centered Security for Clouds
* Trusted Data Sharing and Shared Technology Issues
* Untrusted Cloud Servers and Networks
* Privacy Protection in Cloud Platforms and Operations
* Autonomic Security in Cloud Computing
* Intercloud Security Issues and Considerations
* Insecure Interfaces and APIs
* Security Models for New Services
* Services Hijacking
* Interoperable Identity Management
* Information Hiding in Cloud Computing
* Forensics in the Clouds
* Cloud Infrastructure Security

Written by youryblog

December 4, 2010 at 5:08 PM

Posted in Conferences, News