Important Dates
1 August 2024
31 August 2024
6 October 2024
Conference Scope and Topics
ICCASA 2024 is a place for highly original ideas about how Context-Aware Systems (CAS) are going to shape networked computing systems of the future. Hence, it focuses on rigorous approaches and cutting-edge solutions that break new ground in dealing with the properties of context-awareness. Its purpose is to make a formal basis more accessible to researchers, scientists, professionals, and students as well as developers and practitioners in ICT by providing them with state-of-the-art research results, applications, opportunities, and future trends. We are happy to inform you about the collocated conference EAI ICCASA 2024!
CAS is primarily inspired by the human autonomic nervous system and it is characterized by itself – facets such as self-organization, self-configuration, self-healing, self-optimization, self-protection, and so on whose context awareness is used to dynamically control computing and networking functions. The overall goal of CAS is to realize nature-inspired autonomic systems that can manage themselves without direct human interventions. Meeting this grand challenge of CAS requires a rigorous interdisciplinary approach to context-aware systems. Context awareness originated as a term from ubiquitous computing or as so-called pervasive computing which sought to deal with linking changes in the environment with computer systems, which are otherwise static. The term has also been applied to business theory in relation to contextual application design and business process management issues.
Foundations of context-awareness:
– Context-aware models
– Context-aware control
– Context-aware algorithms
– Context-aware networks
– Context-aware computing
– Context-awareness calculi
– Context-awareness representation
– Context-awareness-based systems
– Logic in context-awareness
– Context-awareness reasoning
– Formal methods of context-awareness
– Context-awareness-based optimization and swarm Intelligence
– Theory, computational models and algorithms in context detection for computing
– Awareness of context in collaboration or crowdsourcing
– Context recognition and artificial intelligence (AI)
– Privacy issues
Context-aware Systems:
– Routing, transport, and reliability issues of context-aware systems
– Data dissemination and replication in context-aware systems
– Applications and middleware support, mobile social networking applications
– Mobility models and statistical analysis of mobility traces
– Context and social awareness mechanisms and algorithms
– Co-existence of opportunistic networks with infrastructure mobile wireless networks
– Service composition in autonomic and opportunistic networks
– Cognition-driven information processing and decision making
– Performance modeling, scaling laws, and fundamental limits for autonomic and opportunistic communications
– Game-theoretic insights to the operation of autonomic and opportunistic networks
– Participatory and urban sensing in autonomic and opportunistic networks
– Trust, security, and reputation in context-aware systems
– Autonomic and opportunistic communication testbeds and prototypes, measurement data from real experiments
– Socio-economic models for autonomic and opportunistic communications
– Mobile data measurement and collection platforms for context detection
– Automated systems to model and detect context
Context-aware Technologies:
– Context-aware information retrieval
– Context-aware profiling, clustering and collaborative filtering
– Machine learning for context-aware information retrieval and ontology learning
– Context-aware e-learning/tutoring
– Ubiquitous and context-aware computing
– Use of context-aware technologies in UI/HCI
– Context-aware advertising
– Recommendations for mobile users
– Context-awareness in portable devices
– Context-aware services
– Social Agents and Avatars
– Emotion and Personality
– Virtual Humans
– Autonomous Actors
– Awareness-based Animation
– Social and Conversational Agents
– Inter-Agent Communication
– Social Behavior
– Crowd Simulation
– Understanding Human Activity
– Memory and Long-term Interaction
– Context representations and signal characteristics that describe and identify context
– Context detection algorithms/approaches using data collected with mobile devices, wearable devices and
pervasive sensors (e.g. RF sensors)
– User studies and evaluation techniques for context detection
– The novel use of context information in computing applications
– Integration of context into lifelogging applications.
– Applications of context information for the work-life balance, for a healthier life and behavior
– Applications of context information in situational or social awareness
– Application of context information in health care
– Applications of context information in industrial production
– Applications of context information in pervasive games
– Applications of context information in mobile multimedia devices
Conference Publication
All registered papers will be submitted for publishing in the Springer LNICST series and made available through the SpringerLink Digital Library.
Proceedings will be submitted for inclusion in leading indexing services, such as Web of Science, Compendex, Scopus, DBLP, EU Digital Library, Google Scholar, IO-Port, MathSciNet, Inspec, and Zentralblatt MATH.
Authors of selected papers will be invited to submit an extended version to:
- Mobile Networks and Applications (MONET) Journal (IF: 3.8)
All accepted authors are eligible to submit an extended version in a fast track of:
EAI Endorsed Transactions on Context-aware Systems and Applications
Additional publication opportunities:
- EAI Transactions series (Open Access)
- EAI/Springer Innovations in Communications and Computing Book Series
(titles in this series are indexed in Ei Compendex, Web of Science & Scopus)
Paper Submission
Papers should be submitted through EAI ‘Confy+‘ system, and have to comply with the Springer format (see Author’s kit section).
- Regular papers should be up to 12-16 pages in length.
- Short papers should be 6-8 pages in length.
All conference papers undergo a thorough peer review process prior to the final decision and publication. This process is facilitated by experts in the Technical Program Committee during a dedicated conference period. Standard peer review is enhanced by EAI Community Review which allows EAI members to bid to review specific papers. All review assignments are ultimately decided by the responsible Technical Program Committee Members while the Technical Program Committee Chair is responsible for the final acceptance selection. You can learn more about Community Review here.
- Go to Confy+ website
- Login or sign up as new user
- Select your desired Track
- Click the ‘Submit Paper’ link within the track and follow the instructions
Alternatively, go to home page of Confy+ and click on “Open conferences”.
- All papers must be submitted in English.
- Previously published work may not be submitted, nor may the work be concurrently submitted to any other conference or journal. Such papers will be rejected without review.
- The paper submissions must follow the Springer formatting guidelines (see Author’s kit section below).
- Read the Publication Ethics and Malpractice Statement.
Author’s kit – Instructions and Templates (SPRINGER)
Papers must be formatted using the Springer LNICST/ EASICC Authors’ Kit.
Instructions and templates are available from Springer’s LNICST homepage:
Please make sure that your paper adheres to the format as specified in the instructions and templates.
When uploading the camera-ready copy of your paper, please be sure to upload both:
- a PDF copy of your paper formatted according to the above templates, and
- an archive file (e.g. zip, tar.gz) containing the both a PDF copy of your paper and LaTeX or Word source material prepared according to the above guidelines.