CFP: JDM Special Issue

zhoul zhoul at
Tue Mar 18 04:09:19 EST 2003



The US focus on homeland security since the 9-11 terrorist attacks has 
increased the public’s awareness of national security. National security has 
not only become a top priority in law-enforcement and homeland defense 
agencies, but also attracted a lot of interest from researchers and 
practitioners in various information technology disciplines. Database 
technology is one of the key information technologies that ha direct bearing 
on national security endeavors.

Database technology consists of software and methodologies for modeling and 
storing large volumes of data of arbitrary types and structures and responding 
to search and update queries against the data. In order to help detect 
potential threats to national security and enable prompt action, many crucial 
database technology components are required. These need to address issues such 
as: 1) how to identify the right data sources, extract key information, and 
integrate heterogonous data? 2) how to associate and aggregate bits of 
information from multiple data sources to construct potential terrorist 
operation daisy-chains? 3) how to discover patterns indicative of terrorist 
activities, and track the emerging development of terrorist events? 4) how to 
make available the right information to the right analysts at the right time 
to support time-critical and informed decision-making? 5) how to automatically 
assure information quality, especially in the presence of incomplete or dirty 
data? and 6) how to manage data security to prevent potential unauthorized 
disclosure of information?

The objective of the special issue is to bring together 6-7 high-quality 
research and visionary papers on a broad spectrum of key subjects related to 
database technology for national security applications into a single 
compendium. Submissions describing research breakthroughs, definitive results 
of empirical studies, promising commercial products, and visions for near-term 
research and development are strongly encouraged. Topics of interest to this 
special issue include, but are not limited to, the following:

* Data mining in discovering patterns indicative of terrorists’ activities
* Text mining in detecting and tracking terrorists’ events
* Information chaining in correlating and aggregating information from 
multiple sources
* Federated database
* Fuzzy query
* Imprecise database
* Data quality and data cleansing
* Heterogeneous database integration
* Multimedia data storage, indexing and retrieval
* QoS delivery
* Intrusion detection 
* Biometric security
* Deception detection 
* Terrorist network analysis
* Semantic content management
* Visualization in revealing patterns of terrorist activities
* Collaborative intelligence
* Agent-based intelligent monitoring
* Ontology in information sharing
* Workflow in supporting the detection and investigation of terrorist 
* Security management

Important Dates:

Deadline for manuscripts: August 1, 2003
Preliminary notice to authors: November 1, 2003
Revision Due: January 10, 2004
Final Manuscript Due: March 10, 2004

Submission Instructions
Only electronic submissions will be accepted. Please submit the final 
manuscript as an e-mail attachment to the Dr. Lina Zhou. Clearly specify on 
the subject of the email that the submission is meant for the special issue. 
The submission must be in Word or PDF format. Final manuscripts have to be 
submitted in MS Word format for typesetting by the publisher. Manuscript must 
be typewritten in English and double-spaced throughout. Research papers should 
not exceed 6,000 words.
The cover page should contain the paper title, and the name, affiliation, 
address, phone number, fax number, and email address of each author, and 
indicate the contacting author. 
All submissions will be peer reviewed. For more information about the journal 
and formatting instructions, please see the following website: Please contact the Dr. Lina Zhou if you 
have any questions.

Guest Editor:
Dr. Lina Zhou
University of Maryland, Baltimore County
1000 Hilltop Circle
Baltimore, MD 21250
zhoul at

Dr. Won Kim
Cyber Database Solutions at
Dr. Kim will serve as an Advisor for this special issue.


More information about the Biomatrx mailing list