From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) by sympa.inria.fr (Postfix) with ESMTPS id DEF627EE99 for ; Tue, 7 Jan 2014 17:41:35 +0100 (CET) Received-SPF: None (mail2-smtp-roc.national.inria.fr: no sender authenticity information available from domain of kutsia@risc.jku.at) identity=pra; client-ip=140.78.116.39; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="kutsia@risc.jku.at"; x-sender="kutsia@risc.jku.at"; x-conformance=sidf_compatible Received-SPF: None (mail2-smtp-roc.national.inria.fr: no sender authenticity information available from domain of kutsia@risc.jku.at) identity=mailfrom; client-ip=140.78.116.39; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="kutsia@risc.jku.at"; x-sender="kutsia@risc.jku.at"; x-conformance=sidf_compatible Received-SPF: None (mail2-smtp-roc.national.inria.fr: no sender authenticity information available from domain of postmaster@smtpauthhost.risc.uni-linz.ac.at) identity=helo; client-ip=140.78.116.39; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="kutsia@risc.jku.at"; x-sender="postmaster@smtpauthhost.risc.uni-linz.ac.at"; x-conformance=sidf_compatible X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AogBAMIszFKMTnQnnGdsb2JhbABZFoMtu0wWDgEBAQEBCBQJPIJkMAoGPRYYAwIBAgFYBgIBAYgADZprqTYXjQqBDRWFFgSYF4EwhRWGDYhxgWc X-IPAS-Result: AogBAMIszFKMTnQnnGdsb2JhbABZFoMtu0wWDgEBAQEBCBQJPIJkMAoGPRYYAwIBAgFYBgIBAYgADZprqTYXjQqBDRWFFgSYF4EwhRWGDYhxgWc X-IronPort-AV: E=Sophos;i="4.95,619,1384297200"; d="scan'208";a="52129025" Received: from smtpauthhost.risc.uni-linz.ac.at ([140.78.116.39]) by mail2-smtp-roc.national.inria.fr with ESMTP/TLS/DHE-RSA-AES256-SHA; 07 Jan 2014 17:41:35 +0100 Received: from [140.78.164.192] (ap164192.wlan.jku.at [140.78.164.192] (may be forged)) (authenticated bits=0) by smtpauthhost.risc.uni-linz.ac.at (8.14.3/8.14.3/Debian-9.4) with ESMTP id s07GfYY8017464 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT) for ; Tue, 7 Jan 2014 17:41:34 +0100 Message-ID: <52CC2E38.2020501@risc.jku.at> Date: Tue, 07 Jan 2014 17:41:28 +0100 From: Temur Kutsia User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.2.0 MIME-Version: 1.0 To: caml-list@inria.fr Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Validation-by: kutsia@risc.jku.at Subject: [Caml-list] Deadline extension: JSC - SCSS special issue [Please post - apologies for multiple copies.] Deadline extension ---------------------------------------- Special issue of the JOURNAL OF SYMBOLIC COMPUTATION on SYMBOLIC COMPUTATION IN SOFTWARE SCIENCE ---------------------------------------- http://www.risc.jku.at/people/tkutsia/jsc-scss-2013.html IMPORTANT DATES --------- Paper submission: January 31, 2014 (extended) Notification of acceptance: April 25, 2014 (extended) Publication: Second half of 2014 SCOPE -------- Symbolic Computation is the science of computing with symbolic objects (terms, formulae, programs, representations of algebraic objects etc..). Powerful symbolic algorithms and methods have been developed during the past decades like computer algebra, theorem proving, automated reasoning, software verification, model checking, rewriting, formalization of mathematics, Groebner bases, characteristic sets, telescoping for recurrence relations, cylindric algebraic decomposition and other quantifier elimination techniques, etc. The purpose of this special issue is to promote research on theoretical and practical aspects of symbolic computation in software science. The special issue is related to the topics of the International Symposiums on Symbolic Computation in Software Science - SCSS 2013 and SCSS 2012. It will be published by Elsevier within the Journal of Symbolic Computation. Participants of the SCSS 2013 and SCSS 2012 symposiums, as well as other authors are invited to submit contributions. EXAMPLES of TOPICS ------------------- This special issue focuses on advanced symbolic computation techniques for algorithm and software testing, property analysis, termination, verification, induction assertion generation, synthesis, systematic generation from components, equivalent transformation, library build-up. Relevant topics include (but are not limited to) the following: - automated synthesis of algorithms by symbolic computation - automated generation of verification conditions of programs by algebraic methods - automated generation of inductive program properties - analysis of algorithm complexity and program termination by algebraic methods - algebraic reasoning for computational origami - efficient decision procedures for hybrid systems - synthesis of numerical algorithms by algebraic methods - symbolic model checking - business process representations and analysis by symbolic methods - symbolic preprocessing of numerical algorithms - symbolic techniques for debugging and testing - formalization and computerization of knowledge (maths, medicine, economy, etc.) - rewriting algorithms - component-based programming by algebraic methods - query languages (in particular for XML documents) - symbolic methods for the semantic web, cloud computing and big data SUBMISSION GUIDELINES ------------------- This special issue welcomes original high-quality contributions that have been neither published in nor simultaneously submitted to any journals or refereed conferences. Submissions will be peer-reviewed using the standard refereeing procedure of the Journal of Symbolic Computation. Authors of papers presented at the SCSS 2013 and SCSS 2012 symposiums are welcome and encouraged to submit extended and revised versions of their papers. Furthermore, submissions of papers that are in the scope of SCSS, but did not appear in SCSS 2013 and SCSS 2012 are welcome as well. Submitted papers must be in English and include a well written introduction addressing the following questions in succinct and informal manner: - What is the problem? - Why is the problem important? - What has been done so far on the problem? - What is the main contribution of the paper on the problem? - What aspect of symbolic computation helps solving the problem? - Is the contribution original? Explain why. - Is the contribution non-trivial? Explain why. All the main definitions, theorems and algorithms should be illustrated by simple but meaningful examples. SUBMISSION -------------------- Please prepare your submission in LaTeX using the JSC document format from: http://www4.ncsu.edu/~hong/jsc.htm (link to the submission template: http://www4.ncsu.edu/~hong/jsc/JSC_LaTex_2007_Mar_12.zip) Submission is via the EasyChair submission site at: https://www.easychair.org/conferences/?conf=jscscss13 GUEST EDITORS -------------------- Adel Bouhoula (Higher School of Communications of Tunis, Tunisia) Bruno Buchberger (RISC, Johannes Kepler University Linz, Austria) Laura Kovacs (Chalmers University of Technology, Sweden) Temur Kutsia (RISC, Johannes Kepler University Linz, Austria) FURTHER INFORMATION ------------------------------- Laura Kovacs Temur Kutsia