BenchCouncil Transactions on Benchmarks, Standards and Evaluations (TBench) is an open-access, multi-disciplinary journal dedicated to advancing the science and engineering of evaluation. We extend a warm invitation to researchers from diverse disciplines to submit their work, with a particular emphasis on interdisciplinary research. Whether the research pertains to computers, artificial intelligence (AI), medicine, education, finance, business, psychology, or other social disciplines, all relevant contributions are highly valued and welcomed.At TBench, we place great importance on the reproducibility of research. We strongly encourage authors to ensure that their articles are appropriately prepared for open-source or artifact evaluation prior to submission. Areas of interest include, but are not limited to:1. Evaluation theory and methodologyFormal specification of evaluation requirementsDevelopment of evaluation modelsDesign and implementation of evaluation systemsAnalysis of evaluation riskCost modeling for evaluationsAccuracy modeling for evaluationsEvaluation traceabilityIdentification and establishment of evaluation conditionsEquivalent evaluation conditionsDesign of experimentsStatistical analysis techniques for evaluationsMethodologies and techniques for eliminating confounding factors in evaluationsAnalytical modeling techniques and validation of modelsSimulation and emulation-based modeling techniques and validation of modelsDevelopment of methodologies, metrics, abstractions, and algorithms specifically tailored for evaluations2. The engineering of evaluation Benchmark design and implementationBenchmark traceability Establishing least equivalent evaluation conditionsIndex design, implementationScale design, implementationEvaluation standard design and implementationsEvaluation and benchmark practice Tools for evaluationsReal-world evaluation systemsTestbed3. Data setExplicit or implicit problem definition deduced from the data setDetailed descriptions of research or industry datasets, including the methods used to collect the data and technical analyses supporting the quality of the measurementsAnalyses or meta-analyses of existing dataSystems, technologies, and techniques that advance data sharing and reuse to support reproducible researchTools that generate large-scale data while preserving their original characteristicsEvaluating the rigor and quality of the experiments used to generate the data and the completeness of the data description4. BenchmarkingSummary and review of state-of-the-art and state-of-the-practiceSearching and summarizing industry best practiceEvaluation and optimization of industry practiceRetrospective of industry practiceCharacterizing and optimizing real-world applications and systemsEvaluations of state-of-the-art solutions in the real-world setting5. Measurement and testingWorkload characterizationInstrumentation, sampling, tracing, and profiling of large-scale, real-world applications and systemsCollection and analysis of measurement and testing data that yield new insightsMeasurement and testing-based modeling (e.g., workloads, scaling behavior, and assessment of performance bottlenecks)Methods and tools to monitor and visualize measurement and testing dataSystems and algorithms that build on measurement and testing-based findingsReappraisal of previous empirical measurements and measurement-based conclusionsReappraisal of previous empirical testing and testing-based conclusionsEditorial Board
The journal aims to promote and communicate advances in big data research by providing a fast and high quality forum for researchers, practitioners and policy makers from the very many different communities working on, and with, this topic.The journal will accept papers on foundational aspects in dealing with big data, as well as papers on specific Platforms and Technologies used to deal with big data. To promote Data Science and interdisciplinary collaboration between fields, and to showcase the benefits of data driven research, papers demonstrating applications of big data in domains as diverse as Geoscience, Social Web, Finance, e-Commerce, Health Care, Environment and Climate, Physics and Astronomy, Chemistry, life sciences and drug discovery, digital libraries and scientific publications, security and government will also be considered. Occasionally the journal may publish whitepapers on policies, standards and best practices.Benefits to authorsWe also provide many author benefits, such as free PDFs, a liberal copyright policy, special discounts on Elsevier publications and much more. Please click here for more information on our author services .Please see our Guide for Authors for information on article submission. If you require any further information or help, please visit our Support Center.
An official Journal of the Zhejiang University PressBlockchain: Research and Applications is an international, peer reviewed journal for researchers, engineers, and practitioners to present the latest advances and innovations in blockchain research. The journal publishes theoretical and applied papers in established and emerging areas of blockchain research to shape the future of blockchain technology.The emergence and popularity of blockchain techniques have significantly changed the operation and management of digital systems globally. As a result, new applications of blockchain technology exhibit a variety of complex problems which generate new demands and challenges on the research community. Blockchain: Research and Applications seeks to promote community-wide discussion to identify advanced applications, technologies and theories in blockchain research.We seek submissions of papers that detail novel techniques, investigate new applications, introduce advanced methodologies, propose promising research directions and discuss approaches for unsolved issues.Topics of interest include, but are not limited to:Blockchain theories and their evolution,Smart contracts and distributed ledgers,Distributed consensus and fault tolerance mechanisms,Blockchain schemes for decentralization,Issues of security and privacy surrounding blockchain technology,Performance optimization of blockchain and decentralized schemes,Blockchain based protocols and algorithms,Integration of blockchain with other emerging technologies,Permissioned and permissionless blockchainsCryptocurrency adoption and transition dynamics,Transaction graph analysis,Fraud detection and financial crime prevention,Economics and game theoretic analysis of cryptocurrency protocols,Regulation and law enforcement of blockchain technology,Usability and user studies,Legal, ethical and societal aspects of blockchain and related applicationsCase studies (e.g., of adoption, attacks, forks, scams, ...)
The International Journal for the Computer and Telecommunications IndustryComputer and Communications networks are key infrastructures of the information society with high socio-economic value as they contribute to the correct operations of many critical services (from healthcare to finance and transportation). Internet is the core of today's computer-communication infrastructures. This has transformed the Internet, from a robust network for data transfer between computers, to a global, content-rich, communication and information system where contents are increasingly generated by the users, and distributed according to human social relations. Next-generation network technologies, architectures and protocols are therefore required to overcome the limitations of the legacy Internet and add new capabilities and services. The future Internet should be ubiquitous, secure, resilient, and closer to human communication paradigms.Computer Communications is a peer-reviewed international journal that publishes high-quality scientific articles (both theory and practice) and survey papers covering all aspects of future computer communication networks (on all layers, except the physical layer), with a special attention to the evolution of the Internet architecture, protocols, services, and applications. Topics include, but are not limited to:Internet of ThingsEdge/cloud computingGreen networkingMobile and ubiquitous networksTerrestrial and Non-terrestrial networksMobile network services and applicationsExperimental test-beds and research platformsAlgorithmic aspects of communication networksEmerging technologies for next generation networkFuture Internet architecture, protocols and servicesModeling, measurement, and simulation of computer communication networks
To defend against various cyber-attacks, the companies and organizations should have right policies and procedures in place. Moreover, it is essential to develop new quantum-safe encryption algorithms and modern tools which can withstand from quantum computer-based attacks. This Cyber Security and Applications (CSA) journal focuses on cyber breaches, cyber-attacks, quantum computing based encryption and decryption techniques and cyber defense tools for improving level of cyber security.In addition to this, CSA also welcomes the researchers to submit the papers related to advance methods and tools for improving the cyber security in the field of Information and Communication Technology (ICT). Therefore, the CSA journal seeks innovative papers in the field of cyber security. CSA also accepts the substantially extended version of the conference papers in the field of cyber security.Topics of interest include, but are not limited to the following:Cyber attacksSoftware and Hardware SecuritySecurity issues in Intelligent Transportation Systems (ITS)Machine learning mechanisms for cyber securityKey generation and key distribution schemesModern tools for improving cyber securityEmerging trends in cyber securityAuthenticated Key Agreement ProtocolsCyber security in Internet of Things (IoT)Cyber security in CloudQuantum-safe encryption algorithmsQuantum-safe digital signature schemesQuantum-safe key management mechanismsEditorial Board
Database Systems and Knowledgebase Systems share many common principles. Data & Knowledge Engineering (DKE) stimulates the exchange of ideas and interaction between these two related fields of interest. DKE reaches a world-wide audience of researchers, designers, managers and users. The major aim of the journal is to identify, investigate and analyze the underlying principles in the design and effective use of these systems. DKE achieves this aim by publishing original research results, technical advances and news items concerning data engineering, knowledge engineering, and the interface of these two fields.DKE covers the following topics:1. Representation and Manipulation of Data & Knowledge: Conceptual data models. Knowledge representation techniques. Data/knowledge manipulation languages and techniques.2. Architectures of database, expert, or knowledge-based systems: New architectures for database / knowledge base / expert systems, design and implementation techniques, languages and user interfaces, distributed architectures.3. Construction of data/knowledge bases: Data / knowledge base design methodologies and tools, data/knowledge acquisition methods, integrity/security/maintenance issues.4. Applications, case studies, and management issues: Data administration issues, knowledge engineering practice, office and engineering applications.5. Tools for specifying and developing Data and Knowledge Bases using tools based on Linguistics or Human Machine Interface principles.6. Communication aspects involved in implementing, designing and using KBSs in Cyberspace.Plus... conference reports, calendar of events, book reviews etc.Benefits to authors We also provide many author benefits, such as free PDFs, a liberal copyright policy, special discounts on Elsevier publications and much more. Please click here for more information on our author services.Please see our Guide for Authors for information on article submission. If you require any further information or help, please visit our Support Center
Heliyon considers research from all areas of the physical, applied, life, social and medical sciences. We publish manuscripts reporting scientifically accurate and valuable research, which adheres to accepted ethical and scientific publishing standards. As such Heliyon publishes new insights as well as extensions on existing theories, negative/null results and replication studies.Submissions covering arts, humanities and law are not considered in Heliyon. Authors of these submissions are encouraged to submit directly to our partner journal Social Sciences & Humanities Open.Heliyon classifies manuscripts/articles into different sections based on the research topic discussed. Some sections exclude certain types of studies from their scope. To know more and to see the kind of manuscripts the various sections publish, please visit: https://www.cell.com/heliyon/sectionsA dedicated in-house editorial office team, internal editors as well as external academic section and associate editors handle your manuscript and manage the publication process, giving your research the editorial support and quality control it deserves.If it's important to you, it's important to us. Submit your paper today.
Informatics in Medicine Unlocked (IMU) is an international gold open access journal covering a broad spectrum of topics within medical informatics, including (but not limited to) papers focusing on imaging, pathology, teledermatology, public health, ophthalmological, nursing and translational medicine informatics. The full papers that are published in the journal are accessible to all who visit the website.Manuscripts exploring the revolutionary advances being made in the application of the computer to the fields of bioscience and medicine can be submitted to the journal?s companion title, Computers in Biology and Medicine .Only manuscripts of sufficient quality with scientific relevance will be considered for publication in IMU; the types of articles accepted include original research papers, reviews, perspectives, letters to the editor and editorials, tutorials, and papers on innovative and topical new technology. Proposals for special focus issues from leading research groups will also be considered.Manuscript referees will be experts in the subject matter, working in academia, industry, and at government institutions. Usually, comments from 2-5 referees will be returned to the authors after first submission of the manuscript. Average turnaround time for manuscript evaluation is expected to be less than 4 weeks. Average time from first submission to publication of accepted papers, including revision, will typically be 2-4 months.
Databases: Their Creation, Management and UtilizationInformation systems are the software and hardware systems that support data-intensive applications. The journal Information Systems publishes articles concerning the design and implementation of languages, data models, process models, algorithms, software and hardware for information systems.Subject areas include data management issues as presented in the principal international database conferences (e.g., ACM SIGMOD/PODS, VLDB, ICDE and ICDT/EDBT) as well as data-related issues from the fields of data mining/machine learning, information retrieval coordinated with structured data, internet and cloud data management, business process management, web semantics, visual and audio information systems, scientific computing, and data science. We welcome systems papers that focus on implementation considerations in massively parallel data management, fault tolerance, and special purpose hardware for data-intensive systems; theoretical papers that either break significant new ground or unify and extend existing algorithms for data-intensive applications; and manuscripts from application domains, such as urban informatics, social and natural science, and Internet of Things, which present innovative, high-performance, and scalable solutions to data management problems for those domains.All papers should motivate the problems they address with compelling examples from real or potential applications. Systems papers must be serious about experimentation either on real systems or simulations based on traces from real systems. Papers from industrial organizations are welcome. Theoretical papers should have a clear motivation from applications and clearly state which ideas have potentially wide applicability.Authors of selected articles that have been accepted for publication in Information Systems are invited by the EiCs to submit the experiment described in their papers for reproducibility validation. The resulting additional reproducibility paper is co-authored by the reproducibility reviewers and the authors of the original publication.As part of its commitment to reproducible science, Information Systems also welcomes experimental reproducible survey papers. Such submissions must: (i) apply a substantial portion of the different surveyed techniques to at least one existing benchmark and perhaps one or more new benchmarks, and (ii) be reproducible (the validation of reproducibility will result in a separate paper following the guidelines of our Reproducibility Editor).In addition to publishing submitted articles, the Editors-in-Chief will invite retrospective articles that describe significant projects by the principal architects of those projects. Authors of such articles should write in the first person, tracing the social as well as technical history of their projects, describing the evolution of ideas, mistakes made, and reality tests. We will make every effort to allow authors the right to republish papers appearing in Information Systems in their own books and monographs.
Now published by Elsevier, Infosecurity has been extensively redesigned and re-positioned to focus on user-based articles, providing factual, evidence-based information and experiences.Every issue of Infosecurity provides includes:• In-depth analysis of specific business and management issues relating to information security • Focus on evidence-based experiences and applications from within all industry sectors - learn from the experiences of others, good and bad? • Unbiased coverage of the latest developments and products • Representative views and opinions from industry experts • Detailed information on the applications used by, and challenges facing specific industries in keeping their systems secure