Workshops

Pre- and post-conference workshops will be held on Sunday March 22 and Friday March 27, 2009.

DataX'09: Fourth International Workshop on Database Technologies for Handling XML Information on the Web

Sunday, March 22, 2009

Workshop home page

Following the main themes of the EDBT conference, data management constitutes the essential enabling technology for scienti engineering, business, and social communities. Peer-to-peer architectures, the Grid, personal information systems, pervasive and ubiquitous computing, networked sensors, biomedical infor- matics, virtual digital libraries, semantic virtual communities, database services and trust management are examples of the great challenges that drive research and development of the next generation of database technology. Our belief is that XML is the main means towards this new generation of data management systems. Following the experience of previous editions of DataX in 2004, 2006 and 2008, in DataX 2009 we will discuss new and interesting applications, and the integration of XML and database technologies.

The goal of the workshop is to bring together academics, practitioners , users and vendors to discuss recent achievements, relevant problems and open issues on the boundary of database and XML technologies in all these environments. The workshop will provide the opportunity to debate new issues and outline directions for research and development.


DAMAP09 Second International Workshop on Data Management in Peer-to-peer systems

Sunday, March 22, 2009

Workshop home page

The aim of the workshop is to investigate the promise of peer-to-peer (P2P) systems for advanced data management applications. The benefits of a P2P architecture is scalability based on autonomic peers which may at any moment join/leave the network, publish resources (data and services) for sharing, use resources published by other peers and eventually take part in a collaborative work process. Furthermore, applications manipulate heterogeneous, semantically rich data, and thus require more advanced functionalities than the simple key-based file sharing and retrieval usually proposed by the first P2P systems. Enhanced services must be available, for resource access and sharing, managing logical clusters (communities of interest), handling replication, distributed query and transaction processing, information discovery and accessibility, semantic interoperation and composition of active information services. Also, market-based mechanisms are needed to allow negotiated resource allocation, as well as cooperative and non cooperative information exchanges. Finally, P2P environments need scalable data structures and infra structures, in order to adapt to a growing number of clients and continuously growing amounts of data, such as the case of data streams.


Privacy and Anonymity in the Information Society (PAIS)

Sunday, March 22, 2009

Workshop home page

While the ever increasing computational power together with the huge amount of individual data collected daily by various agencies is of great value for our society, they also pose a significant threat to individuals’ privacy. As a result legislators for many countries try to regulate the use and the disclosure of confidential information. Various privacy regulations (such as USA Health Insurance Portability and Accountability Act, Canadian Standard Association’s Model Code for the Protection of Personal Information, Australian Privacy Amendment Act 2000, etc.) have been enacted in many countries all over the world. Data privacy and protecting individuals’ anonymity have become a mainstream avenue for research. While privacy is a topic discussed everywhere, data anonymity recently established itself as an emerging area of computer science. Its goal is to produce useful computational solutions for releasing data, while providing scientific guarantees that the identities and other sensitive information of the individuals who are the subjects of the data are protected.

The proposed track aims to provide an open yet focused platform for researchers and practitioners from computer science and other fields that are interacting with computer science in the privacy area such as statistics, healthcare informatics, and law to discuss and present current research challenges and advances in data privacy and anonymity research. We welcome original research papers that present novel research ideas, position papers that discuss new technology trends and provide new insights into this area, integrative papers that present interdisciplinary research in the privacy area, as well as industry papers that share practical experiences.


Joint EDBT/ICDT Ph.D. Workshop 2009

Sunday, March 22, 2009

Workshop home page

The Ph.D. Workshop is intended to bring together Ph.D. students working on topics related to the EDBT and ICDT conference series. The workshop will offer Ph.D. students the opportunity to present, discuss, and receive feedback on their research in a constructive and international atmosphere.

The workshop will be accompanied by prominent professors and researchers in the field of database technology. These accompanying professors will participate actively and contribute to the discussions.


submis¬