AISB convention 2017

  In the run up to AISB2017 convention, I've asked Joanna Bryson, from the organising team, to answer few questions about the convention and what comes with it. Mohammad Majid al-Rifaie ( Tu...


Harold Cohen

Harold Cohen, tireless computer art pioneer dies at 87   Harold Cohen at the Tate (1983) Aaron image in background   Harold Cohen died at 87 in his studio on 27th April 2016 in Encintias California, USA.The first time I hear...


Dancing with Pixies?...

At TEDx Tottenham, London Mark Bishop (the former chair of the Society) demonstrates that if the ongoing EU flagship science project - the 1.6 billion dollar "Human Brain Project” - ultimately succeeds in understanding all as...


Computerised Minds. ...

A video sponsored by the society discusses Searle's Chinese Room Argument (CRA) and the heated debates surrounding it. In this video, which is accessible to the general public and those with interest in AI, Olly's Philosophy Tube ...


Connection Science

All individual members of The Society for the Study of Artificial Intelligence and Simulation of Behaviour have a personal subscription to the Taylor Francis journal Connection Science as part of their membership. How to Acce...



AISB event Bulletin Item

CFP: Programming Languages and Analysis for Security (PLAS 2008)

 ACM SIGPLAN Third Workshop on
     Programming Languages and Analysis for Security (PLAS 2008)

                    Tucson, Arizona, June 8, 2008

         Sponsored by ACM SIGPLAN and co-located with PLDI'08


                 Submission Deadline: March 24, 2008

Call for Papers

PLAS aims to provide a forum for exploring and evaluating ideas on the
use of programming language and program analysis techniques to improve
the security of software systems. Strongly encouraged are proposals of
new, speculative ideas; evaluations of new or known techniques in
practical settings; and discussions of emerging threats and important

The scope of PLAS includes, but is not limited to:

  * Language-based techniques for security
  * Verification of security properties in software
  * Automated introduction and/or verification of security enforcement
  * Program analysis techniques for discovering security vulnerabilities
  * Compiler-based security mechanisms, such as host-based intrusion
    detection and in-line reference monitors
  * Specifying and enforcing security policies for information flow
    and access control
  * Model-driven approaches to security
  * Applications, examples, and implementations of these techniques

Important Dates and Submission Guidelines

  * March 24, 2008: Submission due date
  * April 21, 2008: Author notification
  * May 12, 2008: Revised papers due
  * June 8, 2008: PLAS 2008 workshop

We invite papers of two kinds: (1) Technical papers about relatively
mature work, for "long" presentations during the workshop, and (2)
papers for "short" presentations about more preliminary work, position
statements, or work that is more exploratory in nature.  Submitted
papers should describe work unpublished in refereed venues, not be
submitted for publication elsewhere, and have a page limit of 12 pages
for long papers and 6 pages for short papers.

Program Organization
  * lfar Erlingsson, Reykjavk University, Iceland, Program Co-Chair
  * Marco Pistoia, IBM T. J. Watson Research Center, Program Co-Chair

Program Committee
  * Gilles Barthe, INRIA Sophia-Antipolis, France
  * Bruno Blanchet, cole Normale Suprieure, France
  * Andy Chou, Coverity, USA
  * Mads Dam, Royal Institute of Technology, Sweden
  * lfar Erlingsson, Reykjavk University, Iceland
  * Heiko Mantel, Technische Universitt Darmstadt, Germany
  * Isabella Mastroeni, Universit di Verona, Italy
  * Greg Morrisett, Harvard University, USA
  * Andrew Myers, Cornell University, USA
  * David Naumann, Stevens Institute of Technology, USA
  * Marco Pistoia, IBM T. J. Watson Research Center, USA
  * Eijiro Sumii, Tohoku University, Japan
  * Dan Wallach, Rice University, USA