WISARD: Workshop on Information Systems for AlaRm Diffusion

Sept. 8th 2015, Futuroscope, Poitiers, France

Systems and alarm diffusion: confidentiality vs monitoring, (mis-)information vs. rumour, state of the affairs?


WISARD is an ADBIS 2015 Worshop

The aim of this workshop is to gather researchers and practitioners working in the area of Information Systems, DataBase, Document management, metadata, workflow management, conceptual modeling, design, software, etc., to exchange and to share information, to network, to give points of view and to collaborate in project proposals.

This workshop will discuss questions about liveness, dynamicity, reactivity of alarm systems: how to ensure the warning information reach the right destination at the right moment and in the right location, still being relevant for the recipient, in spite of the various and successive filters of confidentiality, privacy, firewall policies, etc. ? Also relevant in this context are to technical contingency issues: material failure, defect of connection, break of channels, independence of information routes and sources? Alarms with crowd media, (mis-)information vs. rumours: how to make the distinction?

Best papers of the Workshop will be invited for submission in special issues of Information Systems Frontiers, Springer


  • 12:30 Lunchtime
  • 1:50 PM Wokshop Opening - Florence Sedes
  • 2 PM ADMAN: an Alarm-based mobile Diabetes MANagement system for mobile geriatric team - Dana Al Kukhun, Florence Sedes and Bouchra Soukarieh
  • 2:25 PM Abduction for Analysing Data Exchange Policies - Laurence Cholv
  • 2:50 PM An Architectural Roadmap Towards Building an Alarm Diffusion System - Sumit Kalra, Saurabh Srivastava and Prabhakar T V
  • 3:15 PM A case study on the influence of the user profile enrichment on Buzz propagation in social media: Experiments on Delicious - Manel Mezghani, Sirinya On-At, André Peninou, Marie Françoise Canut, Corinne Zayani, Ikram Amous-Ben Amor and Florence Sedes
  • 3:35 PM coffee break
  • 3:50 PM Critical Information Diffusion Systems - Rémi Delmas and Thomas Polacsek
  • 4:15 PM Information exchange policies at an organisational level: formal expression and analysis - Claire Saurel
  • 4:40 PM Final discussion and perspectives

Call for Papers

Today, in a more global world, companies, organizations and national agencies are involved in observation systems designed to generate alarms. Considering for instance natural disaster prevention systems, we have a collection of agents, each capable of observing various events and acquiring information which must be aggregated and processed in order to generate alerts. Space Situation Awareness systems, designed to generate warnings to prevent collisions between orbiting objects, or Disease Surveillance systems, which monitor the spreading of diseases at a global scale, are built on similar principles.

Besides these national or international systems, social networks play a role in alerts diffusion. Recently, the micro-blogging platform Twitter announced a new alert diffusion service, purposely designed to help government organisation and non-profit organisations to diffuse alerts to the population. The question of how to specify/manage such mass-reaching system and protect them against misuse deserves some attention from the IS community.

So, one can say that such systems must trigger events as well as be triggered by external events, and must be robust w.r.t. technical contingency: material failure, defect of connection, break of channels,... or any unforeseen circumstances that they have to cope with, in a dynamic way and in an unknown context. Fundamental properties of alarm systems are linked to liveness, dynamicity, reactivity, etc.: They must ensure that warning information eventually reaches the right destination at the right moment and in the right location, while being still understandable and relevant for the recipient, in spite of the various confidentiality, anonymisation, firewall, privacy, etc. filtering operations information undergoes. In addition, questions surround the use of personal data in alarm systems: Should alarm systems be allowed access/collect personal user data (with or without the user's consent)? Must the personal data stores be fully controlled by the user?

Dates and Submission

Important Dates

  • Submission Deadline: April 17, 2015
  • Acceptance Notification: May 22, 2015
  • Camera-ready Submission: June 15, 2015
  • Workshop: September 8, 2015

Submission instructions

  • Research papers (up to 14 pages) including novel approaches to deal with these issues.
  • Application papers (up to 10 pages) describing applications.
  • Industrial papers (up to 4 pages) describing experiences in the industry sectors.
  • Demo proposals (up to 2 pages) describing the demo flow.

The workshop proceedings will be published by Springer in the Advances in Intelligent Systems and Computing series. Papers should be submitted in PDF format. Submissions must conform to Springer's format and should not exceed 14 pages, including all text, figures, references and appendices. The program committee may decide to accept a submission as a short paper if it reports interesting results but does not justify publication of a full paper. Information about the Springer LNCS format can be found at http://www.springer.com/series/11156.

Submission is done through CyberChair at the following page:


Workshop papers will be published by Springer-Verlag in the AISC series (Advances in Intelligent Systems and Computing). The authors of the best workshop papers will be invited to prepare extended versions of their papers after the workshop. Following an additional round of reviews, the extended papers will appear in a special issue of Information System Frontiers, Springer (Impact Factor = 0.761).

Program Committee

Session Co-chairs:

Rémi Delmas, Thomas Polacsek, Florence Sèdes

Contact information:

If you have any question or information request on WISARD 2015 workshop, please send an email to sedes AT irit.fr

Program Committee:

  • Fabien Autrel Telecom Bretagne, France
  • Rocio Abascal-Mena, UAM, Mexico
  • Ikram Amous-Ben Amor, MIRACL, Sfax, Tunisia
  • Sadok Ben Yahia, Université de Tunis, Tunisia
  • Raffaele Campagnuolo, ESA, Noordwijk, The Netherlands
  • Lilia Gzara, G-SCOP, Grenoble, France
  • Sergio Ilarri, Univ. Zaragoza, Spain
  • Asanobu Kitamoto, NII, Tokyo, Japan
  • Rose Lema, UAM, Mexico
  • Michael Mrissa, LIRIS, Lyon, France
  • TV Prabhakar, IIT Kanpur, India
  • Arnaud Quirin, Centro de Telecomunicacions de Galicia, Vigo, Spain