Find reviewers for invited papers<\/h3>Think about the reviewers’ expertise. An option is to add a reviewer who already reviewed the paper before.<\/li><\/ol>\n\n\n\n
Obviously, a few extra tasks are missing. Reminder emails, 1-1 conversations with PC, authors, steering committee, web or publicity chairs which you will have to handle on demand.<\/p>\n\n\n\n
Something general missing? Leave a comment. Also, leave a comment if you have some good strategies or tips for some of the tasks. I’ll update the list accordingly.<\/p>\n\n\n\n
Happy reusing!<\/p>\n
Updated on February 17th, 2019 <\/p>","protected":false},"excerpt":{"rendered":"
If you have been asked to be a program chair for the first time, or whether you already served as<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"spay_email":"","jetpack_publicize_message":""},"categories":[38],"tags":[],"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_shortlink":"https:\/\/wp.me\/paHqvV-2Y","jetpack-related-posts":[{"id":161,"url":"https:\/\/www.michaelagreiler.com\/time-is-ticking-deadline-for-scam-2016-approaching\/","url_meta":{"origin":184,"position":0},"title":"Source code analysis and manipulation \u2013 Conference Deadline","date":"May 18, 2016","format":false,"excerpt":"With only one month to go, time is ticking to submit to SCAM 2016 the\u00a0International Conference on Source Code Analysis and Manipulation. The conference is suited for researchers and practitioners that are interested or work on\u00a0theories, techniques, and\/or applications that concern analysis and\/or manipulation of the source code of software\u2026","rel":"nofollow","context":"In \"Research\"","img":{"src":"","width":0,"height":0},"classes":[]},{"id":5371,"url":"https:\/\/www.michaelagreiler.com\/security-code-review-checklist\/","url_meta":{"origin":184,"position":1},"title":"Security Code Review Checklist to find Security Vulnerabilities","date":"February 9, 2021","format":false,"excerpt":"Security code review checklists can help developers focus on security vulnerability and privacy issues. A security-focused mindset is important, as we can see a shift left in the security field. This means that developers nowadays have to know more about security than ever. But, do you know the OWASP Top\u2026","rel":"nofollow","context":"In \"Code reviews\"","img":{"src":"https:\/\/i2.wp.com\/www.michaelagreiler.com\/wp-content\/uploads\/2021\/02\/image.png?fit=989%2C849&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":3151,"url":"https:\/\/www.michaelagreiler.com\/code-review-checklist-2\/","url_meta":{"origin":184,"position":2},"title":"A Code Review Checklist - Focus on these 10 Important Topics","date":"August 13, 2019","format":false,"excerpt":"A code review checklist, as well as clear rules and guidelines around code reviews, can make your code review practice so much more beneficial to your team and significantly speed-up code review times. So make sure you focus on the essentials with this code review checklist!","rel":"nofollow","context":"In \"Code reviews\"","img":{"src":"https:\/\/i2.wp.com\/www.michaelagreiler.com\/wp-content\/uploads\/2019\/08\/Code-Review-Checklist_twitter.jpg?fit=814%2C512&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.michaelagreiler.com\/wp-json\/wp\/v2\/posts\/184"}],"collection":[{"href":"https:\/\/www.michaelagreiler.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.michaelagreiler.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.michaelagreiler.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.michaelagreiler.com\/wp-json\/wp\/v2\/comments?post=184"}],"version-history":[{"count":1,"href":"https:\/\/www.michaelagreiler.com\/wp-json\/wp\/v2\/posts\/184\/revisions"}],"predecessor-version":[{"id":813,"href":"https:\/\/www.michaelagreiler.com\/wp-json\/wp\/v2\/posts\/184\/revisions\/813"}],"wp:attachment":[{"href":"https:\/\/www.michaelagreiler.com\/wp-json\/wp\/v2\/media?parent=184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.michaelagreiler.com\/wp-json\/wp\/v2\/categories?post=184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.michaelagreiler.com\/wp-json\/wp\/v2\/tags?post=184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}