Monday, January 26, 2015

dmanet Digest, Vol 83, Issue 26

Send dmanet mailing list submissions to
dmanet@zpr.uni-koeln.de

To subscribe or unsubscribe via the World Wide Web, visit
http://www.zaik.uni-koeln.de/mailman/listinfo/dmanet
or, via email, send a message with subject or body 'help' to
dmanet-request@zpr.uni-koeln.de

You can reach the person managing the list at
dmanet-owner@zpr.uni-koeln.de

When replying, please edit your Subject line so it is more specific
than "Re: Contents of dmanet digest..."


Today's Topics:

1. CfP: AIS-AChem@GECCO 2015, Abstract submission deadline
extended to January 28, 2015 (Christine Zarges)
2. InfoSec 2015: registration deadline 3 February (GRLMC)
3. CFP: ICC'15 Workshop - 4th IEEE SCPA 2015 - June 8-12, 2015.
London, UK (Sandra Sendra)
4. Deadline approaching Jan. 30, CF?15 -- Call for Papers
(Francesco Silvestri)


----------------------------------------------------------------------

Message: 1
Date: Fri, 23 Jan 2015 14:41:58 +0000
From: Christine Zarges <c.zarges@cs.bham.ac.uk>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] CfP: AIS-AChem@GECCO 2015, Abstract submission
deadline extended to January 28, 2015
Message-ID: <201501231441.t0NEfwTk002536@cca-1216.cs.bham.ac.uk>
Content-Type: text/plain; charset=us-ascii

*** Abstract submission deadline extended to January 28, 2015 ***
*** The abstracts submitted now can be updated later when the full paper is submitted ***
*** Full paper submission deadline is February 4, 2015 and will NOT be extended ***

****************************************************************************************************
CALL FOR PAPERS
2015 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO-2015)
ARTIFICIAL IMMUNE SYSTEMS AND ARTIFICIAL CHEMISTRIES (AIS-ACHEM) TRACK
July 11-15, 2015, Madrid, Spain
Organised by ACM SIGEVO
http://www.sigevo.org/gecco-2015/organizers-tracks.html#ais
****************************************************************************************************

Artificial Immune Systems (AIS) is a diverse area of research that takes inspiration from
the natural immune system and to develop algorithms that can be applied in a wide range of
applications, including learning, optimisation and classification. Many of these algorithms
are built on solid theoretical foundations, taking inspiration and understanding from
mathematical models and computational simulation of aspects of the immune systems.

The area of Artificial Chemistries (AChem) is concerned with developing new tools and
insights into molecular based systems, so attempting to bridge the gap between chemical,
biological and computational systems, or algorithms to develop novel dynamical systems and
control systems. This track will highlight the latest advances in these areas, and act as
a catalyst for potential interaction between these two areas.

Scope:

The AIS/AChem track welcomes submissions of original and unpublished work in all aspects of
AIS/AChem, including (but not limited to) the following areas:

- Computational modelling and simulation of aspects of the immune system or chemical systems
- Applications of AIS/AChem algorithms to computational problems
- Application to real-world problems
- Novel algorithms or simulations of AIS/AChem systems
- Hybridisation with other techniques
- Empirical investigations into performance and complexity
- Theoretical aspects including:
* Algorithm performance
* Convergence analysis
* Mathematical modelling

Each paper will be rigorously evaluated in a double-blind review process.
All accepted papers will be published in the ACM Digital Library.

IMPORTANT DATES

January 28, 2015: Abstract submission (extended)
February 4, 2015: Full paper submission (hard deadline)
March 20, 2015: Notification of paper acceptance
April 14, 2015: Camera ready submission
July 11-15, 2015: GECCO 2015 Conference in Madrid, Spain

TRACK CHAIRS

Jon Timmis, University of York (United Kingdom), jon.timmis@york.ac.uk
http://www.elec.york.ac.uk/staff/jt517.html

Christine Zarges, University of Birmingham (United Kingdom), c.zarges@cs.bham.ac.uk
http://www.cs.bham.ac.uk/~zargesc/


------------------------------

Message: 2
Date: Sat, 24 Jan 2015 19:00:41 +0100
From: "GRLMC" <grlmc@urv.cat>
To: <dmanet@zpr.uni-koeln.de>
Subject: [DMANET] InfoSec 2015: registration deadline 3 February
Message-ID: <D6C0C57893B14C09A2A82AFD9FB2FF81@Carlos1>
Content-Type: text/plain; charset="iso-8859-1"

**********************************************************************

INTERNATIONAL SUMMER SCHOOL ON INFORMATION SECURITY

InfoSec 2015

Tarragona, Spain

July 6-10, 2015

Organized by
Rovira i Virgili University

http://grammars.grlmc.com/InfoSec2015/

**********************************************************************

--- 2nd registration deadline: February 3, 2015 ---

**********************************************************************

AIM:

InfoSec 2015 will be a major research training event addressed to graduates
and postgraduates in the first steps of their academic career. With a global
scope, it aims at updating them about the most recent advances in the
critical and fast developing area of information security, which covers a
large spectrum of current exciting academic research and industrial
innovation. It refers to procedures to defend information from unauthorized
access, use, modification, recording or destruction, with a critical role to
play in order to avoid or minimize risks in the digital world. Renowned
academics and industry pioneers will lecture and share their views with the
audience.

Most information security subareas will be displayed, namely: computer
security, cryptography, privacy, cyber security, mobile security, network
security, world wide web security, fraud prevention, data protection, etc.
Main challenges of information security will be identified through 4 keynote
lectures, 33 six-hour courses, and 1 round table, which will tackle the most
active and promising topics. The organizers believe outstanding speakers
will attract the brightest and most motivated students. Interaction will be
a main component of the event.

ADDRESSED TO:

Graduates and postgraduates from around the world. There are no formal
pre-requisites in terms of academic degrees. However, since there will be
differences in the course levels, specific background knowledge may be
required for some of them.

InfoSec 2015 is also appropriate for more senior people who want to keep
themselves updated on recent developments and future trends. They will
surely find it fruitful to listen and discuss with major researchers,
industry leaders and innovators.

REGIME:

In addition to keynotes, 4 courses will run in parallel during the whole
event. Participants will be able to freely choose the courses they will be
willing to attend as well as to move from one to another.

VENUE:

InfoSec 2015 will take place in Tarragona, located 90 kms. to the south of
Barcelona. The venue will be:

Campus Catalunya
Universitat Rovira i Virgili
Av. Catalunya, 35
43002 Tarragona

KEYNOTE SPEAKERS:

Jan Camenisch (IBM Research, Zurich), Privacy in a Digital World: a Lost
Cause?

Hao Chen (University of California, Davis), (In)security of Mobile Apps in
Untrusted Networks

Jennifer Seberry (University of Wollongong), The Global Village: the
Beginning of the Need for Computer Security [via videoconference]

Gene Tsudik (University of California, Irvine), Off-line Proximity-based
Social Networking

PROFESSORS AND COURSES:

N. Asokan (Aalto University), [intermediate] Mobile Security: Overview of
Hardware Platform Security and Considerations of Usability

Jan Camenisch (IBM Research, Zurich), [introductory/intermediate]
Technologies to Protect Online Privacy

Hao Chen (University of California, Davis), [intermediate/advanced] Security
of the Mobile App Ecosystem

Nicolas T. Courtois (University College London), [introductory/intermediate]
Security of ECDSA in Bitcoin and Crypto Currency

Claude Cr?peau (McGill University, Montr?al), [introductory/intermediate]
Quantum Computation, Cryptography and Cryptanalysis

Joan Daemen (ST Microelectronics Belgium, Diegem),
[introductory/intermediate] Sponge Functions, Keccak and SHA-3

Sajal K. Das (Missouri University of Science and Technology, Rolla),
[intermediate/advanced] Securing Cyber-Physical Systems: Challenges and
Opportunities

Sabrina De Capitani di Vimercati (University of Milan),
[introductory/intermediate] Security and Privacy in the Cloud

Herv? Debar (T?l?com SudParis), [introductory/intermediate] Detection and
Reaction to Attacks: from Intrusion Detection to Cyber-Defense

David Evans (University of Virginia, Charlottesville),
[introductory/intermediate] Secure Multiparty Computation: Techniques,
Theory, and Tools for Building Privacy-Preserving Applications

Rosario Gennaro (City University of New York), [intermediate/advanced] A
Survey of Verifiable Delegation of Computation

Trent Jaeger (Pennsylvania State University, University Park),
[intermediate/advanced] How to Add Security Enforcement to Legacy Programs

Markus Jakobsson (Qualcomm, Santa Clara), [introductory/intermediate]
Frontiers in Fraud Prevention

Antoine Joux (Pierre et Marie Curie University, Paris),
[introductory/intermediate] Discrete Logarithms in Finite Fields

Marc Joye (Technicolor R&I, Los Altos), [introductory/intermediate] Secure
Public-Key Cryptosystems

Somesh Jha (University of Wisconsin, Madison), [intermediate/advanced]
Analysis Techniques in Information Security

Lars R. Knudsen (Technical University of Denmark, Lyngby),
[introductory/intermediate] Block Ciphers: the Workhorses in Cryptography

Songwu Lu (University of California, Los Angeles),
[introductory/intermediate] Cellular Network Security: Issues and Defenses

Catherine Meadows (Naval Research Laboratory, Washington DC),
[introductory/intermediate] Formal Analysis of Cryptographic Protocols

Nasir Memon (New York University), [introductory/intermediate] User
Authentication

Ethan L. Miller (University of California, Santa Cruz),
[intermediate/advanced] Securing Stored Data in a Connected World

Stefano Paraboschi (University of Bergamo), [introductory/intermediate] Data
Protection in Network-enabled Systems

Bart Preneel (KU Leuven), [introductory/intermediate] Cryptology: State of
the Art and Research Challenges

Jean-Jacques Quisquater (Catholic University of Louvain),
[introductory/intermediate] The History of RSA: from Babylon to Smart Cards

Shantanu Rane (Palo Alto Research Center), [introductory/intermediate]
Privacy-preserving Data Analytics: Problems, Solutions and Challenges

Mark Ryan (University of Birmingham), [introductory/intermediate] Designing
Security Protocols: Electronic Voting, and Electronic Mail

Rei Safavi-Naini (University of Calgary), [introductory/intermediate]
Information-theoretically Secure Communication

Stefan Saroiu (Microsoft Research, Redmond), [advanced] Dealing with Loss:
Protecting Data on a Lost Mobile Device

Milind Tambe (University of Southern California, Los Angeles),
[introductory/intermediate] Introduction to the Emerging Science of Security
Games

Gene Tsudik (University of California, Irvine), [intermediate/advanced]
Security and Privacy in Candidate Future Internet Architectures

Yang Xiao (University of Alabama, Tuscaloosa), [introductory/advanced]
Security in Smart Grids

Wenyuan Xu (University of South Carolina, Columbia), [intermediate] Security
and Privacy Analysis of Embedded Systems

Yuliang Zheng (University of North Carolina, Charlotte), [introductory]
Cryptography and the Future of Money

ORGANIZING COMMITTEE:

Adrian Horia Dediu (Tarragona)
Carlos Mart?n-Vide (Tarragona, chair)
Florentina Lilica Voicu (Tarragona)

REGISTRATION:

The registration form can be found at:

http://grammars.grlmc.com/InfoSec2015/registration.php

The selection of up to 8 courses requested in the registration template is
only tentative and non-binding. For the sake of organization, it will be
helpful to have an approximation of the respective demand for each course.

Since the capacity of the venue is limited, registration requests will be
processed on a first come first served basis. The registration period will
be closed and the on-line registration facility disabled when the capacity
of the venue will be complete. It is much recommended to register prior to
the event.

FEES:

Fees are a flat rate covering the attendance to all courses during the week.
There are several early registration deadlines. Fees depend on the
registration deadline.

ACCOMMODATION:

Suggestions of accommodation will be provided in due time.

CERTIFICATE:

Participants will be delivered a certificate of attendance.

QUESTIONS AND FURTHER INFORMATION:

florentinalilica.voicu@urv.cat

POSTAL ADDRESS:

InfoSec 2015
Lilica Voicu
Rovira i Virgili University
Av. Catalunya, 35
43002 Tarragona, Spain

Phone: +34 977 559 543
Fax: +34 977 558 386

ACKNOWLEDGEMENTS:

Universitat Rovira i Virgili




------------------------------

Message: 3
Date: Sat, 24 Jan 2015 23:30:41 +0100
From: Sandra Sendra<sandra.sendra.upv@gmail.com>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] CFP: ICC'15 Workshop - 4th IEEE SCPA 2015 - June
8-12, 2015. London, UK
Message-ID: <201501242230.t0OMUeaW031288@smtp.upv.es>
Content-Type: text/plain; charset=us-ascii


-------------------- CALL FOR PAPERS (DEADLINE EXTENDED) -----------------

4th IEEE International Workshop on Smart Communication Protocols and Algorithms (SCPA 2015)
June 8-12, 2015. London, UK
In conjunction with IEEE ICC 2015
http://scpa.it.ubi.pt/2015/

Selected papers will be invited to the Special Issue on Smart Protocols and Algorithms of the International Journal Network Protocols and Algorithms (ISSN 1943-3581) or to the Special Issue on Recent Patents on Telecommunications Journal ((Online)ISSN 2211-7415, (Print) ISSN 2211-7407)

Communication protocols and algorithms are needed to communicate network devices and exchange data between them. The appearance of new technologies usually comes with a protocol procedure and communication rules that allows data communication while taking profit of this new technology. Recent advances in hardware and communication mediums allow proposing new rules, conventions and data structures which could be used by network devices to communicate across the network. Moreover, devices with higher processing capacity let us include more complex algorithms that can be used by the network device to enhance the communication procedure.

Smart communication protocols and algorithms make use of several methods and techniques (such as machine learning techniques, decision making techniques, knowledge representation, network management, network optimization, problem solution techniques, and so on), to communicate the network devices to transfer data between them. They can be used to perceive the network conditions, or the user behavior, in order to dynamically plan, adapt, decide, take the appropriate actions, and learn from the consequences of its actions. The algorithms can make use of the information gathered from the protocol in order to sense the environment, plan actions according to the input, take consciousness of what is happening in the environment, and take the appropriate decisions using a reasoning engine. Goals such as decide which scenario fits best its end-to-end purpose, or environment prediction, can be achieved with smart protocols and algorithms. Moreover, they could learn from the past and !
use this knowledge to improve futur
e decisions.

In this workshop, researchers are encouraged to submit papers focused on the design, development, analysis or optimization of smart communication protocols or algorithms at any communication layer. Algorithms and protocols based on artificial intelligence techniques for network management, network monitoring, quality of service enhancement, performance optimization and network secure are included in the workshop.

We welcome technical papers presenting analytical research, simulations, practical results, position papers addressing the pros and cons of specific proposals, and papers addressing the key problems and solutions. The topics suggested by the conference can be discussed in term of concepts, state of the art, standards, deployments, implementations, running experiments and applications.

Topics of interest:
Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal, including, but are not limited to, the following topic areas:

- Smart network protocols and algorithms for multimedia delivery
- Application layer, transport layer and network layer cognitive protocols
- Cognitive radio network protocols and algorithms
- Automatic protocols and algorithms for environment prediction.
- Algorithms and protocols to predict data network states.
- Intelligent synchronization techniques for network protocols and algorithms
- Smart protocols and algorithms for e-health
- Software applications for smart algorithms design and development.
- Dynamic protocols based on the perception of their performance
- Smart protocols and algorithms for Smartgrids
- Protocols and algorithms focused on building conclusions for taking the appropriate actions.
- Smart Automatic and self-autonomous ad-hoc and sensor networks.
- Artificial intelligence applied in protocols and algorithms for wireless, mobile and dynamic networks.
- Smart security protocols and algorithms
- Smart cryptographic algorithms for communication
- Artificial intelligence applied to power efficiency and energy saving protocols and algorithms
- Smart routing and switching protocols and algorithms
- Cognitive protocol and algorithm models for saving communication costs.
- Any kind of intelligent technique applied to QoS, content delivery, network Monitoring and network management.
- Smart collaborative protocols and algorithms
- Problem recognition and problem solving protocols
Genetic algorithms, fuzzy logic and neural networks applied to communication protocols and algorithms

Important Dates

Submission Deadline: 31st January, 2015 (FINAL DEADLINE - no further extensions)
Acceptance Notification: 1st March, 2015
Camera Ready Deadline: 15th March, 2015

Submission guidelines:
All submissions must be full papers in PDF format and uploaded on EDAS (http://edas.info/newPaper.php?c=18713).

All submissions should be written in English with a maximum paper length of five (5) printed pages (10-point font) including figures without incurring additional page charges.


General Chairs
Jaime Lloret Mauri, Universitat Polit�cnica Val�ncia, Spain
Joel Rodrigues, Instituto de Telecomunica��es, Univ. of Beira Interior, Portugal

TPC Chairs
Ivan Stojmenovic, University of Ottawa, Canada
Guangjie Han, Hohai University, China

Panel Chairs
Honggang Wang, University of Massachusetts, USA
Daqiang Zhang, Tongji University, China

Industry Chairs
Antonio S�nchez-Esguevillas, Telefonica R&D, Spain
Neeraj Kumar, Thapar University, Patiala (Punjab), India

Publicity Chair
Sandra Sendra, Universitat Polit�cnica Val�ncia, Spain

Web Chair
Alejandro C�novas Solbes, Universitat Polit�cnica Val�ncia, Spain


------------------------------

Message: 4
Date: Sun, 25 Jan 2015 01:05:36 +0100
From: Francesco Silvestri <silvest1@dei.unipd.it>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] Deadline approaching Jan. 30, CF?15 -- Call for
Papers
Message-ID:
<CANYQr1eFoTq1isq31jc+iPAa-BRBWaRMX8d9D_mtJ8jbnms2Hw@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8

==================================================================
ACM International Conference on Computing Frontiers 2015 (CF'15)
May 18 - 21, 2015, Ischia, Italy

CALL FOR PAPERS

www.computingfrontiers.org
==================================================================


EXTENDED SUBMISSION DEADLINE: January 30, 2015



SCOPE
=====

Computing Frontiers represents an engaged, collaborative community
of researchers who are excited about transformational technologies
in the field of computing. We are presently on the cusp of several
revolutions, including new memory technologies, networking
technologies, algorithms for handling large-scale data, power-saving
and energy-efficient solutions for data centers, systems solutions
for cloud computing, new application domains that affect every day
life and many, many more. Boundaries between the state-of-the-art
and revolutionary innovation constitute the computing frontiers that
must be pushed forward to advance science, engineering, and
information technology. Before revolutionary materials, devices,
and systems enter the mainstream, early research must be performed
using far-reaching projections of the future state of technologies.

Computing Frontiers is a gathering for people to share and discuss
such work, focusing on a wide spectrum of advanced technologies and
radically new solutions relevant to the development of the whole
spectrum of computer systems, from embedded to high-performance
computing.

This year we are adding Industry Sessions and Workshops that focus
on special topics. These sessions should have a special computing
frontiers focus and can run between 1/2 and a full day.


KEY DATES
=========

Submissions deadline: January 30, 2015
Notification: March 2, 2015
Camera-Copy Papers Due: March 20, 2015


TOPICS OF INTEREST
==================

We seek contributions that push the envelope in a wide range of
computing topics, from more traditional research in architecture and
systems to new technologies and devices. We seek contributions on
novel computing paradigms, computational models, algorithms,
application paradigms, development environments, compilers, operating
environments, computer architecture, hardware substrates, memory
technologies and smarter life applications. We are also interested in
emerging fields that may not fit within traditional categories.

* Algorithms and Models of Computing
approximate and inexact computing, quantum and probabilistic
computing

* Biological Computing Models
brain computing, neural computing, computational neuroscience,
biologically-inspired architectures

* Big Data
analytics, machine learning, search and representation, system
design

* System Complexity Management
cloud systems, datacenters, exa-scale computing

* Computers and Society
education, health and cost/energy-efficient design, smart cities,
emerging markets

* Security
architecture and systems support for protection against malicious
code

* Limits on Technology Scaling and Moore's Law
defect- and variability-tolerant designs, graphene and other
novel materials, nanoscale design, optoelectronics, dark silicon

* Uses of Technology Scaling
3D stacked technology, challenges of manycore designs,
PCM's, novel memory architectures, mobile devices

* Compiler technologies
novel techniques to push the envelope on new technologies,
applications, hardware/software integrated solutions, advanced
analysis

* Networking
technology and protocols, bandwidth management, social networks,
internet of things

* Interdisciplinary Applications
applications that bridge multiple disciplines in interesting ways

* Position Papers, Trend Papers and Crazy Ideas

* Industry Sessions and Workshops
Sessions should have a special computing frontiers focus and can
run between 1/2 and full day.


INDUSTRY SESSIONS AND WORKSHOPS
===============================

### Future Information Security, Privacy and Forensics for Complex Systems

FISP-2015 is the first International Workshop on Future Information
Security, Privacy, and Forensics for Complex Systems. The aim of
FISP-2015 is to provide a premier international platform for scholars,
researchers, and practitioners in academia and industry to discuss the
most recent challenges and developments in "Information Security,
Privacy and Forensics for Complex systems" from the perspective of
providing security awareness and its best practices for the real
world. This workshop is open to submit novel and high quality research
contributions in the field of information security and privacy. We
anticipate that this workshop will open new entrance for further
research and technology improvements in this important area.

Paper Submission Deadline: January 16, 2015 (Fri), 11:59:59 PM (PST)
Workshop website: http://www.icsrg.org/fisp-2015.html


### LP-EMS15 - Design of Low Power Embedded Multimedia Systems

Digital Media Technologies (DMTs) constitute one of the widest and most
important research areas in the ICT domain. Digital technologies allowed
the design of complex systems for creation, fruition and sharing of
audio/video/image contents pervading consumer electronics. A key
challenge in this domain regards the possibility of implementing
real-time high-performance multimedia systems minimizing,
contemporarily, their power consumption. Complexity on algorithmic side
and heterogeneity on processing platform side, are normally colliding
system constraints. It is necessary to close the gap between efficient
processing and optimal hardware support by adopting smart
hardware-software co-design solutions and flexible design frameworks.
In this perspective, dataflow-streaming based system models are
naturally capable of capturing domain-specific knowledge into formal
abstract system specifications capable of exposing the intrinsic
potential parallelism of the algorithms. Such representations result
very appropriate to model and explore the design space of DMTs
applications.

Paper Submission Deadline: Monday February 2, 2015, 11:59.59 PM (PST)
Workshop website: https://sites.google.com/site/cf15lowpowersystems/


### Analytics Platforms for the Cloud

Cloud computing has become popular because of cost, agility, scale, and
flexibility. At the same time, the use of flexible analytic platforms
such as Hadoop, Spark, etc. have grown in popularity and are being used
to drive the computational side of many types of workloads. Many are
now starting to bring these two together to drive efficient deployment
of analytic capabilities which can specifically leverage the flexibility
and agility of Cloud delivery. The purpose of this workshop is to
provide a forum for researchers and practitioners in analytics and cloud
computing an end-to-end view on the challenges and opportunities of
cloud-based analytics, and enable idea sharing.

Paper Submission Deadline: February 8th, 2015
Workshop website:
http://researcher.watson.ibm.com/researcher/view_group.php?id=5744


### Making Sense of Sensed Data - Issues in Developing Heterogeneous
Cognitive Systems

A new frontier in computing is evolving around developing systems that
'sense' and respond to data in ways that represent or mimic human
'cognition'. These advancements represent the intersection of
developments in processor hardware, software, and sensing devices.
Examples include the implementation of low power architectures that
mimic the type of synaptic information transmission that occur in
animal brains (Neuromorphic systems), improvements in probability
based software for big data analysis systems such as Natural Language
Processing, the development of "deep learning systems" which have
demonstrated systems that 'learn' representations? of data, and the
explosive growth of user based content in data systems such as cell
phone video etc.. The evolution of these systems is leading to new
possibilities for computing systems to interpret a vast amount of big
data collected by sensors into a meaningful representations and to
learn from that data or draw inferences from it.

Paper Submission Deadline: Friday, Feb 13, 2015
Workshop website: http://computingfrontiers.org/2015/workshops/MSSD15/




SUBMISSION
==========

Authors are invited to submit full papers or posters to the main
conference. Full papers and poster abstracts must be submitted
through the conference paper submission site. Full papers should
not exceed eight double-column pages in standard ACM conference format.
Poster abstracts should not exceed two pages in the same format.
These limits include figures, tables, and references. Our review
process is double-blind. Thus, please remove all identifying
information from the paper submission (also if citing own work).
Abstracts for accepted posters will be published in the proceedings
and in the ACM Digital Library (note that authors of these works
retain their copyright rights to publish more complete versions
later). The best papers from the Computer Frontiers Conference and
Workshops will be invited to be published in special issues of IJPP
or PARCO. As per ACM guidelines, at least one of the authors of
accepted papers is required to register for the conference.

For information on workshop submissions, please see the individual
workshop websites.


ORGANIZATION
============

Computing Frontiers 2015 Chairs

General Chairs: Claudia Di Napoli, ICAR-CNR, IT
Valentina Salapura, IBM, US
Program Chairs: Hubertus Franke, IBM Research, US
Rui Hou, Institute for Computing Technology,
Chinese Academy of Sciences, PRC
Finance Chair: Jens Breitbart, TU Munich, DE
Local Arrangements Chair:
Silvia Rossi, Universite degli Studi di Napoli
"Federico II", IT
Poster Chair: Alexander Heinecke, Intel Parallel Computing Lab, US
Publicity Chairs:
Kun Wang, Microsoft, PRC
Raymond Namyst, University of Bordeaux, FR
Publication Chair:
Michela Taufer, University of Delaware, US
Web Chair: Kristian Rietveld, Leiden University, NL


Computing Frontiers 2015 Steering Committee

Monica Alderighi, INAF, IT
Claudia Di Napoli, ICAR-CNR, IT
Hubertus Franke, IBM, US
Diana Franklin, University of California at Santa Barbara, US
Georgi Gaydadijev, Chalmers University, SE
Alexander Heinecke, Intel Parallel Computing Lab, US
Paul Kelly, Imperial College, GB
Sally A. McKee, Chalmers University of Technology, SE
Krishna Palem, Rice University, US / Nanyang Technological University, SG
Francesca Palumbo, University of Cagliari, IT
Valentina Salapura, IBM, US
Pedro Trancoso, University of Cyprus, CY
Carsten Trinitis, Technische Universit??t Muenchen, DE
Eli Upfal, Brown University, US
Josef Weidendorfer, Technische Universit??t Muenchen, DE



------------------------------

Subject: Digest Footer

_______________________________________________
dmanet mailing list
dmanet@zpr.uni-koeln.de
http://www.zaik.uni-koeln.de/mailman/listinfo/dmanet


------------------------------

End of dmanet Digest, Vol 83, Issue 26
**************************************

No comments:

Post a Comment