1. RAW 2016 - CALL FOR PAPERS - Paper Abstract Deadline Extended to January 15th
    ====================================================================

    Highlights: Deadline extension, 3 keynote speakers, social event, best paper award and journal special issue for the highest ranked papers.

    23rd Reconfigurable Architectures Workshop
    May 23-24, 2016
    Chicago, Illinois USA

    Website: http://raw.necst.it/

    Important Dates:
    Abstract submission: January  4, 2016   Extended to January 15, 2016
    Submission deadline: January  8, 2016  Extended to January 20, 2016
    Decision notification:February 12, 2016
    Camera-Ready papers due: February 26, 2016


    News:

    Advance Program:
    May 23, 2016:
    • Keynote speech by Peter Hofstee, IBM, Austin, TX, USA
    • Social event sponsored by TOPIC Embedded Products
    May 24, 2016:
    • Keynote speech by Patrick Lysaght, Xilinx, San Jose, CA, USA
    • Keynote speech by Rieny Rijnen, TOPIC Embedded Products, Eindhoven, the Netherlands


    The 23rd Reconfigurable Architectures Workshop (RAW 2016) will be held in Chicago, Illinois USA in May 2016. RAW 2016 is associated with the 30th IEEE International Parallel & Distributed Processing Symposium (IPDPS 2016) and is sponsored by the IEEE Computer Society Technical Committee on Parallel Processing. The workshop is one of the major meetings for researchers to present ideas, results, and on-going research on both theoretical and practical advances in Reconfigurable Computing.

    A reconfigurable computing environment is characterized by the ability of underlying hardware architectures or devices to rapidly alter (often on the fly) the functionalities of their components and the interconnection between them to suit the problem at hand. The area has a rich theoretical tradition and wide practical applicability. There are several commercially available reconfigurable platforms (FPGAs and coarse-grained devices) and many modern applications (including embedded systems and HPC) use reconfigurable subsystems. An appropriate mix of theoretical foundations and practical considerations, including algorithms architectures, applications, technologies and tools, is essential to fully exploit the possibilities offered by reconfigurable computing. The Reconfigurable Architectures Workshop aims to provide a forum for creative and productive interaction for researchers and practitioners in the area.

    Authors are invited to submit manuscripts of original unpublished research in all areas of reconfigurable systems, including architectures, algorithms, applications, software and cross-cutting areas.

    Topics of interest include, but are not limited to:

    Reconfigurable Systems & Applications:
    · Reconfigurable Accelerators (HPC, Bioinformatics, Acceleration Applications in Finance, Data Mining, Big Data, and Analytics)
    · Embedded systems and Domain-Specific solutions (Digital Media, Gaming, Automotive applications)
    · FPGA-based MPSoC and Multicore
    · Distributed Systems and Networks
    · Wireless and Mobile Systems
    · Emerging applications (Organic Computing, Biology-Inspired Solutions)
    · Critical issues (Security, Energy efficiency, Fault-Tolerance)

    Architectures & Algorithms:
    · Theoretical Interconnect and Computation Models
    · Algorithmic Techniques and Mapping
    · Run-Time Reconfiguration Models and Architectures
    · Emerging Technologies (optical models, 3D Interconnects, devices)
    · Bounds and Complexity Issues
    · Analog Arrays

    Software & Tools:
    · Operating Systems and High Level Synthesis
    · High-Level Design Methods (Hardware/Software Co-design, Compilers)
    · System Support (Soft Processor Programming)
    · Runtime Support
    · Reconfiguration Techniques (Reusable Artifacts)
    · Simulations and Prototyping (Performance Analysis, Verification Tools)


    Submission Guidelines:
    All manuscripts will be reviewed by at least three members of the program committee. Submissions should be a complete manuscript or, in special cases, may be a summary of relevant work. The manuscript should be not exceed 8 single-spaced, double-column pages using 10-point size font on 8.5X11 inch pages (IEEE conference style) including references, figures and tables. Papers are to be submitted through EDAS. Submitted papers should not have appeared in or be under consideration for a different workshop, conference or journal. It is also expected that all accepted papers (regular or poster) will be presented at the workshop by one of the authors.

    Publication:
    IEEE CS Press will publish the IPDPS symposium and workshop abstracts as a printed volume. The complete symposium and workshop proceedings will also be published by IEEE CS Press as a CD-ROM disk and will be available in the IEEE Digital Library.
    0

    Add a comment


  2. EXTENDED SUBMISSION DEADLINE
    ----------------------------------------------------


    CALL FOR PAPERS
    ===============

    10-th Workshop on Embedded Systems Security (WESS 2015)
    A Workshop of the Embedded Systems Week (ESWEEK 2015)
    October 8, 2015
    Amsterdam, The Netherlands


    About WESS
    ——————————
    Embedded computing systems are continuously adopted in a wide range of 
    application areas and importantly, they are responsible for a large 
    number of safety-critical systems as well as for the management of 
    critical information. The advent of the Internet-of-Things introduces 
    a large number of security issues: the Internet can be used to attack 
    embedded systems and embedded systems can be used to attack the Internet. 
    Furthermore, embedded systems are vulnerable to many attacks not relevant
    to servers because they are physically accessible. Inadvertent threats 
    due to bugs, improper system use, etc. can also have effects that are 
    indistinguishable from malicious attacks.

    This workshop will address the range of problems related to embedded 
    system security. Of particular interest are security topics that are 
    unique to embedded systems. The workshop will provide proceedings to 
    the participants and will encourage discussion and debate about embedded 
    systems security.

    Topics of Interest
    ——————————————————
    * Trust models for secure embedded hardware and software
    * Isolation techniques for secure embedded hardware, hyperware and software
    * System architectures for secure embedded systems
    * Hardware security
    * Metrics for secure design of embedded hardware and software
    * Security concerns for medical and other applications of embedded systems
    * Support for intellectual property protection and anti-counterfeiting
    * Specialized components for authentication, key storage and key generation
    * Support for secure debugging and troubleshooting
    * Implementation attacks and countermeasures
    * Design tools for secure embedded hardware and software
    * Hardware/software co-design for secure embedded systems
    * Specialized hardware support for security protocols 
    * Efficient and secure implementation of cryptographic primitives

    Submission Instructions
    ———————————————————————
    The proceedings of the workshop will be published by the ACM. Papers must be 
    submitted in PDF form through the EASYCHAIR system. Submitted papers should 
    present original research that is unpublished and not submitted elsewhere. 
    Papers should be at least 4 pages long in 2-column ACM format. Although 
    typical papers are 4-6 pages long, camera ready papers can be up to 10 pages.
    Templates for the submission of papers can be found at the ACM website. 
    To submit a paper refer to http://www.wess-workshop.org

    Important Dates
    ———————————————
    Paper submission deadline:           July 15, 2015   ***EXTENDED
    Author notification:                 August 18, 2015
    Camera ready papers due:             September 1, 2015
    Copyright forms due:                 September 1, 2015
    Workshop date:                       October 8, 2015
    0

    Add a comment

  3. CALL FOR PAPERS
    ===============

    10-th Workshop on Embedded Systems Security (WESS 2015)
    A Workshop of the Embedded Systems Week (ESWEEK 2015)
    October 8, 2015
    Amsterdam, The Netherlands


    About WESS
    ——————————
    Embedded computing systems are continuously adopted in a wide range of
    application areas and importantly, they are responsible for a large
    number of safety-critical systems as well as for the management of
    critical information. The advent of the Internet-of-Things introduces
    a large number of security issues: the Internet can be used to attack
    embedded systems and embedded systems can be used to attack the Internet.
    Furthermore, embedded systems are vulnerable to many attacks not relevant
    to servers because they are physically accessible. Inadvertent threats
    due to bugs, improper system use, etc. can also have effects that are
    indistinguishable from malicious attacks.

    This workshop will address the range of problems related to embedded
    system security. Of particular interest are security topics that are
    unique to embedded systems. The workshop will provide proceedings to
    the participants and will encourage discussion and debate about embedded
    systems security.

    Topics of Interest
    ——————————————————
    * Trust models for secure embedded hardware and software
    * Isolation techniques for secure embedded hardware, hyperware and software
    * System architectures for secure embedded systems
    * Hardware security
    * Metrics for secure design of embedded hardware and software
    * Security concerns for medical and other applications of embedded systems
    * Support for intellectual property protection and anti-counterfeiting
    * Specialized components for authentication, key storage and key generation
    * Support for secure debugging and troubleshooting
    * Implementation attacks and countermeasures
    * Design tools for secure embedded hardware and software
    * Hardware/software co-design for secure embedded systems
    * Specialized hardware support for security protocols
    * Efficient and secure implementation of cryptographic primitives

    Submission Instructions
    ———————————————————————
    The proceedings of the workshop will be published by the ACM. Papers must be
    submitted in PDF form through the EASYCHAIR system. Submitted papers should
    present original research that is unpublished and not submitted elsewhere.
    Papers should be no more than 10 pages 2-column in ACM format. Templates for
    the submission of papers can be found at the ACM website. To submit a paper

    Important Dates
    ———————————————
    Paper submission deadline:         July 3, 2015
    Author notification:               August 18, 2015
    Camera ready papers due:           September 1, 2015
    Copyright forms due:               September 1, 2015
    Workshop date:                     October 8, 2015



    Committees
    ===========

    Program Chairs
    ——————————————————
    S. Koubias (Univ. of Patras)
    T. Sauter (Donau University Krems)


    Program Committee
    ——————————————————
    D. Arora (Intel, USA)
    I.C. Bertolotti (PolitecnicoTorino, Italy )
    A. Bogdanov (KU Leuven, Belgium)
    B. Carbunar (FIU, USA)
    K. Dietrich (NXP Semiconductors, Austria)
    M. van Dijk (U. Connecticut, USA)
    D. Forte (U. Connecticut, USA)
    J. Groszschaedl (U. Luxemburg, Luxemburg)
    W. Kastner (TU Wien, Austria)
    F. Praus (FH Technikum Wien, Austria)
    S. Rajagopalan (Honeywell, USA)
    P. Schwabe (Radboud U. Nijmegen, Netherlands)
    N. Sklavos (TEI Epirus, Greece)
    M. Taha (Assiut U., Egypt)
    A. Treytl (Donau U. Krems, Austria)
    Y. Wang (I2R A*STAR, Singapore)


    Steering Committee
    ——————————————————
    C. Gebotys (U. Waterloo)
    D. Serpanos (QCRI)
    M. Wolf (Georgia Tech)
    0

    Add a comment

  4. Call For Participation: ACM e-Energy 2015 (Early registration deadline: June 15th, 2015)

    ACM e-Energy 2015, the Sixth International Conference on Future Energy Systems.
    Bangalore, India, July 14-17, 2015
    http://conferences.sigcomm.org/eenergy/2015/

    The sixth ACM International Conference on Future Energy Systems (ACM e-Energy) aims to be the premier venue for researchers working in the broad areas of computing and communication for smart energy systems, and in energy-efficient computing and communication systems.
    In addition to a single track of full papers and challenge papers, the program includes keynote addresses by eminent researchers, workshops, panel discussions and posters and demos.

    Keynote Speakers:

    • Dr. Ashok Jhunjhunwala (Institute Professor at IIT Madras)
    • Prof. Iven Mareels (Dean of the School of Engineering, the University of Melbourne)
    • Bruce Nordman (Research Scientist, Lawrence Berkeley) 
    Important dates: 
    Early registration: June 15, 2015 (registration details at http://conferences.sigcomm.org/eenergy/2015/registration.php )
    Workshops: July 14, 2015

    Main conference: July 15-17, 2015 
    0

    Add a comment


  5. Elsevier PHYCOM S.I. on D2D-based Offloading Techniques

    Submission deadline extended: July 6th, 2015 

    CFP webpage

    Scope of the Special Issue
    The Device-to-Device (D2D) communication paradigm was first proposed for cellular relaying, although it has been later proposed for a large variety of applications, such as opportunistic routing, peer-to-peer, content distribution, and cellular offloading. Indeed, the recent emergence of the D2D paradigm paves the way towards improving the performance of cellular networks by means of novel opportunistic architectures, e.g, based on LTE-Direct and WiFi-Direct technologies.
    This special issue will focus on theoretical research contributions presenting new techniques, concepts or analyses, and applied contributions reporting on experiences and experiments with D2D-based offloading systems. In particular, within the general framework of D2D communications and cellular offloading, we solicit manuscripts that present original and previously unpublished work on topics including, but not limited to, the following:
    • PHY/MAC architectures;
    • Opportunistic offloading;
    • Opportunistic medium access;
    • Spectrum management;
    • Resource optimization;
    • Energy minimization;
    • Security and privacy;
    • Interference management;
    • Coding and decoding methods;
    • MAC protocol coexistence;
    • Scheduling;
    • HetNets;
    • M2M communications;
    • Vehicular communications;
    • Content distribution architectures.

    Guest Editors
    Dr. Vincenzo Mancuso
    IMDEA Networks Institute
    vincenzo.mancuso@imdea.org
    Dr. Omer Gurewitz
    Ben Gurion University of the Negev
    gurewitz@cse.bgu.ac.il

    Submission Format and Guideline
    All submitted papers must be clearly written in excellent English and contain only original work, which has not been published by or is currently under review for any other journal or conference. Papers must not exceed 25 pages (one-column, at least 11pt fonts) including figures, tables, and references. A detailed submission guideline is available as “Guide to Authors” at: http://www.elsevier.com/journals/physical-communication/1874-4907/guide-for-authors

    All manuscripts and any supplementary material should be submitted through Elsevier Editorial System (EES). The authors must select as “D2D OFFLOADING” when they reach the “Article Type” step in the submission process. The EES website is located at: http://ees.elsevier.com/phycom
    All papers will be peer-reviewed by three independent reviewers. Requests for additional information should be addressed to the guest editors.


    0

    Add a comment

  6. CFP webpage

    Scope of the Special Issue
    The Device-to-Device (D2D) communication paradigm was first proposed for cellular relaying, although it has been later proposed for a large variety of applications, such as opportunistic routing, peer-to-peer, content distribution, and cellular offloading. Indeed, the recent emergence of the D2D paradigm paves the way towards improving the performance of cellular networks by means of novel opportunistic architectures, e.g, based on LTE-Direct and WiFi-Direct technologies.
    This special issue will focus on theoretical research contributions presenting new techniques, concepts or analyses, and applied contributions reporting on experiences and experiments with D2D-based offloading systems. In particular, within the general framework of D2D communications and cellular offloading, we solicit manuscripts that present original and previously unpublished work on topics including, but not limited to, the following:
    • PHY/MAC architectures;
    • Opportunistic offloading;
    • Opportunistic medium access;
    • Spectrum management;
    • Resource optimization;
    • Energy minimization;
    • Security and privacy;
    • Interference management;
    • Coding and decoding methods;
    • MAC protocol coexistence;
    • Scheduling;
    • HetNets;
    • M2M communications;
    • Vehicular communications;
    • Content distribution architectures.
    Timelines
    Submission deadline:  May 31, 2015
    Acceptance deadline: September 30, 2015
    Publication: December 2015 

    Guest Editors
    Dr. Vincenzo Mancuso
    IMDEA Networks Institute
    vincenzo.mancuso@imdea.org
    Dr. Omer Gurewitz
    Ben Gurion University of the Negev
    gurewitz@cse.bgu.ac.il

    Submission Format and Guideline
    All submitted papers must be clearly written in excellent English and contain only original work, which has not been published by or is currently under review for any other journal or conference. Papers must not exceed 25 pages (one-column, at least 11pt fonts) including figures, tables, and references. A detailed submission guideline is available as “Guide to Authors” at: http://www.elsevier.com/journals/physical-communication/1874-4907/guide-for-authors

    All manuscripts and any supplementary material should be submitted through Elsevier Editorial System (EES). The authors must select as “D2D OFFLOADING” when they reach the “Article Type” step in the submission process. The EES website is located at: http://ees.elsevier.com/phycom
    All papers will be peer-reviewed by three independent reviewers. Requests for additional information should be addressed to the guest editors.


    0

    Add a comment

  7. ACM SIGBED is delighted to announce the winner of the 2014 ACM SIGBED Paul Caspi Memorial Dissertation Award:


    Arjun Radhakrishna
    IST Austria

    for his thesis

    Quantitative Specifications for Verification and Synthesis

    The winner has been chosen from a total of 6 nominations. The selection committee found the winning thesis to be an outstanding contribution to the emerging field of quantitative formal reasoning in systems development.

    0

    Add a comment

  8. CALL FOR NOMINATIONS (Deadline Extended)

    SIGBED Paul Caspi Memorial Dissertation Award

    The Paul Caspi Memorial Dissertation Award is a new SIGBED award established in 2013. The award will recognize outstanding doctoral dissertations that significantly advance the state of the art in the science of embedded systems, in the spirit and legacy of Dr. Paul Caspi's work.

    The SIGBED Paul Caspi Memorial Dissertation Award will be presented annually to the author of an outstanding dissertation in the area of Embedded Systems. The author of the winning dissertation will be invited to publish a dissertation summary in the ACM SIGBED Newsletter and to submit their work to the journal ACM TECS (Transactions on Embedded Computing Systems) for possible publication, after the normal peer-review process. The award will include an award certificate for the author and an honorarium of 2000 USD. A public citation for the award paper will be placed on the SIGBED web site.

    Selection Process

    The award is for an outstanding doctoral dissertation dated within one year preceding the nomination due date. A selection committee and a selection committee chair will be selected by the current SIGBED Executive Committee. A member of the current SIGBED Executive Committee will be one of the selection committee members. The committee chair shall adjudicate conflicts of interest, appointing substitutes to the committee as necessary. Dissertations supervised by a selection committee member are ineligible to be nominated. For purposes of continuity, committee members may remain on the committee for up to three years. The selection committee shall be no less than three persons in size.


    Selection Committee
    • Sanjoy Baruah
    • Christoph Kirsch (Chair)
    • Xenofon Koutsoukos
    • Florence Maraninchi
    • John Regehr
    • Lothar Thiele

    Nomination Process

    Nominations will be solicited annually, being due March 1st each year, via major mailing lists and web forums. Additionally, dissertation advisers of each eligible year will be contacted for solicitation of award nominations.

    A nomination should consist of the following items:
    • Name, address, phone number, and email address of the person making the nomination (the nominator).
    • Name, address, phone number, and email address of the candidate for whom an award is recommended (the nominee).
    • A short statement (200-500 words) explaining why the nominee deserves the award.
    • Supporting statements from up to two persons in addition to the nominator. 
    • The nominated dissertation in an English language version.
    • A list of the nominee's publications that were used as the basis of chapters in the nominated dissertation.
    • The CV of the nominee.
    The selection committee will make a recommendation on the winner of the award to the SIGBED Executive Committee, which will approve and announce the final winner. SIGBED Executive Committee members who have conflicts of interest with any nominee will be excluded from the approval process. The primary selection criterion will be the quality of the candidate's work, with the aim to recognize outstanding doctoral dissertations. The selection committee may choose to issue no award in a given year. The award may not be given to multiple recipients.

    Nomination Deadline

    The nomination should be sent by email to paul-caspi-award@googlegroups.com by March 8, 2015.
    0

    Add a comment

  9. ACM SIGBED CPSWeek 2015 Travel Grants

    To promote excellence in Cyber-Physical Systems (CPS) education and research, SIGBED offers TRAVEL GRANTS for STUDENTS to attend CPSWeek 2015, the premier forum in the cyber-physical system area. The travel grants are given at a preset amount which may vary from year to year (but no greater than $500), and can be used to partially cover conference registration and/or hotel accommodation.

    Who is eligible?

    Students who are co-authors of a paper accepted by any of the conferences at CPSWeek and are SIGBED members can apply. In return, we ask travel grant recipients to help promote SIGBED at the conference, and to write a blog (at the SIGBED blog site) about his/her experience on attending the conference.

    How to apply?

    To apply, fill the application form below and email it to  Xenofon Koutsoukos (Xenofon.Koutsoukos@vanderbilt.edu). The application form should be included as text in the body of the email and the subject should be: SIGBED CPSWeek Student Travel Grant Application. We also require a short support letter from your advisor sent directly to Xenofon Koutsoukos (Xenofon.Koutsoukos@vanderbilt.edu). The submission deadline is February 20, 2015. Both the application and the support letter must be received by this date. No extensions will be given. We aim to notify the recipients by March 6, 2015. The selection will be done based on both needs and merit.

    Selection committee:
    •   Jie Liu, Microsoft
    •   Raj Rajkumar, Carnegie Mellon University
    •   Xenofon Koutsoukos, Vanderbilt University

    SIGBED Travel Grant Application Form

    Name:
    Address:
    Email:
    University:
    Department:

    [ ] I am a member of SIGBED

    [ ] I am the author or a co-author of an accepted paper at CPSWeek 2015
    Participation at other CPSWeek events:
    I have submitted or intend to submit...
    [ ] ... a paper to a workshop affiliated with CPSWeek
    [ ] ... other: __________

    Anticipated travel expenses (in dollars):

    Degree pursued:
    Years in the program:
    When you expect to finish:

    Faculty advisor
    Name:

    E-mail:

    0

    Add a comment

  10. CALL FOR NOMINATIONS

    SIGBED Paul Caspi Memorial Dissertation Award

    The Paul Caspi Memorial Dissertation Award is a new SIGBED award established in 2013. The award will recognize outstanding doctoral dissertations that significantly advance the state of the art in the science of embedded systems, in the spirit and legacy of Dr. Paul Caspi's work.

    The SIGBED Paul Caspi Memorial Dissertation Award will be presented annually to the author of an outstanding dissertation in the area of Embedded Systems. The author of the winning dissertation will be invited to publish a dissertation summary in the ACM SIGBED Newsletter and to submit their work to the journal ACM TECS (Transactions on Embedded Computing Systems) for possible publication, after the normal peer-review process. The award will include an award certificate for the author and an honorarium of 2000 USD. A public citation for the award paper will be placed on the SIGBED web site.

    Selection Process

    The award is for an outstanding doctoral dissertation dated within one year preceding the nomination due date. A selection committee and a selection committee chair will be selected by the current SIGBED Executive Committee. A member of the current SIGBED Executive Committee will be one of the selection committee members. The committee chair shall adjudicate conflicts of interest, appointing substitutes to the committee as necessary. Dissertations supervised by a selection committee member are ineligible to be nominated. For purposes of continuity, committee members may remain on the committee for up to three years. The selection committee shall be no less than three persons in size.


    Selection Committee
    • Sanjoy Baruah
    • Christoph Kirsch (Chair)
    • Xenofon Koutsoukos
    • Florence Maraninchi
    • John Regehr
    • Lothar Thiele

    Nomination Process

    Nominations will be solicited annually, being due March 1st each year, via major mailing lists and web forums. Additionally, dissertation advisers of each eligible year will be contacted for solicitation of award nominations.

    A nomination should consist of the following items:
    • Name, address, phone number, and email address of the person making the nomination (the nominator).
    • Name, address, phone number, and email address of the candidate for whom an award is recommended (the nominee).
    • A short statement (200-500 words) explaining why the nominee deserves the award.
    • Supporting statements from up to two persons in addition to the nominator. 
    • The nominated dissertation in an English language version.
    • A list of the nominee's publications that were used as the basis of chapters in the nominated dissertation.
    • The CV of the nominee.
    The selection committee will make a recommendation on the winner of the award to the SIGBED Executive Committee, which will approve and announce the final winner. SIGBED Executive Committee members who have conflicts of interest with any nominee will be excluded from the approval process. The primary selection criterion will be the quality of the candidate's work, with the aim to recognize outstanding doctoral dissertations. The selection committee may choose to issue no award in a given year. The award may not be given to multiple recipients.

    Nomination Deadline

    The nomination should be sent by email to paul-caspi-award@googlegroups.com by March 1, 2015.
    0

    Add a comment

Loading