Key Dates Full Papers

Submissions Deadline

January 24, 2019 AOE
January 14, 2019 AOE

Author Notification

March 4, 2019

Camera-Ready Papers Due

March 25, 2019
March 31, 2019

Early Registration Deadline

April 7, 2019
Registration Information

Key Dates Posters

Submissions Deadline

March 11, 2019
March 21, 2019

Author Notification

March 26, 2019

Camera-Ready Papers Due

April 1, 2019

Early Registration Deadline

April 7, 2019
Registration Information


Submission

Submit your poster paper here

Submit your paper here


Download CFP

TXT Format

Download CFPosters

TXT Format


Sponsors


Previous Conferences

2018, 2017, 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007, 2006, 2005, 2004


General Co-Chairs

Francesca Palumbo
Università degli Studi di Sassari, IT
Michela Becchi
North Carolina State University, US

Program Co-Chairs

Martin Schulz
Technical University of Munich, DE
Kento Sato
RIKEN R-CCS, JP




For more information, visit the website at www.computingfrontiers.org

Workshops

Computing Frontiers 2019 will feature two co-located workshops. Submission of papers to the workshops is handled separately from the main conference. Please refer to the websites of the workshops for submission deadlines and more details.

Please note that the Workshop on Sensor Data Fusion and Machine Learning for the Next Generation of Cyber-Physical Systems (SeFuMAL '19) has been cancelled.

5th Workshop on Design of Low Power EMbedded Systems (LP-EMS '19)

Aim and Scope:
The design of embedded and cyber-physical systems imposes challenging and conflicting constraints and requires a holistic design approach. Implementing real-time high-performance systems and minimizing their power consumption at the same time is not straightforward. Emerging computing paradigms based on machine learning, brain-inspired computing and onboard data analytics impose workloads many orders of magnitude more challenging. At the same time, real-world unpredictable behaviour requires these systems to adapt at runtime to mutable conditions. Therefore, advanced modelling strategies as well as efficient design automation techniques should be capable of optimizing complex parallel applications over heterogeneous multi- and many-cores platforms. Complexity on algorithmic side and heterogeneity on hardware side are colliding system constraints, which can be tackled by adopting HW/SW co-design solutions and flexible design frameworks.

With respect to this context, contributions are expected in all the fields relevant to the design of embedded and cyber-physical systems:

  • low power embedded and cyber-physical systems
  • low power hardware and architectures for embedded signal processing and machine learning
  • HW/SW co-design and high-level synthesis techniques for low-power digital signal/image processing
  • design of energy-aware and autonomous systems
  • design space exploration techniques, with special emphasis on power/energy estimations and power minimization methodologies
  • parallel/high throughput processing techniques for low-power digital signal/image processing
  • algorithm-level optimization, low-complexity algorithms and approximate computing for low power embedded systems
  • dynamic voltage and frequency scaling techniques, HW and SW dynamic power management

Workshop Website: http://lpems.insa-rennes.fr/

Malicious Software and Hardware in Internet of Things (MaL-IoT '19)

Aim and Scope:
Cyber-physical and smart embedded systems, already highly networked, will be even more connected in the near future to form the Internet of Things, handling large amount of private and safety critical data. The pervasive diffusion of these devices will create several threats to privacy and could open new possibilities for attackers, since the security of even large portions of the Internet of Things could be harmed by compromising a reduced number of components. The possibility of securely updating devices should be guaranteed and it should be possible to verify and assert the root of trust of components. With respect to this context we expect contributions in different areas of security in Internet of Things. Topics of the workshop include but are not limited to:

  • Malicious firmware design and detection
  • Malware in Internet of Things applications
  • Hardware root of trust
  • Privacy issues of smart-home systems and complex systems
  • Hardware Trojans and their effects on systems
  • Hardware authentication and IP protection
  • Secure communication and key-management
  • Implementation attacks and countermeasures
  • Emerging threats and attack vectors in the Internet of Things
  • Supply chain security

Workshop Website: http://mal-iot2019.alari.ch/



Sponsors