Key Dates Full Papers
Submissions Deadline
January 24, 2019 AOE
January 14, 2019 AOE
Author Notification
March 4, 2019
Camera-Ready Papers Due
March 25, 2019
March 31, 2019
Early Registration Deadline
April 7, 2019
Registration Information
Key Dates Posters
Submissions Deadline
March 11, 2019
March 21, 2019
Author Notification
March 26, 2019
Camera-Ready Papers Due
April 1, 2019
Early Registration Deadline
April 7, 2019
Registration Information
Submission
Submit your poster paper
here
Submit your paper
here
Previous Conferences
2018,
2017,
2016,
2015,
2014,
2013,
2012,
2011,
2010,
2009,
2008,
2007,
2006,
2005,
2004
General Co-Chairs
Francesca Palumbo
Università degli Studi di Sassari, IT
Michela Becchi
North Carolina State University, US
Program Co-Chairs
Martin Schulz
Technical University of Munich, DE
Kento Sato
RIKEN R-CCS, JP
For more information,
visit the website at
www.computingfrontiers.org
Workshops
Computing Frontiers 2019 will feature two co-located workshops. Submission
of papers to the workshops is handled separately from the main conference.
Please refer to the websites of the workshops for submission deadlines and
more details.
Please note that the Workshop on Sensor Data Fusion and Machine Learning for the Next Generation of Cyber-Physical Systems (SeFuMAL '19) has been cancelled.
5th Workshop on Design of Low Power EMbedded Systems (LP-EMS '19)
Aim and Scope:
The design of embedded and cyber-physical systems imposes challenging and
conflicting constraints and requires a holistic design approach. Implementing
real-time high-performance systems and minimizing their power consumption at
the same time is not straightforward. Emerging computing paradigms based on
machine learning, brain-inspired computing and onboard data analytics impose
workloads many orders of magnitude more challenging. At the same time,
real-world unpredictable behaviour requires these systems to adapt at runtime
to mutable conditions. Therefore, advanced modelling strategies as well as
efficient design automation techniques should be capable of optimizing complex
parallel applications over heterogeneous multi- and many-cores platforms.
Complexity on algorithmic side and heterogeneity on hardware side are colliding
system constraints, which can be tackled by adopting HW/SW co-design solutions
and flexible design frameworks.
With respect to this context, contributions are expected in all the fields
relevant to the design of embedded and cyber-physical systems:
- low power embedded and cyber-physical systems
- low power hardware and architectures for embedded signal processing
and machine learning
- HW/SW co-design and high-level synthesis techniques for low-power
digital signal/image processing
- design of energy-aware and autonomous systems
- design space exploration techniques, with special emphasis on
power/energy estimations and power minimization methodologies
- parallel/high throughput processing techniques for low-power digital
signal/image processing
- algorithm-level optimization, low-complexity algorithms and
approximate computing for low power embedded systems
- dynamic voltage and frequency scaling techniques, HW and SW dynamic
power management
Workshop Website: http://lpems.insa-rennes.fr/
Malicious Software and Hardware in Internet of Things (MaL-IoT '19)
Aim and Scope:
Cyber-physical and smart embedded systems, already highly networked, will be
even more connected in the near future to form the Internet of Things, handling
large amount of private and safety critical data. The pervasive diffusion of
these devices will create several threats to privacy and could open new
possibilities for attackers, since the security of even large portions of the
Internet of Things could be harmed by compromising a reduced number of
components. The possibility of securely updating devices should be guaranteed
and it should be possible to verify and assert the root of trust of components.
With respect to this context we expect contributions in different areas of
security in Internet of Things. Topics of the workshop include but are not
limited to:
- Malicious firmware design and detection
- Malware in Internet of Things applications
- Hardware root of trust
- Privacy issues of smart-home systems and complex systems
- Hardware Trojans and their effects on systems
- Hardware authentication and IP protection
- Secure communication and key-management
- Implementation attacks and countermeasures
- Emerging threats and attack vectors in the Internet of Things
- Supply chain security
Workshop Website:
http://mal-iot2019.alari.ch/