For Blackberry or Windows Phone, Click hereFor feature details, visit Whova
Key Dates Full Papers
Abstract Submission Deadline
January 28, 2021 (AoE)
January 21, 2021 (AoE)
Paper Submission Deadline
February 4, 2021 (AoE)
January 28, 2021 (AoE)
Author Notification
March 19, 2021
March 15, 2021
Final Papers Due
March 25, 2021
Submission
Submit your paper
here
Previous Conferences
2020,
2019,
2018,
2017,
2016,
2015,
2014,
2013,
2012,
2011,
2010,
2009,
2008,
2007,
2006,
2005,
2004
General Co-Chairs
Maurizio Palesi
University of Catania, IT
Antonino Tumeo
Pacific Northwest National Laboratory, USA
Program Co-Chairs
Georgios I. Goumas
National Technical University of Athens, GR
Carmen G. Almudever
Delft University of Technology, NL
For more information, visit the website at
www.computingfrontiers.org
Workshops
Computing Frontiers 2021 will feature co-located workshops. Submission
of papers to the workshops is handled separately from the main conference.
Please refer to the websites of the workshops for submission deadlines and
more details.
Malicious Software and Hardware in Internet of Things (MaL-IoT '21)
Aim and scope:
Cyber-physical and smart embedded systems, already highly networked,
will be even more connected in the near future to form the Internet of
Things, handling large amount of private and safety critical data. The
pervasive diffusion of these devices will create several threats to
privacy and could open new possibilities for attackers, since the
security of even large portions of the Internet of Things could be
harmed by compromising a reduced number of components. The possibility
of securely updating devices should be guaranteed and it should be
possible to verify and assert the root of trust of components. With
respect to this context we expect contributions in different areas of
security in Internet of Things. Topics of the workshop include but are
not limit to:
- Malicious firmware design and detection
- Malware in Internet of Things applications
- Hardware root of trust
- Privacy issues of smart-home systems and complex systems
- Hardware Trojans and their effects on systems
- Hardware authentication and IP protection
- Secure communication and key-management
- Implementation attacks and countermeasures
- Emerging threats and attack vectors in the Internet of Things
- Supply chain security
Workshop Website:
http://mal-iot2021.alari.ch/
Important Dates:
Submissions Deadline: February 20, 2021
Author Notification: March 20, 2021
Camera-Ready Papers Due: March 25, 2021
Big Data Analytics Workshop — Big Data [Special Session #3]
Aim and Scope:
Data analytics is transforming the world of science, health, commerce, defense, and social activities. Complex scientific and human systems are being designed, managed, and optimized using first-principal simulations, data science, machine learning, and graph methods. Many real-world analytic workloads are a mix of algorithms and data types best supported by different programming and parallel execution models. The composability of models and the capability of target computer systems to efficiently and transparently support the diverse model is key to achieving performance and productivity requirements of emerging real-world uses.
This workshop seeks paper on mixed data analytic workflows, algorithms, composability, optimizations, programming environments, hardware designs, and benchmark studies. Besides regular papers, extended abstracts papers describing innovative ideas related to the workshop theme are also encouraged.
Workshop Website:
https://hpc.pnl.gov/bigdaw/
Important Dates:
Submissions Deadline: February 28, 2021
Author Notification: March 20, 2021
Camera-Ready Papers Due: March 25, 2021