Call For Papers
The next ACM International Conference on Computing Frontiers will take place on May 9th - 11th, 2023. Computing Frontiers 2023 will be held in person in the town of Bologna, Italy.
Computing Frontiers is an eclectic, interdisciplinary, collaborative community of researchers who investigate emerging technologies in the broad field of computing: our common goal is to drive the scientific breakthroughs that support society.
CF's broad scope is driven by recent technological advances in wide-ranging fields impacting computing, such as novel computing models and paradigms, advancements in hardware, network and systems architecture, cloud computing, novel device physics and materials, new application domains of artificial intelligence, big data analytics, wearables and IoT. The boundaries between the state-of-the-art and revolutionary innovation constitute the advancing frontiers of science, engineering, and information technology — and are the CF community focus. CF provides a venue to share, discuss, and advance broad, forward-thinking, early research on the future of computing and welcomes work on a wide spectrum of computer systems, from embedded and hand-held/wearable devices to supercomputers and datacenters.
We seek original research contributions at the frontiers of a wide range of topics, including novel computational models and algorithms, new application paradigms, computer architecture (from embedded to HPC systems), computing hardware, memory technologies, networks, storage solutions, compilers, and environments.
- Innovative Computing Approaches, Architectures, Accelerators, Algorithms, and Models
- Approximate, analog, inexact, probabilistic computing
- Neuromorphic, biologically-inspired computing, and hyperdimensional computing
- Dataflow architectures, near-data, and in-memory processing
- Quantum computing systems, including algorithms and applications for near-term quantum devices, programming models and compilers, and error correction
- Benchmarks, methods, and performance metrics to evaluate innovative computing approaches
- Physics-based models of computation
- Technological Scaling Limits and Beyond
- Limits: Defect- and variability-tolerant designs, graphene and other novel materials, nanoscale design, dark silicon
- Extending past Moore's law: 3D-stacking, heterogeneous architectures and accelerators, chiplets, distributed and federated computing and their challenges
- Efficient AI computing
- Deep learning co-processors including architectures, efficient algorithms, chip design and hardware-software codesign, frameworks and programming models
- Edge deep learning for IoT
- Distributed AI computing for cloud data servers
- Embedded, IoT, and Cyber-Physical Systems
- Ultra-low power designs, energy scavenging
- Physical security, attack detection and prevention
- Reactive, real-time, scalable, reconfigurable, and self-aware systems
- Sensor networks, IoT, and architectural innovation for wearable computing
- Large-Scale System Design and Networking
- Large-scale homogeneous/heterogeneous architectures and networking
- System-balance and CPU-offloading
- Power- and energy-management for clouds, data centers, and exascale systems
- Big Data analytics and exascale data management
- System Software, Compiler Technologies, and Programming Languages
- Technologies that push the limits of operating systems, virtualization, and container technologies
- Large scale frameworks for distributed computing and communication
- Resource and job management, scheduling and workflow systems for managing large-scale heterogeneous systems
- Compiler technologies: hardware/software integrated solutions, high-level synthesis, compilers for heterogeneous architectures
- Tools for analyzing and managing performance at large scale
- Novel programming approaches
- Fault Tolerance and Resilience
- Solutions for ultra-large and safety-critical systems (e.g., infrastructure, airlines)
- Hardware and software approaches in adverse environments such as space
- Methods, system support, and hardware for protecting against malicious code
- Real-time implementations of security algorithms and protocols
- Quantum and post-quantum cryptography
- Computers and Society
- Artificial Intelligence (AI) ethics and AI environmental impact
- Education, health, cost/energy-efficient design, smart cities, emerging markets, and interdisciplinary applications
We strongly encourage submissions in emerging fields that may not fit into traditional categories — if in doubt, please contact the PC co-chairs by email.
We also strongly encourage submissions in emerging fields that may not fit into traditional categories — if in doubt, please contact the PC co-chairs by email.
Short papers may be position papers or may describe preliminary or highly speculative work. Full papers are a maximum of eight (8) (excluding references) and short papers are a maximum of four (4) (including references) double-column pages in ACM conference format. Authors may buy up to two (2) extra pages for accepted full papers. Page limits include figures, tables and appendices, but exclude references for full papers. As the review process is double-blind, removal of all identifying information from paper submissions is required (i.e., cite own work in third person). Papers not conforming to the above submission policies on formatting, page limits and the removal of identifying information, will be automatically rejected. Authors are strongly advised to submit their papers with the final list of authors in the submission system, as changes may not be feasible at later stages.
By submitting your article to an ACM Publication, you are hereby acknowledging that you and your co-authors are subject to all ACM Publications Policies, including ACM's new Publications Policy on Research Involving Human Participants and Subjects. Alleged violations of this policy or any ACM Publications Policy will be investigated by ACM and may result in a full retraction of your paper, in addition to other potential penalties, as per ACM Publications Policy.
No-show policy: Any accepted papers are expected to be presented in-person at the conference and at least one full registration is required from a submission author for each accepted paper. A no-show of papers will result in exclusion from the ACM digital library proceedings. If circumstances arise such that authors are unable to present their papers at the conference, they must contact the PC co-chairs, they must contact the PC co-chairs with a proposal for a replacement presenter.
Stage 1 - Paper submission: The short or full papers must be submitted by January 27th, 2023 (AoE).
Stage 2 - Authors Notifications: March 17th, 2023.
Stage 3 - Camera Ready: March 24th, 2023 .
The CF23 Organizing Committee strongly encourages authors on a voluntary basis to present the Artifact Evaluation documentation to support their scientific results. The Artifact Evaluation is run by a different committee after the acceptance of the paper and does not affect the paper evaluation itself.
Authors may submit the artifact during the submission period or after the notification. To arrange the CF23 AE Committee and the necessary computing resources, authors are invited to flag the option during the paper registration if they are willing to participate in the evaluation.
CF23 adopts the ACM Artifact Review and Badging (Version 1.1 - August 24, 2020). By "artifact", we mean a digital object that was either created by the authors to be used as part of the study or generated by the experiment itself. Typical artifacts may include system description or scripts to install the environment or reproduce specific experiments. Authors are invited to include a one-page appendix to the main paper (after the references). The appendix does not count in the page limit.
To prepare the Appendix, authors may refer to the following guide https://ctuning.org/ae/checklist.html to avoid common mistakes.
A Latex template can be found at the following link: https://github.com/ctuning/ck-artifact-evaluation/blob/master/wfe/artifact-evaluation/templates/ae.tex
The Artifact Evaluation (AE) Committee will reproduce the paper by following the instructions included in the appendix and verify ACM roles for assigned badges. For example, in order to have a paper with an Artifact Available badge, the code and data should be stored in a permanent archive with a DOI or another unique identifier.
Authors may be invited by the AE Committee to revise their instructions according to their feedback. At the end of the process, AE Committee will recommend one or more badges to assign to the paper among those supported by the ACM reproducibility policy.