posted by organizer: goeschka || 6314 views || tracked by 5 users: [display]

ACM DADS 2019 : ACM Dependable, Adaptive, and Trustworthy Distributed Systems

FacebookTwitterLinkedInGoogle

Link: http://www.dedisys.org/sac19/
 
When Apr 8, 2019 - Apr 12, 2019
Where Limassol, Cyprus
Submission Deadline Sep 10, 2018
Notification Due Nov 10, 2018
Final Version Due Nov 25, 2018
Categories    distributed systems   dependability   adaptiveness   security
 

Call For Papers

CALL FOR PAPERS
===============

+--------------------------------------------------------------------------------+
| 14th Track on Dependable, Adaptive, and Trustworthy Distributed Systems (DADS) |
| of the 34th ACM Symposium on Applied Computing (SAC'19) |
+--------------------------------------------------------------------------------+

April 8 - 12, 2019
Limassol, Cyprus
http://www.dedisys.org/sac19/
https://www.sigapp.org/sac/sac2019/

Accepted papers will be published in the ACM conference proceedings and will be included in the ACM digital library.

Important Dates:
Paper submission: September 10, 2018
Author notification: November 10, 2018
Camera-ready copies: November 25, 2018

Authors are invited to submit original work not previously published, nor currently submitted elsewhere. Authors submit full papers in pdf format using the link to the submission site at http://www.dedisys.org/sac19/. Authors are allowed up to 10 pages, but with more than 8 pages in the final camera ready, there will be a charge of 80USD per extra page.

Call details
============
While computing is provided by the cloud and services increasingly pervade our daily lives, dependability, adaptiveness and security become a cornerstone of the information society. Unfortunately, most innovative systems and applications (Internet of Things, Industrial IoT, Smart Environments, Mashups, NewSQL) suffer from a lack of dependability and security, which is fueled by global scale, mobility and heterogeneity, as well as the demand for resource awareness, green computing, and increasing cost pressure.

Among technical factors, software development methods, tools, and techniques contribute to dependability and security, as defects in software products and services may lead to failure and also provide typical access for malicious attacks. In addition, there is a wide variety of fault and intrusion tolerance techniques available, including persistence provided by databases, redundancy and replication, group communication, transaction monitors, reliable middleware, cloud infrastructures, light-weight virtualization (docker), fragmentation-redundancy-scattering, and trustworthy service-oriented architectures with explicit control of quality of service properties and service level agreements.

Furthermore, adaptiveness is envisaged in order to react to observed, or act upon expected changes of the system itself, the context/environment (e.g., resource variability or failure/threat scenarios) or users' needs and expectations. Provided without explicit user intervention, this is also termed autonomous behavior or self-properties, and often involves monitoring, diagnosis (analysis, interpretation), and reconfiguration (repair). In particular, adaptation is also a means to achieve dependability and security in a computing infrastructure with dynamically varying structure and properties and can itself be provided as a service (Control-as-a-service).

Topics of interest
==================

* Dependable, Adaptive, and Trustworthy Distributed Systems (DADS)
* Architectures, architectural styles, and middleware for DADS
* Protocols for DADS
* Modeling, design, and engineering of DADS
* Foundations and formal methods for DADS
* Applications of DADS
* Evaluations, testing, benchmarking, and case studies of DADS
* Holistic aspects of DADS

Track program co-chairs
===============
Karl M. Goeschka, Vienna University of Technology (Austria)
(main contact: dads@dedisys.org)
Rui Oliveira, Universidade do Minho (Portugal)
Peter Pietzuch, Imperial College London (UK)
Giovanni Russello, University of Auckland (New Zealand)

Program committee
=================

Filipe Araujo, University of Coimbra (Portugal)
Claudio Agostino Ardagna, University of Milan (Italy)
Jean Bacon, University of Cambridge (UK)
Alberto Bartoli, University of Trieste (Italy)
Andrea Bondavalli, University of Florence (Italy)
Antonio Casimiro, Universidade de Lisboa (Portugal)
Mauro Conti, Universita di Padova (Italy)
Gianpaolo Cugola, Politecnico di Milano (Italy)
Rogerio De Lemos, University of Kent (UK)
Felicita Di Giandomenico, ISTI-CNR, Pisa (Italy)
Naranker Dulay, Imperial College London (UK)
Frank Eliassen, University of Oslo (Norway)
Lorenz Froihofer, A1 Telekom Austria (Austria)
Kurt Geihs, Universität Kassel (Germany)
Nikolaos Georgantas, INRIA (France)
Vincenzo Gulisano, Chalmers University (Sweden)
Matti Hiltunen, AT&T Labs (USA)
Shanshan Jiang, SINTEF (Norway)
Mikel Larrea, Euskal Herriko Unibersitatea (Spain)
Michaël Lauer, LAAS-CNRS, Toulouse (France)
Mark Little, JBoss (UK)
István Majzik, Budapest UTE. (Hungary)
Matteo Migliavacca, University of Kent (UK)
Alberto Montresor, University of Trento (Italy)
Gero Mühl, University of Rostock (Germany)
Francesc Daniel Muñoz-Escoí, UP Valencia (Spain)
Fernando Pedone, Università della Svizzera Italiana (Switzerland)
Jose Pereira, Universidade do Minho (Portugal)
Barry Porter, Lancaster University (UK)
Luís Rodrigues, INESC-ID/IST (Portugal)
Romain Rouvoy, INRIA (France)
Matthieu Roy, LAAS-CNRS, Toulouse (France)
Alirio Sá, Federal University of Bahia (Brazil)
Valerio Schiavoni, Université de Neuchâtel (Switzerland)
Elad Schiller, Chalmers University (Sweden)
Stefan Tai, Information Systems Engineering, TU Berlin (Germany)
Elena Troubitsyna, Åbo Akademi University (Finland)
Eddy Truyen, Katholieke Universiteit Leuven (Belgium)
Sara Tucci Piergiovanni, CEA - LIST, Saclay (France)
Ricardo Vilaça, Universidade do Minho (Portugal)
Roman Vitenberg, University of Oslo (Norway)
Nicola Zannone, Technical University of Eindhoven (Netherlands)
Uwe Zdun, Vienna University (Austria)

Related Resources

DADS 2025   ACM Dependable, Adaptive, and Secure Distributed Systems
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
DEBS 2025   The 19th ACM International Conference on Distributed and Event-Based Systems (DEBS 2025)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
Middleware 2025   26th ACM/IFIP International Middleware Conference
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
COIT 2025   5th International Conference on Computing and Information Technology
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
SECRYPT 2025   22nd International Conference on Security and Cryptography