HiperIO'08 | |
Title: | Second International Workshop on High Performance I/O Systems and Data Intensive Computing within IEEE Cluster 2008 |
Submission Deadline: | 2008-05-05 |
Webpage: | http://www.arcos.inf.uc3m.es/~jdaniel/hiperio08/ |
Dates: | October, 1, 2008 |
Location: | Tsukuba, Japan |
Contact Email: | josedaniel.garcia@uc3m.es |
Synopsis: |
In this workshop we will address theoretical and practical issues related to new solutions trying to solve the I/O problem in large systems scale high-performance I/O systems, and also the practical issues associated with the deployment of very large scale I/O systems in HPC centers. The goal is to identify, discuss, and share the barriers and workarounds that have been discovered. |
USENIX ATC Poster | |
Title: | USENIX Annual Technical Conference Poster Session 2008 |
Submission Deadline: | 2008-05-06 |
Webpage: | http://www.usenix.org/events/usenix08/cfp/posters.html |
Dates: | June 25–27, 2008 |
Location: | Boston, MA |
Contact Email: | usenix08posters@usenix.org |
Synopsis: |
Is your project the next big thing? Do you have an outrageous opinion? Are you looking for feedback on early work? The USENIX ATC Poster Session is an excellent forum to discuss your work and get feedback from the community. The poster session, held in conjunction with a reception, will allow researchers to present recent and ongoing projects in a constructive and friendly atmosphere. More information, including submission instructions, can be found at http://www.usenix.org/events/usenix08/cfp/posters.html Deadline is May 6, 2008. |
NEW THIS MONTH! | AdhocAmC 2008 |
Title: | 1st International Workshop on Ad hoc Ambient Computing (AdhocAmC'08) |
Submission Deadline: | 2008-05-23 |
Webpage: | http://www-sop.inria.fr/mascotte/adhocnow/AC/index.html |
Dates: | September, 13, 2008 |
Location: | Sophia Antipolis, France |
Contact Email: | nikolaos.georgantas@inria.fr |
Synopsis: |
AdhocAmC'08 is organized in conjunction with ADHOC-NOW, the 7th International Conference on Ad-hoc Networks and Wireless. The aim of the workshop is to investigate the contribution of ad hoc networks to ambient computing, from supporting algorithms and protocols to emerging computing paradigms and software architectures. Ambient/pervasive computing is a drastic shift for computing systems, where networked resources become invisible to users and cooperatively provide them with the right services at the right time. Ad hoc networks are wireless infrastructureless systems dynamically formed by co-operating nodes within communication range of each other, thus being an attractive networking paradigm for ambient computing. |
NEW THIS MONTH! | StorageSS '08 |
Title: | 4th ACM International Workshop on Storage Security and Survivability (StorageSS'08) |
Submission Deadline: | 2008-05-23 |
Webpage: | http://storagess.org/2008/ |
Dates: | October, 31, 2008 |
Location: | Fairfax, VA |
Contact Email: | chair08@storagess.org |
Synopsis: |
The 4th ACM International Workshop on Storage Security and Survivability (StorageSS 2008) will bring together researchers in storage systems, computer and network security, and cryptography. We encourage paper submissions from both research and industry presenting novel ideas on all theoretical and practical aspects of protecting data in storage and file systems. |
NEW THIS MONTH! | VMSec 2008 |
Title: | 1st Workshop on Virtual Machine Security (VMSec) |
Submission Deadline: | 2008-06-02 |
Webpage: | http://csis.gmu.edu/VMSec/ |
Dates: | October 31, 2008 |
Location: | George Mason University - In conjunction with the ACM Conference on Computer & Communications Security |
Contact Email: | vmsec08@easychair.org |
Synopsis: |
This workshop, the first of its kind to deal exclusively with virtual machine security, will tackle the important research topics in virtualization security. Virtualization has seen an explosion in growth in deployment, implementations, and applications. Virtualization holds unique properties that make it attractive for security including isolation, compartmentalization, live state capture, and replay. Virtualization has been used to study malicious software as well as to prevent malicious software infection. We aims to bring together leading researchers in the fields of virtualization and security to present the latest work on these topics. |
NEW THIS MONTH! | WESS'2008 |
Title: | 3-rd Workshop on Embedded Systems Security |
Abstract Deadline: | 2008-06-13 |
Submission Deadline: | 2008-06-20 |
Webpage: | http://www.ece.upatras.gr/wess/2008/ |
Dates: | October 23, 2008 |
Location: | Atlanta, Georgia, USA |
Contact Email: | d.serpanos@upatras.gr |
Synopsis: |
Embedded systems are widely adopted in applications ranging from safety-critical to information management systems. Their characteristics and their increasing Internet connectivity introduce a large number of security issues, since they are vulnerable to remote intrusion, side-channel attacks, hijacking, etc. WESS provides a forum for presentation of novel ideas addressing Embedded system security. Topics include, but are not limited to: - Security architectures for embedded systems - Security of Internet-enabled embedded systems - Security planning and provisioning in embedded systems - Power-related, timing-related and novel attacks and countermeasures - Sensor network security - Benchmarks for embedded system security - Case studies |
NEW THIS MONTH! | DECENTRALIZED SELF MANAGEMENT |
Title: | Workshop on DECENTRALIZED SELF MANAGEMENT FOR GRIDS, P2P, AND USER COMMUNITIES |
Submission Deadline: | 2008-07-05 |
Webpage: | http://www.ist-selfman.org/wiki/index.php/SelfmanWorkshop |
Dates: | October 20-21 2008 |
Location: | Isola di San Servolo (Venice), Italy |
Contact Email: | marc.shapiro@acm.org |
Synopsis: |
This workshop examines issues of decentralized self management as they relate to information and resource sharing for user communities, i.e.: * Peer-to-peer techniques such as structured overlay networks * Self-adaptive techniques such as feedback loop architectures * Agoric systems, collective intelligence, and game theory * Decentralized distributed algorithms * Autonomic networking techniques applied to: * Virtual organizations * Collaborative and social applications * Computer-supported cooperative work, collaborative editing, code management tools, or co-operative engineering * Data replication, distributed file systems or distributed databases * Security and confidentiality in distributed systems |
, SIGOPS Information Director