|* ALGOSENSORS 2017||2017-06-01||https://algo2017.ac.tuwien.ac.at/algosensors/|
|* WiNTECH 2017||2017-06-15||http://peng.cse.ohio-state.edu/wintech2017|
|* STM 2017||2017-06-17||http://stm2017.di.unimi.it|
|* CECC 2017||2017-06-19||https://www.fvv.um.si/cecc2017/|
|* SPIFEC 2017||2017-06-30||https://www.nics.uma.es/pub/spifec|
|* SoCC 2017 - Posters||2017-07-13||https://acmsocc.github.io/2017/posters.html|
|* WPES '17||2017-08-04||https://cs.pitt.edu/wpes2017|
|* SysTEX 2017||2017-08-31||https://systex17.ibr.cs.tu-bs.de|
NEW THIS MONTH!
|Title:||13th International Symposium on Algorithms and Experiments for Wireless Sensor Networks|
|Dates:||September 7-8, 2017|
|* DEADLINE EXTENSION ALGOSENSORS is an international symposium dedicated to the algorithmic aspects of wireless networks. Originally focused on sensor networks, it now covers algorithmic issues arising in wireless networks of all types of computational entities, static or mobile, including sensor networks, sensor-actuator networks, autonomous robots. The focus is on the design and analysis of algorithms, models of computation, and experimental analysis.|
|Title:||8th ACM SIGOPS Asia-Pacific Workshop on Systems|
|Dates:||September, 2-3, 2017|
|Location:||Indian Institute of Technology Bombay, Mumbai, India|
|The Eighth ACM SIGOPS Asia-Pacific Workshop on Systems (APSys 2017) will be held in Mumbai at the Indian Institute of Technology Bombay on 2nd & 3rd September 2017. APSys 2017 will continue to be a lively forum for systems researchers and practitioners across the world to meet, interact, and collaborate with their peers from the Asia/Pacific region.|
NEW THIS MONTH!
|Title:||The 11th ACM Workshop on Wireless Network Testbeds, Experimental evaluation & CHaracterization (WiNTECH 2017)|
|Dates:||October, 16, 2017|
|Location:||Snowbird, Utah, US|
|ACM WiNTECH has advanced to its second decade as one consolidated tradition for bringing together an important number of researchers and industry players working in different aspects of experimental wireless communications. The workshop will continue to serve as a forum for sharing new ideas and experiences gathered across all experimental aspects of wireless networks and systems, such as the methodological and technical issues that have to be faced for defining, running, controlling and benchmarking experiments on wireless solutions. The workshop will also facilitate discussions of key unresolved challenges and emerging problems in the field, such as new laboratory methodologies, key real-life limitations of current and novel wireless technologies that have emerged over the past few years, as well as key challenges facing the wireless networking of the future.|
NEW THIS MONTH!
|Title:||13th International Workshop on Security and Trust Management (STM 2017)|
|Dates:||September 14-15, 2017|
|STM (Security and Trust Management) is a working group of ERCIM (European Research Consortium in Informatics and Mathematics). STM 2017 is the thirteenth workshop in this series and will be held in Oslo, Norway, in conjunction with the 22nd European Symposium On Research in Computer Security (ESORICS 2017).|
NEW THIS MONTH!
|Title:||Central European Cybersecurity Conference|
|Dates:||November, 16-17, 2017|
|The Central European Cybersecurity Conference – CECC 2017 aims at establishing a venue for the exchange of information on cybersecurity and its many aspects in central Europe. CECC 2017 encourages the dialogue between researchers of technical and social aspects of cybersecurity, both crucial in attaining adequate levels of cybersecurity. Complementary contributions dealing with its economic aspects as well as any legal, investigation or other issues related to cybersecurity are welcome, too.|
NEW THIS MONTH!
|Title:||1st European Workshop on Security and Privacy in Fog and Edge Computing (In conjunction with ESORICS 2017)|
|Dates:||September, 14-15, 2017|
|The main goal of Fog Computing and other related Edge paradigms, such as Multi-Access Edge Computing, is to decentralize the Cloud and bring some of its services closer to the edge of the network, where data are generated and decisions are made. Cloud-enabled edge platforms will be able to cooperate not only with each other but with the cloud, effectively creating a collaborative and federated environment. This paradigm shift will fulfill the needs of novel services, such as augmented reality, that have particularly stringent requirements like extremely low latency. It will also help improve the vision of the Internet of Things by improving its scalability and overall functionality, among other benefits. To enable this vision, a number of platforms and technologies need to securely coexist, including sensors and actuators, edge-deployed systems, software-defined networks, hardware virtualization, data mining mechanisms, etc. However, this paradigm shift calls for new security challenges and opportunities to leverage services for new scenarios and applications. The field of edge computing security is almost unexplored, and demands further attention from the research community and industry in order to unleash the full potential of this paradigm.|
|Title:||7th International Symposium on Secure Virtual Infrastructures -- Cloud and Trusted Computing|
|Dates:||10, 23-24, 2017|
|Cloud and Trusted Computing (C&TC 2017) is the 7th International Symposium on Cloud Computing, Trusted Computing and Secure Virtual Infrastructures, organized as a component conference of the OnTheMove Federated Conferences & Workshops. C&TC 2017 will be held in Rhodes, Greece. The conference solicits submissions from both academia and industry presenting novel research in the context of Cloud Computing, Big Data, and IoT, presenting theoretical and practical approaches to cloud, big data, and IoT trust, security, privacy and risk management. The conference will provide a special focus on the intersection between cloud paradigm, big data analytics, and IoT integration, bringing together experts from the three communities to discuss on the vital issues of trust, security, privacy and risk management in Cloud Computing, shedding the light on novel issues and requirements in big data and IoT domains. Potential contributions could cover new approaches, methodologies, protocols, tools, or verification and validation techniques. We also welcome review papers that analyze critically the current status of trust, security, privacy and risk management in the cloud, big data, and IoT. Papers from practitioners who encounter trust, security, privacy, and risk management problems, and seek understanding are finally welcome.|
|Title:||1st DeepSpec Summer School on Verified Systems|
|Dates:||July, 13-28, 2017|
|Can critical systems be built with no bugs in hardware, operating systems, compilers, crypto, and other key components? It may seem a pipe dream, but the past decade has seen explosive advances in the technology required to realize it. This summer school aims to give participants a wide-ranging overview of several ambitious projects currently underway in this space. Participants will complete the summer school with a thorough understanding of the conceptual underpinnings of these projects plus considerable hands-on experience with state-of-the-art tools for building verified systems.|
NEW THIS MONTH!
SoCC 2017 - Posters
|Title:||ACM Symposium on Cloud Computing 2017 - Posters|
|Dates:||September, 25-27, 2017|
|Location:||Santa Clara, California, USA|
|The SoCC poster sessions showcase works-in-progress in an informal setting. Topics of interest are the same as the research topics in the SoCC conference call for papers (https://acmsocc.github.io/2017/papers.html). Accepted proposals will be published in the conference proceedings. While anyone can submit a proposal, preference will be given to posters where the primary contribution is from one or more students or from an industry/start-up organization. Students must present student posters at the conference. An award will be given to the best overall student and industry/start-up poster, judged during the conference. Submissions to the conference paper track are also automatically considered for a poster, so there is no need to submit a separate poster proposal.|
NEW THIS MONTH!
|Title:||2017 Workshop on Privacy in the Electronic Society|
|Dates:||October 30, 2017|
|Location:||Dallas, TX, USA|
|The need for privacy-aware policies, regulations, and techniques has been widely recognized. This workshop discusses the problems of privacy in the global interconnected societies and possible solutions. The 2017 Workshop, held in conjunction with the ACM CCS conference, is the sixteenth in a yearly forum for papers on all the different aspects of privacy in today's electronic society. The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of electronic privacy, as well as experimental studies of fielded systems. We encourage submissions from other communities such as law and business that present these communities' perspectives on technological issues. Topics of interest include, but are not limited to, anonymization and trasparency, crowdsourcing for privacy and security, data correlation and leakage attacks, data security and privacy, data and computations integrity in emerging scenarios, electronic communication privacy, economics of privacy, information dissemination control, models, languages, and techniques for big data protection, personally identifiable information, privacy-aware access control, privacy and anonymity on the web, privacy in biometric systems, privacy in cloud and grid systems, privacy and confidentiality management, privacy and data mining, privacy in the Internet of Things, privacy in the digital business, privacy in the electronic records, privacy enhancing technologies, privacy and human rights, privacy in health care and public administration, privacy metrics, privacy in mobile systems, privacy in outsourced scenarios, privacy policies, privacy vs. security, privacy of provenance data, privacy in social networks, privacy threats, privacy and virtual identity, user profiling, and wireless privacy.|
NEW THIS MONTH!
|Title:||2nd Workshop on System Software for Trusted Execution (SysTEX 2017)|
|Dates:||Oct, 28, 2017|
|With the rise of new hardware extensions that permit fine-grained and flexible trusted execution, we need appropriate systems support that makes trusted execution environments (TEEs) such as Intel's Software Guard Extensions (SGX) or ARM's TrustZone conveniently usable by application developers. The 2nd Workshop on System Software for Trusted Execution (SysTEX) will focus on systems research challenges related to TEEs, and explore new ideas and strategies for the implementation of trustworthy systems with TEEs.|
|Title:||IEEE Wireless Communications and Networking Conference (IEEE WCNC 2018)|
|Dates:||April 16-18, 2018|
|IEEE WCNC is the only IEEE conference focused exclusively on wireless research, technology, and applications. It brings together thought leaders from industry, academia, government agencies and other institutions to exchange information and ideas on advancing the state-of-the-art in wireless communications and networking. The conference will feature a comprehensive technical program with technical tracks on various aspects related to wireless research, technology, applications and services, including emerging technologies. In addition, the conference program includes workshops, tutorials, and panel discussions on today’s state-of-the-art as well as what the wireless future will look like, including an industry-oriented program and exhibition hall.|
|Title:||SIGOPS Hall of Fame Award 2017|
The SIGOPS Hall of Fame Award was instituted in 2005 to recognize the most influential Operating Systems papers that were published at least ten years in the past. Starting in 2016, SIGOPS will select 1-2 papers annually, restricted to papers that appeared, in any form of publication, 10-11 years previously -- specifically, between 1 October in year (X-11) and 30 September in year (X-9). The selection committee for these awards is made up of the program chairs / co-chairs of the SOSP/OSDI conferences which were held within that 10-11 year timeframe. See https://www.sigops.org/award-hof.html for more information. The decision will be based on a discussion that considers the impact the paper (and more generally of the research described in the paper) has had on the field of operating systems research. The Award committee will prepare a short statement that describes why the paper was selected. In 2017, operating systems papers that were published between 1 October 2006 and 30 September 2008 are eligible for nomination, and the selection committee consists of Brian Bershad, Frans Kaashoek, and Jeff Mogul. The award winners will be announced at SOSP 2017. To nominate an eligible paper, please fill out the online form at <https://goo.gl/forms/805r4t0vJuNNhtOI2>. Nominations must be received on or prior to July 31, 2017, in any timezone. You may address questions and comments to the selection committee via HOFnominations (at) sigops.org, but we cannot accept nominations via that email address.