Difference between revisions of "DEPEND 2009"

From Openresearch
Jump to: navigation, search
(Panel proposals)
(Topics)
 
Line 41: Line 41:
 
Researchers, designers and administrators, product and service developers, and other interested persons from academia, industry, and the government are welcome and encouraged to participate with unpublished contributions in areas including, but not limited to:
 
Researchers, designers and administrators, product and service developers, and other interested persons from academia, industry, and the government are welcome and encouraged to participate with unpublished contributions in areas including, but not limited to:
  
==Topics==
+
there are always 3 pnioting back at you!As a leader and mentors it is our responsibility to ensure that our team and others on which we rely know what expectations we have and are held accountable for what they say they are going to do.  One only has time to help and grow with those who are dependable, those who are not could be left behind as the rest move forward. That is as it should be actually as a team is only as strong as its weakest link!But if we are leaders or mentors are not dependable or don't do what we expect of others then we shouldn't be surprised when we are standing alone and/or without our teams respect.What we do is ultimately up to us but all we do or don't for that matter has impact that can far out reach the matter at hand.Don't you find it difficult if not stressful to keeping depending on someone only to be let down and left doing their part in addition to what commitments you have made that others depend on you for?  I find it takes away energy from the momentum forward needed for success and in helping others and that is not in the best long or short term interest of those who are dependable and deserving.  Dream, Believe, Become  Tracey KeeferTwitter:
** Dependability facets
 
* Fundamentals on dependability
 
* Formalisms for dependability
 
* Managing and control in dependable systems
 
* Inter-system and intra-system dependability
 
* Operational and non-operational requirements
 
* Software and hardware dependability
 
* Dependability design and specification
 
* Synchronization mechanisms and dependency exception handing
 
* Data protection, recoverability, fault-tolerance
 
* Trust and dependability
 
* Static and dynamic dependability
 
* Time-oriented or time-agnostic dependability
 
* Dependability perimeter and dependability models
 
* Stability and convergence on dependable features and systems
 
* Dependability discovery
 
* Dependability control and self-management
 
* Dependability degradation of running software and services
 
 
 
** Adaptability and (self)adaptability
 
* Fundamental models and adaptability mechanisms
 
* Principles of (self)adaptability
 
* Adaptive replication models and protocols
 
* Adaptable structures and behaviors
 
* Context-aware adaptability
 
* Perceived dependability and adaptability
 
* Adaptive and reflexive models and protocols
 
* Management and control of (self)adaptable systems
 
* Platforms and tool supporting (self)adaptability
 
* Autonomic and autonomous adaptation
 
   
 
** Adaptability and dependability
 
* Dependability and adaptability for functional and non-functional features
 
* Adaptability and dependability gap
 
* Adaptability and dependability as complementing features
 
* Context-aware adaptable and dependable design
 
* Inter- and intra-systems transactions
 
* Enforcing mechanisms for application level fault tolerance
 
* Explicit and implicit control of quality of service and contracts
 
* Dependability and adaptability in cloud and autonomic computing
 
* Verification and validation of highly adaptable and dependable systems
 
* Scalability aspects in dependable and adaptable systems
 
* Research projects and topics on dependability and adaptability
 
* Standards on system dependability and adaptability
 
 
 
** Dependability and security
 
* Integration of security, dependability, and adaptability concepts
 
* Building and preserving scalable, secure and resilient architectures
 
* Security models/architectures and threat models
 
* Trade-off and negotiation of dependability and security properties
 
* Dependability modeling and dynamic management policies
 
* Verification and validation (including model checking) of dependable software architectures
 
* Real time detection and recovery capabilities against intrusions, malfunctions and failures
 
* Redundancy and reconfiguration architectures
 
* Integrated response architectures
 
* Planning of optimal configurations for anticipated operational modes
 
* Modeling of networks and Information Systems
 
* Simulation of modeled configurations
 
* Fast reconfiguration with priority to critical services
 
* Incident (including intrusion) detection and quick containment
 
 
 
** Trust and system dependability
 
* Semantics and models of trust
 
* Dynamics of trust
 
* Trust negotiation and management
 
* Trusted systems from untrusted parts
 
* Trust-based secure architectures
 
* Trust metrics assessment and threat analysis
 
* Trust in peer-to-peer and open source systems
 
* Trust in mobile networks
 
* Trust management, reputation management, and identity management
 
* Trust, security, and dependability
 
 
 
** Dependability, adaptability, and new technologies
 
* Dependability and adaptability in service oriented architectures
 
* Principles for adaptive and dependable distributed systems
 
* Dependability and adaptability in P2P and overlay systems
 
* Middleware protocols and mechanisms to support adaptability and dependability
 
* Adaptability and dependability in mobile and pervasive systems
 
* Service composition in highly dependable and adaptable environments
 
* Dynamic, loosely-coupled, and ad-hoc environments
 
* Group membership services in failure scenarios with network partitions
 
* Social networks and dependability in dynamic communities
 
* Cross-organization heterogeneity
 
  
 
==INSTRUCTION FOR THE AUTHORS==
 
==INSTRUCTION FOR THE AUTHORS==

Latest revision as of 20:03, 19 March 2013

DEPEND 2009
The Second International Conference on Dependability
Subevent of NetWare 2009
Dates 2009/06/18 (iCal) - 2009/06/23
Homepage: www.iaria.org/conferences2009/ComDEPEND09.html
Location
Location: Athens, Greece
Loading map...

Important dates
Abstracts: 2009/01/20
Submissions: 2009/01/20
Notification: 2009/02/25
Camera ready due: 2009/03/20
Table of Contents


The following coordinate was not recognized: Geocoding failed.
The following coordinate was not recognized: Geocoding failed.


The Second International Conference on Dependability

  • DEPEND 2009
  • June 18-23, 2009 - Athens, Greece

Most of critical activities in the areas of communications (telephone, Internet), energy & fluids (electricity, gas, water), transportation (railways, airlines, road), life related (health, emergency response, and security), manufacturing (chips, computers, cars) or financial (credit cards, on-line transactions), or refinery& chemical systems rely on networked communication and information systems. Moreover, there are other dedicated systems for data mining, recommenders, sensing, conflict detection, intrusion detection, or maintenance that are complementary to and interact with the former ones.

With large scale and complex systems, their parts expose different static and dynamic features that interact with each others; some systems are more stabile than others, some are more scalable, while others exhibit accurate feedback loops, or are more reliable or fault-tolerant.

Inter-system dependability and intra-system feature dependability require more attention from both theoretical and practical aspects, such as a more formal specification of operational and non-operational requirements, specification of synchronization mechanisms, or dependency exception handing. Considering system and feature dependability becomes crucial for data protection and recoverability when implementing mission critical applications and services.

Static and dynamic dependability, time-oriented, or timeless dependability, dependability perimeter, dependability models, stability and convergence on dependable features and systems, and dependability control and self-management are some of the key topics requiring special treatment. Platforms and tools supporting the dependability requirements are needed.

The international conference on dependability, DEPEND 2009, is based on the positive participation and feedback at DEPEND 2008 workshop that addressed new approaches dealing with today's limitations and potential solutions.

As a particular case, design, development, and validation of tools for incident detection and decision support became crucial for security and dependability in complex systems. It is challenging how these tools could span different time scales and provide solutions for survivability that range from immediate reaction to global and smooth reconfiguration through policy based management for an improved resilience. Enhancement of the self-healing properties of critical infrastructures by planning, designing and simulating of optimized architectures tested against several realistic scenarios is also aimed.

To deal with dependability, sound methodologies, platforms, and tools are needed to allow system adaptability. The balance dependability/adaptability may determine the life scale of a complex system and settle the right monitoring and control mechanisms. Particular challenging issues pertaining to context-aware, security, mobility, and ubiquity require appropriate mechanisms, methodologies, formalisms, platforms, and tools to support adaptability.

Improvement of the risk and crisis management in critical infrastructures is achieved by the design of new models, countermeasures, and incident management tools. These new models will help to mitigate the cascading and escalading effects induced by different kind of dependencies present in communication and information systems. Development of decision support tools for critical infrastructures should be validated by scenarios based on different case studies.

We are looking for contributions on the actual trends in coping with these new challenges within the research community and industry. We expect some lessons learnt and description of the results coming from different R&D projects (e.g., like ones in the EC 6th Framework Program), or any other worldwide initiatives. We hope we will be able to identify the gaps between the needs and today's available solutions along with new challenges and potential for future directions.

DEPEND 2009 will provide a forum for detailed exchange of ideas, techniques, and experiences with the goal of understanding the academia and the industry trends related to the new challenges in dependability on critical and complex information systems.

Researchers, designers and administrators, product and service developers, and other interested persons from academia, industry, and the government are welcome and encouraged to participate with unpublished contributions in areas including, but not limited to:

there are always 3 pnioting back at you!As a leader and mentors it is our responsibility to ensure that our team and others on which we rely know what expectations we have and are held accountable for what they say they are going to do. One only has time to help and grow with those who are dependable, those who are not could be left behind as the rest move forward. That is as it should be actually as a team is only as strong as its weakest link!But if we are leaders or mentors are not dependable or don't do what we expect of others then we shouldn't be surprised when we are standing alone and/or without our teams respect.What we do is ultimately up to us but all we do or don't for that matter has impact that can far out reach the matter at hand.Don't you find it difficult if not stressful to keeping depending on someone only to be let down and left doing their part in addition to what commitments you have made that others depend on you for? I find it takes away energy from the momentum forward needed for success and in helping others and that is not in the best long or short term interest of those who are dependable and deserving. Dream, Believe, Become Tracey KeeferTwitter:

INSTRUCTION FOR THE AUTHORS

The DEPEND 2009 Proceedings will be published by IEEE Computer Society Press and on-line via IEEE XPlore Digital Library. IEEE will index the papers with major indexes. Authors of selected papers will be invited to submit extended versions to one of the IARIA Journals.

Important deadlines

  • Submission (full paper) January 20, 2009
  • Authors notification February 25, 2009
  • Registration March 15, 2009
  • Camera ready March 20, 2009

Final author manuscripts will be 8.5" x 11" (two columns IEEE format), not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Helpful information for paper formatting can be found on the here.

Once you receive the notification of paper acceptance, you will be provided by the IEEE CS Press an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.

Poster Forum

Posters on work-in-progress are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the track/workshop preference as "POSTER : Poster Forum". Contributors are invited to submit up to four-page papers, following the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics.

Technical marketing/business/positioning presentations

The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will be published in the conference�??s CD collection, together with the regular papers. Please send your presentations to petre@iaria.org.

10 regular srmoeks were selected for the study. They were given a cycle each and asked to pedal at moderate speed, after they were abstained from nicotine intake for 15 hours. Then they were given FMRI (which refers to Functional Magnetic Resonance Imaging) scans as they were shown 60 images. Among those pictures were some showing cigarettes to stimulate the craving in srmoeks. The next study was done on the same 10 people. They were given the same FMRI scan and the same photos were shown to them again. The brain images that were captured during both the studies show a substantial difference. In the second scan reports, patients display signs that indicated they craved for a smoke.

May I be white-list please? c:My s/n is the same: HayyCaseyEvery other seervr Ive been on the people have been rude and destroy other peoples shit, Just wanting to try different seervrs.Please and thanks :3

Workshop proposals

We welcome workshop proposals on issues complementary to the topics of this conference. Your requests should be forwarded to petre@iaria.org.

Committees

I hope the chair is much more comfortable that what you had bforee. I cannot believe that your company makes you buy your own chair if you want a decent one .

DEPEND 2009 Industry Research Chairs

  • Ramendra K. Sahoo, IBM T.J. Watson Research Center - Hawthorne, USA
  • Michiaki Tatsubori, IBM Research - Tokyo Research Laboratory, Japan
  • Hans P. Zima, Jet Propulsion Laboratory/California Institute of Technology - Pasadena, USA // University of Vienna, Austria

DEPEND 2009 Technical Program Committee

Facts about "DEPEND 2009"
Abstract deadlineJanuary 20, 2009 +
AcronymDEPEND 2009 +
Camera ready dueMarch 20, 2009 +
End dateJune 23, 2009 +
Event typeConference +
Has PC memberMarco Domenico Aime +, José Enrique Armendáriz-Iñigo +, Elisa Bertino +, Stefan Beyer +, Andrea Bondavalli +, Vicent Cholvi +, António Casimiro Costa +, Bojan Cukic +, Rubén de Juan-Marín +, Changyu Dong +, Schahram Dustdar +, Nuno Ferreira Neves +, Desprez Frédéric +, Alexander Felfernig +, Lorenz Froihofer +, Cristina Gacek +, Holger Giese +, Antonio F. Gómez Skarmeta +, Karl M. Goeschka +, Artur Hecker +, Bjarne E. Helvik +, Michael Hobbs +, Jiun-Long Huang +, Wenjian (William) Jiang +, Hai Jin +, Yoshiaki Kakuda +, Mani Krishna +, Israel Koren +, Inhwan Lee +, Clement Leung +, Keqiu Li +, Shyue-Kung Lu +, Jianhua Ma +, Henrique Madeira +, Istvan Majzik +, Miroslaw Malek +, Nikola Milanovic +, Geyong Min +, Francesc D. Munoz-Escoi +, Jogesh K. Muppala +, Syed Naqvi +, Mats Neovius +, Thu D. Nguyen +, Aljosa Pasic +, Paolo Carlo Pomi +, Sergio Pozo Hidalgo +, Wolfgang Pree +, Calton Pu +, Gerald Quirchmayr +, Ramendra K. Sahoo +, Reijo Savola +, Raimondo Schettini +, Dimitrios Serpanos +, Isabelle Simplot-Ryl +, Arun K Somani +, Kuo-Feng Ssu +, Vladimir Stantchev +, Kymie Tan +, Michiaki Tatsubori +, Kishor S. Trivedi +, Ian Troxel +, Timothy Tsai +, Tatsuhiro Tsuchiya +, Sara Tucci-Piergiovanni +, Marco Vieira +, Szu-Chi Wang +, Hee Yong Youn +, Wojciech Zamojski + and Hans P. Zima +
Has industry research chairRamendra K. Sahoo +, Michiaki Tatsubori + and Hans P. Zima +
Has location cityAthens +
Has location countryCategory:Greece +
Has program chairAntonio F. Gómez Skarmeta +, Yoshiaki Kakuda + and Marco Vieira +
Homepagehttp://www.iaria.org/conferences2009/ComDEPEND09.html +
IsAEvent +
NotificationFebruary 25, 2009 +
Start dateJune 18, 2009 +
Subevent ofNetWare 2009 +
Submission deadlineJanuary 20, 2009 +
TitleThe Second International Conference on Dependability +