P.H.Welch | 16 Feb 17:59 2015

Communicating Process Architectures (CPA) 2015 - Call for Papers

 |                                                                 |
 |        Communicating Process Architectures (CPA) 2015           |
 |                                                                 |
 |  The 37th. WoTUG Conference on Concurrent and Parallel Systems  |
 |                                                                 |
 |  Sunday (evening) 23rd. - Wednesday (lunch) 26th. August 2015   |
 |                                                                 |
 |                 http://www.wotug.org/cpa2015/                   |
 |                                                                 |
 |     Host institute: School of Computing, University of Kent     |
 |                                                                 |

This is the first *Call for Papers* for CPA 2015.  Original papers on
concurrency in computer systems are sought presenting novel, interesting
and useful work.   Areas relevant for CPA include theory and practice,
software and hardware, languages, tools, design methods, verification,
education, application and more.

For full details, please see the on-line pages at:

  http://www.wotug.org/cpa2015/                     (home page)
  http://www.wotug.org/cpa2015/call.shtml           (full call for papers)
  http://www.wotug.org/cpa2015/authors.shtml        (author information)
  http://www.wotug.org/cpa2015/fringe.shtml         (fringe programme)
  http://www.wotug.org/cpa2015/location.shtml       (location)
  http://www.wotug.org/cpa2015/people.shtml         (organisers)
  http://www.wotug.org/cpa2015/registration.shtml   (registration - later)
(Continue reading)

Stefan Leue | 16 Feb 12:21 2015

PhD / Post-Doc / Research Assistant Positions in Software and Systems Engineering

In my group we like to work on formal methods for software and systems
modeling and analysis, with particular interest in systems modeling and
model checking and in applying formal methods research in practical
settings. We have recently come up with the concept of causality 
checking and are developing tools for system safety analysis.

Currently, there are two openings in my group for full-time research
assistant positions (German public service pay scale TVL-13):

1. PhD student (preferred) or Post-Doc. Proficiency in German is not a
prerequisite for this position. See the official job ad in German and
English at:


2. Research Assistant or Post-Doc. Some proficiency in German is
desirable. This position is more devoted to tool development. See the
official job ad in German at:


The application deadline for both positions is 9 March 2015.

I will be glad to answer any questions related to these openings.


Stefan Leue


(Continue reading)

Jun Suzuki | 18 Feb 22:12 2015

Faculty position opening in software engineering

University of Massachusetts Boston
Department of Computer Science
Assistant/Associate Professor

The Computer Science Department at the University of Massachusetts 
Boston invites applications for one full-time position in Software 
Engineering at the rank of Assistant/Associate Professor, to begin 
September 1, 2015. We offer an ABET-accredited BS in Computer Science, a 
BS in Information Technology, an MS with an emphasis on software 
engineering, and a Ph.D. in Computer Science. Current faculty interests 
include bioinformatics, computer and human vision, data mining, 
databases, graphics, networks, security, software engineering, system 
modeling, and theoretical computer science.

A PhD in computer science or a related area is required. A successful 
candidate at the Assistant Professor level is expected to establish a 
highly-recognized, externally-funded independent research program at 
UMass Boston. Candidates at the Associate Professor level should have a 
well-established research program with a significant funding record. We 
offer a competitive salary and start-up package. A complete application 
consists of a cover letter, curriculum vitae, statements about research 
and teaching, and the names and email addresses of three references. 
Please submit your application at:


Our campus overlooks Boston harbor; our faculty and students enjoy 
professional life in a center of academia and the software industry. For 
more information, visit us at http://www.cs.umb.edu

(Continue reading)

j.c.vandepol | 16 Feb 17:15 2015

cfp special issue SCP on AVoCS 2014

Call For Papers
Science of Computer Programming
Special Issue on Automated Verification of Critical Systems (AVoCS’14)
Guest editors: Marieke Huisman, Jaco van de Pol
Submission deadline: 1 May 2015
Notification: 30 September 2015
This special issue is devoted to the scope of the international
workshop on Automated Verification of Critical Systems (AVoCS 2014 -
see http://www.utwente.nl/avocs2014), which the University of Twente
hosted in September 2014. AVoCS is devoted to tools and techniques for
the verification of critical systems. These topics are to be
interpreted broadly and inclusively.
Typical, but not exclusive topics of interest are:
- Model Checking
- Automatic and Interactive Theorem Proving
- SAT, SMT and Constraint Solving for Verification
- Abstract Interpretation
- Specification and Refinement
- Requirements Capture and Analysis
- Verification of Software and Hardware
- Specification and Verification of Fault Tolerance and Resilience
- Probabilistic and Real-Time Systems
- Dependable Systems
- Verified System Development
(Continue reading)

j.c.vandepol | 16 Feb 17:21 2015

9 positions in "Big Software on the Run" (PhD, Postdoc - Delft, Eindhoven, Twente)

In the context of the 3TU.BSR "Big Software on the Run" research program we are looking for 6 PhDs and 3
Postdocs interested in Software Analytics and Data Science.

Millions of lines of code - written in different languages by different people at different times, and
operating on a variety of platforms - drive the systems performing key processes in our society. The
resulting software needs to evolve and can no longer be controlled a priori as is illustrated by a range of
software problems. The 3TU.BSR research program will develop novel techniques and tools to analyze
software systems in vivo - making it possible to visualize behavior, create models, check conformance,
predict problems, and recommend corrective actions. To deal with Big Software on the Run (BSR), we
propose to shift the main focus from a priori software design to a posteriori software analytics thereby
exploiting the large amounts of event data generated by today's systems. The core idea is to study
software systems in vivo, i.e., at runtime and in their natural habitat. We would like to understand the
actual (desired or undesired) behavior of software. Running software needs to adapt to evolving and
diverging environments and requirements. This forces us to consider software artifacts as "living
organisms operating in a changing ecosystem". This paradigm shift requires new forms of empirical
investigation that go far beyond the common practice of collecting error messages and providing
software updates.
The project will run for a period of four years and is supported by the three Dutch technical universities
(Eindhoven University of Technology, TU Delft, and University of Twente). It was initiated by
3TU.NIRICT, the Netherlands Institute for Research on ICT, which comprises all ICT research of the three
universities of technology in the Netherlands. The PhD positions will run for 4 years. The three postdocs
will be appointed for 2-3 years. 

The following chairs/groups are involved:
*       The Architecture of Information Systems (AIS) group at Eindhoven University of Technology (Van der Aalst).
*       The Visualization (VIS) group at Eindhoven University of Technology (Van Wijk).
(Continue reading)

I. Ulidowski | 17 Feb 14:00 2015

Lecturer in Computer Science at University of Leicester

The Computer Science at Leicester is seeking applications for a lecturer (a permanent post
similar to an assistant professorship in the North-American system) in Human Computer
Interaction and E-learning, Cyber Security and Trust, or Data Mining and Machine Learning.

We aim to make an appointment with a strong potential for research, teaching, grant income
and external (industry) engagement, but will consider candidates with outstanding
characteristics in some of these areas, and your role will be shaped around your
characteristics in line with a departmental strategy to grow potential for
interdisciplinary and collaborative research.

We are proud holders of the Athena Swan Bronze Award http://www.athenaswan.org.uk/ and
welcome applications from suitably qualified female applicants.

Informal enquiries are welcome and should be made to Professor Reiko Heckel on
cshod <at> le.ac.uk or 0116 252 3406.

The closing date for this post is midnight on 13 March 2015.

See below for details and a link to the job summary, or go to
http://www2.le.ac.uk/offices/jobs/opportunities/jobsearch, enter
the job reference SEN00541 and click Search to find the role.

*Lecturer in Computer Science*

Ref	SEN00541
Department	Computer Science
Job Type	Academic and Teaching
Specific Location	Computer Science
Contract Type	Full Time
Salary Range	
(Continue reading)

GRLMC | 21 Feb 22:24 2015

InfoSec 2015: registration deadline 3 March

*To be removed from our mailing list, please respond to this message with
UNSUBSCRIBE in the subject line*



InfoSec 2015

Bilbao, Spain
(please notice the change of location)

July 6-10, 2015

Organized by
Deusto University
Rovira i Virgili University



--- 3rd registration deadline: March 3, 2015 ---



InfoSec 2015 will be a major research training event addressed to graduates
and postgraduates in the first steps of their academic career. With a global
(Continue reading)

Étienne André | 20 Feb 13:31 2015

ICFEM 2015 (in Paris): Call for workshops

[we apologize for multiple receptions]

                            ICFEM 2015
   The 17th International Conference on Formal Engineering Methods   

                        Call for workshops                          


* Workshop proposal deadline:     March 22, 2015
* Workshop proposal notification: April 13, 2015
* Workshops:                      November 6th (and 7th), 2015

The ICFEM 2015 conferences invites workshops as satellite events.
Such satellite events must be related to the ICFEM conference, and may
cover the following principal themes (but any topics relevant to the
field of formal methods and their practical applications will also be

* Abstraction and refinement
* Formal specification and modeling
* Program analysis
* Software verification
* Software model checking
* Formal approaches to software testing
* Formal methods for self-adaptive systems, for object and component
systems, concurrent and real-time systems, for cloud computing and
(Continue reading)

Dana Fisman | 20 Feb 17:12 2015

ExCAPE Postdoc Openings (for academic year 2015-2016)

ExCAPE Postdoc Openings (for academic year 2015-2016)

Application deadline: March 31 2015


Expeditions in Computer Augmented Program Engineering (ExCAPE) is a multi-university multi-disciplinary project funded by US National Science Foundation as part of the Expeditions in Computing program. 


Universities involved are:

  Cornell University
  Massachusetts Institute of Technology
  Rice University
  University of California, Berkeley 
  University of California, Los Angeles        

  University of Illinois, Urbana-Champaign
  University of Maryland, College Park 
  University of Michigan 
  University of Pennsylvania


The goal of ExCAPE is to transform the way programmers develop software by advancing the theory and practice of software synthesis. To achieve this goal, the ExCAPE team brings together expertise in theoretical foundations (computer-aided verification, control theory, program analysis), design methodology (human-computer interaction, model-based design, programming environments), and applications (concurrent programming, network protocols, robotics, system architecture). 


ExCAPE has funding available for multiple post-doctoral research positions for the academic year 2015-2016. We seek applicants with domain expertise necessary to advance the practice of synthesis in one of the challenge problems as well as applicants with expertise in theory and tools for synthesis. Each post-doctoral researcher will be advised by two PIs, and will be expected to split time between the institutions of the two mentors. For more information, please feel free to contact any of the PIs.


Instructions to Candidates: 

Review of applications will begin upon receipt and continue until the position is filled. Applicants should prepare the following materials:

  • Two representative publications
  • Curriculum vita
  • Statement of research (1-2 pages)
  • 2-3 recommendation letters


The application is done online via the following link. All material, except for the recommendation letters, should be uploaded using this link. Recommendation letters should be sent by email to Dr. Dana Fisman.

Concurrency mailing list
Nickovic Dejan | 19 Feb 22:57 2015

CfP: RV'15 - The 15th International Conference on Runtime Verification

                 CALL FOR PAPERS

                15th International Conference on
                      Runtime Verification

                        Vienna, Austria
                      22-25 September 2015


RV'15, the 15th International Conference on Runtime Verification,
will take place at Vienna University of Technology, Vienna, Austria,
from 22 to 25 September 2015.

** Scope **

Runtime verification is concerned with monitoring and analysis of
software and hardware system executions.  Runtime verification
techniques are crucial for system correctness, reliability, and
robustness; they are significantly more powerful and versatile than
conventional testing, and more practical than exhaustive formal
verification. Runtime verification can be used prior to deployment,
for testing, verification, and debugging purposes, and after
deployment for ensuring reliability, safety, and security and
for providing fault containment and recovery as well as online
system repair. Topics of interest to the conference include:

    - specification languages
    - specification mining
    - program instrumentation
    - monitor construction techniques
    - logging, recording, and replay
    - fault detection, localization, containment, recovery and repair
    - program steering and adaptation
    - metrics and statistical information gathering
    - combination of static and dynamic analyses
    - program execution visualization
    - monitoring techniques for safety/mission-critical systems
    - monitoring distributed systems, cloud services, and big data applications
    - monitoring security and privacy policies

Application areas of runtime verification include safety/mission-critical
systems, enterprise and systems software, autonomous and reactive control
systems, health management and diagnosis systems, and system security and privacy.

** Invited Speakers **

Patrice Godefroid, Microsoft Research, USA
Sriram Sankaranarayanan, University of Colorado Boulder, USA
Georg Weissenbacher, Vienna University of Technology, Austria

** General Chair **

Radu Grosu, Vienna University of Technology, Austria

** Program Chairs **

Ezio Bartocci, Vienna University of Technology, Austria
Rupak Majumdar, Max Planck Institute, Germany

** Tool Chair/Publicity Chair **

Dejan Nickovic, Austrian Institute of Technology, Austria

** Program Committee **

Thomas Ball, Microsoft, USA
Howard Barringer, University of Manchester, UK
Ezio Bartocci, Vienna University of Technology, Austria (PC Chair)
David Basin, ETH Zurich, Switzerland
Andreas Baurer, TU Munich, Germany
Saddek Bensalem, VERIMAG, France
Eric Bodden, TU Darmstadt, Germany
Borzoo Bonakdarpour, McMaster University, Canada
Luca Bortolussi, University of Trieste, Italy
Laura Bozzelli, UPW, Spain
Rohit Chadha, University of Missouri, USA
Satish Chandra, Samsung Electronics, USA
Dino Distefano, Facebook, UK
Alastair Donaldson, Imperial College London, UK
Alexandre Donzé, UC Berkeley, USA
Georgios Fainekos, Arizona State University, USA
Yliès Falcone, University of Grenoble I, France
Bernd Finkbeiner, Saarland University, Germany
Milos Gligoric, University of Illunois at Urbana-Champaign, USA
Radu Grosu, Vienna University of Technology, Austria (General Chair)
Kim Larsen, Aalborg Univeristy, Denmark
Insup Lee, University of Pennsylvania, USA
Klaus Havelund, NASA JPL, USA
Aditya Kanade, Indian Institute of Science, India
Panagiotis Katsaros, Aristotle University of Thessaloniki, Greece
Safraz Khurshid, The University of Texas at Austin, USA
Marta Kwiatkowska, University of Oxford, UK
Axel Legay, INRIA Rennes, France
Martin Leucker, University of Lübeck, Germany
Rupak Majumdar, Max Planck Institute, Germany (PC Chair)
Oded Maler, VERIMAG, France
Leonardo Mariani, University of Milano Bicocca, Italy
Dejan Nickovic, Austrian Institute of Technology, Austria
Joel Ouaknine, Oxford University, UK
Gordon Pace, University of Malta, Malta
Doron Peled, Bar Ilan University, Israel
Pavithra Prabhakar, IMDEA Software Institute, USA
Grigore Rosu, University of Illinois at Urbana-Champaign, USA
Abhik Roychoudhury, National University of Singapore, Singapore
Koushik Sen, UC Berkeley, USA
Scott A. Smolka, Stony Brook University, USA
Oleg Sokolsky, University of Pennsylvania, USA
Bernhard Steffen, TU Dortmund, Germany
Scott D. Stoller, Stony Brook University, USA
Emina Torlak, UC Berkeley, USA
Serdar Taşıran, Koç University, Turkey
Lenore Zuck, University of Illinois at Chicago, USA

**  Research Papers Track **

Research papers can be submitted in two categories: regular and short papers.
Papers in both categories will be reviewed by the conference Program Committee.
All accepted technical papers will appear in an LNCS volume. Submitted papers
must use the LNCS style. At least one author of each accepted paper
must attend RV’15 to present the paper. Papers must be submitted electronically
using the EasyChair system.

* Regular Papers *

Regular Papers (up to 15 pages) should present original unpublished results.
Theoretical and experimental papers as well as papers on applications of runtime
verification and case studies are all welcome.  The Program Committee of RV 2015
will give this year a best paper award. The Best Paper Award recipient is given
public recognition and will receive one high-end NVIDIA GPU equipment (Titan Black
for a value of $1,150) donated by NVIDIA.
A selection of accepted regular papers will be invited to appear in a special issue of
the Springer Journal on Formal Methods in System Design.

* Short Papers *
Short Papers (up to 5 pages) may present novel but not necessarily thoroughly
worked out ideas, for example emerging runtime verification techniques and applications,
or techniques and applications that establish relationships between runtime verification
and other domains. Accepted short papers will be presented in special short talk
(10 minutes) and poster sessions.

** Tool Demonstration Track **

The aim of the RV 2015 tool demonstration track is to provide an opportunity
for researchers and practitioners to show and to discuss the latest advances,
experiences and challenges in devising and developing reliable software tools
for runtime verification. Tool demonstration papers will be reviewed by the
Tools Track Program Committee. All accepted tool demonstration papers will
appear in the conference proceedings LNCS volume. Submitted papers must use
the LNCS style. At least one author of each accepted paper must attend RV’15
to present the paper. Papers must be submitted electronically using the
EasyChair system.

Tool papers should meet the following criteria:

    - A tool paper should present a new tool, a new tool component or novel
      extensions to existing tools supporting runtime verification. Each
      submission should be original and not published previously in a tool paper form.
    - Each submission must not exceed 8 pages in the LNCS/Springer proceeding
      format, including all text, references and figures. The paper must be
      written in English and provided in PDF format.
    - Each submission must be accompanied at the time of the submission by a
      short screencast (between 5-10 minutes), with voice and overlay text
      commentary illustrating the demonstration of the tool (a link to it
      should be provided in the paper).
    - The paper must include information on tool availability, maturity,
      selected experimental results and it should provide a link to a
      website containing the theoretical background and user guide.
      Furthermore, we strongly encourage authors to make their tools and
      benchmarks available with their submission.
    - Each tool paper must include a script in an appendix (not included
      in the page count) describing how the demo will be conducted during
      the conference presentation with screenshots presenting step-by-step
      the tool’s capabilities, highlighting the main characteristics and
      the usage.

* Tool Evaluation *

Each submission will be reviewed by at least four members of the tool demonstration
track program committee. The evaluation criteria will include:

    - the presentation quality
    - the availability (possibly in a open-source format) of the software.
    - the relevance for the Runtime Verification audience
    - the technical soundness of the presented tool
    - the originality of the underlying ideas

* Tool Demonstration Committee *

Dejan Nickovic, Austrian Institute of Technology, Austria, Chair
Alexandre Donzé, UC Berkeley, USA
Martin Leucker, University of Lübeck, Germany
Milos Gligoric, University of Illunois at Urbana-Champaign, USA
Eugen Zalinescu, ETH Zurich, Switzerland
Gordon Pace, University of Malta, Malta

Important Dates:

Both research papers and tool demonstration tracks and the call
for tutorials will follow the following timeline:

Abstract deadline: April 12, 2015
Paper and submission deadline: April 19, 2015
Paper and Notification: May 31, 2015
Camera Ready submission: June 15, 2015
Conference dates: September 22-25, 2015




Dejan Nickovic
Senior Scientist
Department Digital Safety and Security

Business Unit Safe and Autonomous Systems

AIT Austrian Institute of Technology GmbH
Donau-City-Straße 1  |  1220 Vienna  | Austria
T +43(0) 50550-4021 | M +43(0) 66488-390038  |  F +43(0) 50550-4150
dejan.nickovic-c/U4JCCwIJZeoWH0uzbU5w@public.gmane.org  |  http://www.ait.ac.at


FN: 115980 i HG Wien  |  UID: ATU14703506
This email and any attachments thereto, is intended only for use by the addressee(s) named herein and may contain legally privileged and/or confidential information. If you are not the intended recipient, please notify the sender by return e-mail or by telephone and delete this message from your system and any printout thereof. Any unauthorized use, reproduction, or dissemination of this message is strictly prohibited. Please note that e-mails are susceptible to change. AIT Austrian Institute of Technology GmbH shall not be liable for the improper or incomplete transmission of the information contained in this communication, nor shall it be liable for any delay in its receipt.


Concurrency mailing list
Borzoo Bonakdarpour | 20 Feb 18:34 2015

CFA: Formal Reasoning in Distributed Algorithms (FRIDA'15)

                     Call for abstracts

         Workshop on Formal Reasoning in Distributed Algorithms

                        June 5, 2015
                       Grenoble, France


In the last decades, formal methods were proven to be useful for the
verification of many hardware and software systems. For distributed algorithms,
the applications of formal methods was limited: formal methods have been used
for finding bugs in distributed algorithms, and to a much smaller extent formal
methods were used in computer-aided verification of simple distributed
algorithms. However, to verify more involved distributed algorithms, one cannot
easily apply existing verification tools. To be eventually able to do this, an
interdisciplinary effort from the concerned fields of formal methods, logic in
computer science, and distributed algorithm theory is required.

The topics of interest include but are not limited to:

    * models for concurrent and distributed algorithms
    * theory of distributed algorithms
    * design and verification of fault-tolerant algorithms
    * benchmarking of distributed algorithms
    * (parameterized) model checking
    * proof assistants and theorem proving
    * integration of different verification techniques
    * formal techniques for synthesis
    * automated code generation for distributed systems
    * run-time verification of distributed systems
    * performance analysis of distributed systems based on formal methods
    * analysis of probabilistic and real-time distributed systems




This one-day workshop will include invited talks, presentations of position
papers, including work-in-progress and published work, and discussion periods.
We are planning to collect the abstracts and the presentations for publication
on the workshop site.


     Abstract submission deadline: April 10, 2015
     Acceptance notification: April 15, 2015
     Workshop dates: June 5, 2015


We seek submissions reporting on theory, applications, case studies or open
questions at the interface of formal methods and distributed algorithms.
Contributions may range from extended abstracts of one or two pages to full
papers of twenty pages, in Easychair format, and should be submitted as pdf
files. Presentation of papers published elsewhere is acceptable and encouraged.
There will be no formal workshop proceedings — therefore, the work will be
considered “unpublished”. However, accepted contributions will be made
accessible from the Workshop Web page.

     The submission link:https://easychair.org/conferences/?conf=frida2015


     Borzoo Bonakdarpour (McMaster University)
     Igor Konnov (TU Wien)
     Stephan Merz (INRIA Nancy & LORIA)
     Josef Widder (TU Wien)

Concurrency mailing list
Concurrency <at> listserver.tue.nl