Yulei Wu | 9 Apr 11:08 2015

CFP: The 13th IEEE International Conference on Pervasive Intelligence and Computing (PICom-2015), Liverpool, England, UK, 26-28 October 2015

[Please accept our apologies if you receive multiple copies of this email]

**************************** IEEE PICom-2015 CFP ***************************
The 13th IEEE International Conference on Pervasive Intelligence and Computing


Liverpool, England, UK, 26-28 October 2015 

Sponsored by
IEEE, IEEE Computer Society and IEEE Technical Committee of Scalable Computing (TCSC)

Over the last fifty years, computational intelligence has evolved from logic-based artificial
intelligence, nature-inspired soft computing, and social-oriented agent technology to
cyber-physical integrated ubiquitous intelligence towards Pervasive Intelligence (PI). The
International Conference on Pervasive Intelligence and Computing is intended to cover all kinds of
these intelligent paradigms as well as their applications in various pervasive computing. PICom-2015
is the next event, in a series of highly successful International Conferences on Pervasive Intelligence
and Computing (PICom), previously held as PCC-2003 (Las Vegas, USA, June 2003), PCC-2004 (Las Vegas,
USA, June 2004), PSC-2005 (Las Vegas, USA, June 2005), PCAC-2006 (Vienna, Austria, April 2006),
PCAC-2007 (Niagara Falls, Canada, May 2007) , IPC-2007 (Jeju, Korea, December 2007), IPC-2008 (Sydney,
Australia, December 2008), PICom-2009 (Chengdu, China, December 2009), PICom-2011 (Sydney,
Australia, December 2011), PICom-2012 (Changzhou, China, December 2012), PICom-2013 (Chengdu,
China, December 2013), and PICom-2014 (Dalian, China, August 2014).

PICom-2015 will be held on 26-28 October 2015 in Liverpool, UK. The goal of this year’s event is to bring
together computer scientists, industrial engineers, and researchers to discuss and exchange
(Continue reading)

David Safranek | 8 Apr 13:20 2015

HSB 2015 - 1st Call For Papers

-- First Call for Papers --

HSB 2015: The 4th International Workshop on Hybrid Systems Biology


5 September 2015, Madrid (Spain)
In conjunction with CONCUR 2015 (Madrid Meet 2015)

Proceedings in Springer's LNCS

The 4th International Workshop on 'Hybrid Systems Biology' will be
held on September 4th and 5th in Madrid (ES), and co-located with the
Madrid Meet 2015 (http://mafalda.fdi.ucm.es/madrid2015/), which hosts
also CONCUR 2015, QEST 2015, FORMATS 2015, among other
events. Previous editions have been held in Newcastle upon Tyne (UK),
Taormina (IT), and Vienna (AT, at VSL 2014). 


Abstract Submission: June 8, 2015
Paper Submission:    June 15, 2015 
Notification:        July 15, 2015 
Final Submission:    To be announced 


The scope of the HSB workshop covers the general area of dynamical
models in Biology with an emphasis on hybrid approaches  by no means
(Continue reading)

jun sun | 6 Apr 03:31 2015


SETTA 2015

Symposium on Dependable Software Engineering:
Theories, Tools and Applications

Nanjing University 
November 4-6, 2015


June 12,2015 Abstracts
June 19,2015 Submission of papers
August 21,2015 Notification to authors
September 4,2015 Camera-ready versions

Sanjoy Baruah, University of North Carolina at Chapel Hill, USA 
David Harel,   Weizmann Institute of Science, Israel 
Huimin Lin,    Institute of Software, CAS, China


The aim of the symposium is to bring together international researchers and practitioners in the field of software technology. Its focus is on formal methods and advanced software technologies, especially for engineering complex, large-scale artefacts like
cyber-physical systems, networks of things, enterprise systems, or cloud-based services. Contributions relating to formal methods or
integrating them with software engineering, as well as papers advancing scalability or widening the scope of rigorous methods to new design goals are especially welcome.

Being hosted in China, the symposium will also provide a platform for building up research collaborations between the rapidly growing
Chinese computer science community and its international counterpart. The symposium will support this process through dedicated events and therefore welcomes both young researchers considering
international collaboration in formal methods and established researchers looking for international cooperation and willing to
attract new colleagues to the domain.

Authors are invited to submit papers on original research, industrial applications, or position papers proposing challenges in fundamental research and technology. The latter two types of submissions are
expected to contribute to the development of formal methods either by substantiating the advantages of integrating formal methods into the development cycle or through delineating need for research by
demonstrating weaknesses of existing technologies, especially when addressing new application domains.

Submissions can take the form of either normal or short papers. Short papers can discuss ongoing research at an early stage, including PhD projects. Papers should be written in English. Regular Papers should not exceed 15 pages and Short Papers should not exceed 6 pages in LNCS format (see http://www.springer.de/comp/lncs/authors.html for
details). The proceedings will be published as a volume in Springer's LNCS series. The authors of a selected subset of accepted papers will be invited to submit extended versions of their papers to appear in a special issue of the Formal Aspect Computing journal.


Topics of interest include, but are not limited to:

 * Requirements specification and analysis
 * Formalisms for modeling, design and implementation
 * Model checking, theorem proving, and decision procedures
 * Scalable approaches to formal system analysis
 * Formal approaches to simulation and testing
 * Integration of formal methods into software engineering practice
 * Contract-based engineering of components, systems, and systems of systems
 * Formal and engineering aspects of software evolution and maintenance
 * Parallel and multicore programming
 * Embedded, real-time, hybrid, and cyber-physical systems
 * Mixed-critical applications and systems
 * Formal aspects of service-oriented and cloud computing
 * Safety, reliability, robustness, and fault-tolerance
 * Empirical analysis techniques and integration with formal methods
 * Applications and industrial experience reports
 * Tool integration

  Jian Lv, Nanjing University, China 

  Xuandong Li, Nanjing University, China 
  Zhiming Liu, Birmingham City University, UK   
  Yi Wang, Uppsala University, Sweden   

  Jonathan Bowen, Birmingham City University, UK 
  Lijun Zhang, Institute of Software,Chinese Academy of Sciences, China 

  Martin Fränzle, University of Oldenburg, Germany  

  Xin Chen, Nanjing University, China  

* Farhad Arbab,  CWI and Leiden University,The Netherlands 
* Luis Barbosa,  Universidade do Minho,Portugal 
* Jonathan Bowen,  Birmingham City University,UK 
* Nikolaj Bjorner,  Microsoft Research,USA 
* Michael Butler,  University of Southampton,UK 
* Van Hung Dang,  Vietnam National University,Vientam 
* Martin Fränzle,  University of Oldenburg,Germany 
* Goran Frehse,  Universite Joseph Fourier Grenoble 1–Verimag, France 
* Lindsay Groves,  Victoria University of Wellington,New Zealand
* Tei-Wei Guo, National Taiwan University, TW, China
* Holger Hermanns,  Saarland University,Germany 
* Ian J. Hayes,  University of Queensland,Australia 
* Gerwin Klein,  NICTA and UNSW,Australia 
* Insup Lee,  University of Pennsylvania,USA 
* Xuandong Li, Nanjing University, China 
* Shaoying Liu,  Hosei University,Japan 
* Zhiming Liu, Birmingham City University, UK 
* Mingsong LU, North Eastern University, China                                     
* Xiaoguang Mao,  National University of Defense Technology,China 
* Jun Pang,  University of Luxembourg,Luxembourg 
* Paritosh Pandya,  Tata Institute of Fundamental Research Research,India 
* Paul Pettersson,  Mälardalen University, Sweden 
* Zongyan Qiu,  Peking University,China 
* Shengchao Qin,  Teesside University,UK 
* Jean-Francois Raskin,  Université Libre de Bruxelles,Belgium 
* Stefan Ratschan,  Czech Academy of Sciences,CZ 
* Martin Steffen,  University of Oslo,Norway 
* Cesare Tinelli,  The University of Iowa,USA 
* Tarmo Uustalu,  Tallinn University of Technology,Estonia 
* Irina Virbitskaite,  Ershov Institute of Informatics Systems,Russian 
* Farn Wang, National Taiwan University, TW, China
* Qixin Wang, The Hong Kong Polytechnic University, HK, China
* Yi Wang, Uppsala University, Sweden   
* Lijun Zhang,  Institute of Software, Chinese Academy of Sciences,China 
* Jianhua Zhao,  Nanjing University,China 
* Huibiao Zhu,  East China Normal University,China 

* Zhenhua Duan, Xi’dian University, China
* Martin Fränzle, University of Oldenburg, Germany
* Kim Larsen, Aalborg University, Denmark
* Xuandong Li, Nanjing University China
* Zhiming Liu, Birmingham City University,UK
* Sriram Rajamani, Microsoft Research India
* Ji Wang, National University of Defense Science and Technology, China
* Kwangkeun Yi, Seoul National University, Korea 
* Naijun Zhan (Chair), Software Institute, Chinese Academy of Sciences, China 
Concurrency mailing list
jun sun | 6 Apr 03:34 2015

CFP: ATVA 2015

ATVA 2015, 13th International Symposium on Automated Technology for
Verification and Analysis
  October 12-15, 2015, Shanghai, China, http://atva2015.ios.ac.cn/

The purpose of ATVA is to promote research on theoretical and
practical aspects of automated analysis, verification and synthesis
by providing a forum for interaction between the regional and the
international research communities and industry in the field.

ATVA 2015 solicits high-quality submissions in areas related to the
theory and practice of automated analysis and verification of hardware
and software systems. Topics of interest include, but are not limited

* Formalisms for modeling hardware, software and embedded systems
* Specification and verification of finite-state, infinite-state and
parameterized systems
* Program analysis and software verification
* Analysis and verification of hardware circuits, systems-on-chip and
embedded systems
* Analysis of real-time, hybrid, priced/weighted and probabilistic systems
* Deductive, algorithmic, compositional, and abstraction refinement
techniques for analysis and verification
* Analytical techniques for safety, security, and dependability
* Testing and runtime analysis based on verification technology
* Analysis and verification of parallel and concurrent hardware/software systems
* Verification in industrial practice
* Applications and case studies

Theory papers should preferably be motivated by practical problems,
and applications should be based on sound theory and should solve
problems of practical interest.

April 22, 2015  Abstract submission deadline (AOE)
April 25, 2015  Paper submission deadline (AOE)
May 5, 2015     Submission of workshop proposals
Jun 8, 2015     Paper acceptance/rejection notification
Jun 10, 2015    Announcement of the accepted papers
July 5, 2015    Camera-ready copy deadline

Jifeng He (East China Normal University, China)

Bernd Finkbeiner (Saarland University, Germany)
Geguang Pu (East China Normal University, China)
Lijun Zhang (Institute of Software, Chinese Academy of Sciences)

David N. Jansen (Radboud Universiteit, Netherlands)
Huibiao Zhu (East China Normal University, China)

Alessandro Abate (University of Oxford, UK)
Erika Ábrahám (RWTH Aachen University, Germany)
Michael Backes (Saarland University, Germany)
Christel Baier (Technical University of Dresden, Germany)
Ahmed Bouajjani (University Paris Diderot, FR)
Tevfik Bultan (University of California at Santa Barbara, USA)
Franck Cassez (NICTA, Australia)
Rance Cleaveland (University of Maryland, USA)
Hung Dang-Van (UET, Vietnam National University, Vietnam)
Bernd Finkbeiner (Saarland University, Germany)
Mark Greenstreet (University of British Columbia, Canada)
Holger Hermanns (Saarland University, Germany)
Pao-Ann Hsiung (National Chung Cheng University, Taiwan)
Alan Hu (University of British Columbia, Canada)
Michael Huth (Imperial College London, UK)
Jie-Hong Roland Jiang (National Taiwan University, Taiwan)
Orna Kupferman (Hebrew University, Israel)
Kim Guldstrand Larsen (Aalborg University, Denmark)
Xuandong Li (Nanjing University, China)
Annabelle McIver (Macquarie University, AU)
Ken McMillan (Microsoft, USA)
Madhavan Mukund (Chennai Mathematical Institute, India)
Flemming Nielson (Technical University of Denmark, Denmark)
Mizuhito Ogawa (Japan Advanced Institute of Science and Technology)
Catuscia Palamidessi (INRIA Saclay and LIX, FR)
Doron Peled (Bar Ilan University, Israel)
Geguang Pu (East China Normal University, China)
Jean-François Raskin (Université Libre de Bruxelles, Belgium)
Kristin Y. Rozier (NASA's Ames Research Center, USA)
Sven Schewe (Liverpool University, UK)
Scott Smolka (Stony Brook University, USA)
Farn Wang (National Taiwan University, Taiwan)
Bow-Yaw Wang (Academia Sinica, Taiwan)
Wang Yi (Uppsala University, Sweden)
Naijun Zhan (Institute of Software, Chinese Academy of Sciences)
Lijun Zhang (Institute of Software, Chinese Academy of Sciences)

E. Allen Emerson (University of Texas-Austin, USA)
Teruo Higashino (Osaka University, Japan)
Insup Lee (University of Pennsylvania, USA)
Doron Peled (Bar Ilan University, Israel)
Farn Wang (National Taiwan University, Taiwan)
Hsu-Chun Yen (National Taiwan University, Taiwan)

Jun Sun (Singapore University of Technology and Design, SG)

Dino Distefano (Queen Mary, University of London, UK)
Joost-Pieter Katoen (RWTH Aachen University, Germany)
J Strother Moore (University of Texas-Austin, USA)

ATVA 2015  invites  submissions  for  workshop  proposals on
topics of interest to the ATVA series. The workshops will be
either half day or one full day. Depending on  the  number of
accepted workshops, the workshops will be scheduled either on
October 11, or  October 16, 2015.

All proposals should be sent by e-mail to the workshop
chair, Jun Sun, Singapore University of Technology and Design, SG,


May 5, 2015: Submission of workshop proposals
May 30, 2015:   Notification of acceptance
Concurrency mailing list
M.R. Mousavi | 8 Apr 15:16 2015

CFP: 5th International Workshop on Cyber Physical Systems (CyPhy'15)


The Fifth International Workshop on
Design, Modeling and Evaluation of Cyber Physical Systems (CyPhy'15)

Amsterdam, The Netherlands

October 8, 2015


(Held in conjunction with ESWEEK 2015)



Cyber physical systems (CPSs) combine computing and networking power with physical components. They enable innovation in a wide range of domains including robotics; smart homes, vehicles, and buildings; medical implants; and future-generation sensor networks.  CyPhy'15 brings together researchers and practitioners working on modeling, simulation, and evaluation of CPS, based on a broad interpretation of these areas, to collect and exchange expertise from a diverse set of disciplines. The workshop places particular focus on techniques and components to enable and support virtual prototyping and testing.

Topics of interest include, but are not limited to the following aspects of cyber-physical systems:

- Foundations: models of computation, modeling and simulation languages for hybrid and cyber-­physical systems, including hybrid automata and hybrid process theory, as well as other integrations of control-­theoretic and discrete-­event models;

- Methods: Specifications and evaluation of processes for rigorous modeling, testing, simulation, and verification of new cyber-­physical systems;

- Case studies: Development of industrial or research ­oriented cyber­-physical systems in domains such as robotics, smart systems (homes, vehicles, buildings), medical and healthcare devices, future generation networks; and

- Tools: Evaluation of novel research tools, comparisons of state of the art tools in industrial practice.

Important Dates

Submissions: June 10, 2015

Notifications: July 10, 2015

Camera-Ready: August 3, 2015

Workshop: October 8, 2015

Submission Types

Submissions types:
1) research papers (max. 15 pages, LNCS format);
2) positions papers (max. 4 pages, not published); and
3) tool demonstrations (max. 10 pages, LNCS format).

Research papers will be judged for technical novelty and scientific merit.  Any previous publication in any form must be explicitly identified and cited on the first page of the submission.  Papers in all other categories will be judged on novelty, clarity, accessibility, and suitability for a high quality presentation and discussion at the workshop.


Submissions of type 1 and 3 will be published in a volume of Lecture Notes in Computer Science, by Springer.

If the quality of the submissions warrants, a special issue of an archival journal will be negotiated for the best submissions (subject to confirmation, and an additional round of review).

Submission Instructions

Papers should be formatted according to the Springer LNCS style, not exceed the respective page limits (including figures and references), and be submitted in PDF format through the following submission website.


Except for regular research papers, the paper category must be indicated at the end of the title in parenthesis at the time of the initial submission and in the final camera ready version.

Simultaneous submission to other venues with a formal publication (workshops, conferences, symposia, and journals) is not allowed. Duplicated submissions or other types of plagiarism will result in rejection and a report will be sent to the corresponding institution's dean or manager.

Papers not adhering to the format or page limit may be rejected without a review.

Invited Speaker

Maurice Heemels, Eindhoven University of Technology


General Chair

Walid Taha, Halmstad & Rice Universities

Program Chairs

Christian Berger, Chalmers and University of Gothenburg
Mohammad Reza Mousavi, Halmstad University

Program Committee

Jakob Axelsson, SICS and Mälardalen University
Christian Berger, Chalmers and University of Gothenburg
Manuela Bujorianu, University of Warwick
Georgios Fainekos, Arizona State University
Daisuke Ishii, Tokyo Institute of Technology
Zhiyun Lin, Zhejiang University
Mohammad Reza Mousavi, Halmstad University
Wojciech Mostowski, Halmstad University
Michel Reniers, Eindhoven University of Technology
Bernhard Rumpe, RWTH Aachen University
Maytham Safar, Kuwait University
Bernhard Schätz, TU München
Martin Steffen, Oslo University
Frits Vaandrager, Radboud University Nijmegen

Publicity Chair

Abd-Elhamid M. Taha, Alfaisal University

Advisory Committee

Manfred Broy, Technische Universität München
Karl Iagnemma, MIT
Karl Henrik Johansson, Royal Institute of Technology
Insup Lee, University of Pennsylvania
Pieter Mosterman, McGill University
Janos Sztipanovits, Vanderbilt University
Walid Taha, Halmstad & Rice Universities
Concurrency mailing list
Julian Gutierrez | 8 Apr 19:57 2015

Call for papers - SR 2015: Strategic Reasoning (Oxford, UK)

Our apologies if you have received multiple copies.


                    SR 2015 - Call For Papers

        3rd International Workshop on Strategic Reasoning

                  Oxford, 21-22 September, 2015



Strategic reasoning is one of the most active research areas in the
multi-agent system domain. The literature in this field is extensive
and provides a plethora of logics for modelling strategic
ability. Theoretical results are now being used in many exciting
domains, including software tools for information system security,
robot teams with sophisticated adaptive strategies, and automatic
players capable of beating expert human adversary, just to cite a
few. All these examples share the challenge of developing novel
theories and tools for agent strategies that take into account the
likely behaviour of adversaries. The SR international workshop aims to
bring together researchers working on different aspects of strategic
reasoning in computer science, artificial intelligence and multi-agent
systems research, both from a theoretical and a practical viewpoint.



The topics covered by SR include, but are not limited to, the

  * Logics for reasoning about strategic abilities;
  * Logics for multi-agent mechanism design, verification, and synthesis;
  * Logical foundations of decision theory for multi-agent systems;
  * Strategic reasoning in formal verification;
  * Automata theory for strategy synthesis;
  * Strategic reasoning under perfect and imperfect information;
  * Applications and tools for cooperative and adversarial reasoning;
  * Robust planning and optimisation in multi-agent systems;
  * Risk and uncertainty in multi-agent systems;
  * Quantitative aspects of strategic reasoning.



Speakers so far confirmed include:

  * Johan van Benthem, University of Amsterdam/Stanford University
  * Joseph Halpern, Cornell University 
  * Marta Kwiatkowska, University of Oxford
  * Moshe Vardi, Rice University



  * June 1st, 2015: Submission opening

  * July 1st, 2015 (strict): Abstract submission deadline
  * July 3rd, 2015 (strict): Paper submission deadline

  * July 31st, 2015: Acceptance notification
  * August 14th, 2015: Camera-ready version deadline

  * September 21st-22nd, 2015: SR 2015 workshop



Extended abstracts should be submitted not exceeding 10 pages (plus
references) in the EPTCS format. If necessary, the work may be
supplemented with a clearly marked appendix, which will be consulted
at the discretion of the PC.  Submissions must be in PDF format and
will be handled via EasyChair, using the following link:


Two types of submission are invited:

  * contributions reporting on novel research;
  * expository contributions reporting on published work.

Each submission should be clearly identified as belonging to one
category or the other. In both categories, strong preference will be
given to papers whose topic is of interest to an interdisciplinary
audience and all contributions should be written so that they are
accessible to such an audience.

Extended abstracts will be held to the usual high standards of
research publications. In particular, they should contain enough
information to enable the PC to identify the main contribution of the
work, explain the significance of the work, its novelty, and its
practical or theoretical implications, and include comparisons with
and references to relevant literature.

Expository abstracts, which will be evaluated using similar high
standards, may survey an area or report on more specific previously
published work.

Submissions should make clear the relevance to the strategic reasoning

Submissions from PC members are also allowed. Note that, since the
workshop will have informal proceedings, extended versions of the
accepted papers can also be submitted elsewhere.



The workshop proceedings will be available as a single PDF file from
the workshop website. Extended and revised versions of the best papers
presented in the last two editions of SR have been invited for a
special issue of the Journal of Information and Computation. 
In SR 2015, we plan to do the same.



Workshop Chairs

  * Julian Gutierrez, University of Oxford, UK
  * Fabio Mogavero, University of Naples Federico II, Italy
  * Aniello Murano, University of Naples Federico II, Italy
  * Michael Wooldridge, University of Oxford, UK [MAIN CONTACT]

Program Committee

  * Thomas Agotnes, University of Bergen, Norway
  * Natasha Alechina, University of Nottingham, UK
  * Julian Bradfield, University of Edinburgh, UK
  * Krishnendu Chatterjee, IST, Austria 
  * Vojtech Forejt, University of Oxford, UK
  * Valentin Goranko, Stockholm University, Sweden
  * Erich Graedel, RWTH Aachen University, Germany
  * Julian Gutierrez, University of Oxford, UK
  * Paul Harrenstein, University of Oxford, UK
  * Andreas Herzig, CNRS, IRIT, France 
  * Orna Kupferman, Hebrew University, Israel
  * Salvatore La Torre, University of Salerno, Italy 
  * Jerome Lang, LAMSADE, France
  * Alessio Lomuscio, Imperial College London, UK
  * Enrico Marchioni, University of Oxford, UK
  * Nicolas Markey, LSV, CNRS, and ENS Cachan, France
  * John-Jules Meyer, Utrecht University, The Netherlands
  * Andrzej Murawski, University of Warwick, UK
  * Luke Ong, University of Oxford, UK
  * Sophie Pinchinat, IRISA Rennes, France 
  * Nikos Tzevelekos, Queen Mary University of London, UK
  * Wiebe Van Der Hoek, University of Liverpool, UK
  * Igor Walukiewicz, CNRS, LaBRI, France 

Local Arrangements Committee

  * Vojtech Forejt, University of Oxford, UK
  * Julian Gutierrez, University of Oxford, UK
  * Paul Harrenstein, University of Oxford, UK
  * Enrico Marchioni, University of Oxford, UK
  * Michael Wooldridge, University of Oxford, UK 


Julian Gutierrez
Oxford University Department of Computer Science
Wolfson Building, Parks Road, Oxford OX1 3QD, UK
Web: http://www.cs.ox.ac.uk/people/julian.gutierrez/

Concurrency mailing list

Jan Kofron | 8 Apr 13:41 2015

MEMICS'15: First Call for Papers

Please accept our apologies for multiple postings of this CfP.


            10th Doctoral Workshop on Mathematical and Engineering

                      Methods in Computer Science

                               MEMICS 2015


                 October 23--25, 2015, Telc, Czech Republic

                             Call for Papers


Since 2005, the aim of MEMICS is to provide a scientific forum for 
doctoral and
master students interested in applications of mathematical and 
engineering methods
in computer science. Besides a rich technical programme (including 
invited talks,
regular papers, and presentations), MEMICS also offers friendly social 
and exciting opportunities for meeting like-minded people.

Topics: MEMICS submissions are traditionally invited from all areas of 
science (such as parallel and distributed computing, computer networks, 
hardware and its design, non-traditional computing architectures, 
systems and databases, multimedia and graphics, verification and 
testing, computer
security, as well as all related areas of theoretical computer science). 
In line
with the tradition of MEMICS, several areas are, however, given a 
special focus
each year (which is reflected, e.g., in the choice of the invited speakers).
In 2015, these areas are:

    * Security and safety
    * Bioinformatics
    * Recommender systems
    * High-performance and cloud computing
    * Non-traditional computational models (quantum computing, etc.)

Nevertheless, as stated above, submissions from any other area of 
computer science
are welcome.

Invited talks: There will be 4-6 invited talks by distinguished 
researchers from
the different areas of interest of the workshop as a part of the programme:

* Natasha Sharygina (University of Lugano, Switzerland)
* Ezio Bartocci (Vienna University of Technology, Austria)
* Mike Just (Heriot-Watt University, Edinburgh, Scotland)
* Peter Vojtáš (Charles University, Czech Republic)

Participation: Students are invited to submit a regular paper or a 
A regular paper is a previously unpublished original work, not exceeding 
12 pages
in the LNCS style.

Simultaneous submissions of regular papers to other conferences with 
is not allowed. A presentation, submitted in the form of a one-page 
summarizes recent outstanding work that has been accepted to a leading 
science conference or published in a recognised scientific journal. Detailed
instructions are available at the web page http://www.memics.cz/. 
containing accepted regular papers and presentation abstracts will be 
available at
the workshop in printed and/or electronic form.

Moreover, a special issue of a journal with an impact factor is planned 
for extended
versions of a selection of the best papers published at MEMICS.

Submissions and dates:
All submissions will be handled by the Easychair conference system.

*  July 10, 2015: abstracts of regular papers
*  July 17, 2015: full regular papers
*  August 28, 2015: one-page abstracts of presentations
*  September 8, 2015: notification of acceptance
*  September 15, 2015: final camera-ready versions of all accepted 

Venue: The workshop will be held in the historical town of Telc, which 
is situated
at the south-west tip of Moravia, half-way between Prague and Vienna. 
The historical
centre of the town has retained its unique shape over the centuries and 
was included
in the list of UNESCO World Heritage Sites in 1992: 

The MEMICS 2015 workshop is organised jointly by the Faculty of 
Information Technology,
Brno University of Technology and the Faculty of Informatics, Masaryk 

General Chair
Tomas Vojnar, Brno University of Technology

Programme Committee Chair
Jan Kofron, Charles University

Organising Committee Chair
Radek Koci, Brno University of Technology
Concurrency mailing list
Concurrency <at> listserver.tue.nl
Ravi JHAWAR | 1 Apr 14:13 2015

CFP: Graphical Models for Security - GraMSec 2015 (LNCS proceedings)


GraMSec 2015
The Second International Workshop on Graphical Models for Security
Co-located with CSF 2015

Verona, Italy - July 13, 2015 

***** Springer's LNCS proceedings confirmed *****

Graphical security models provide an intuitive but systematic
methodology to analyze security weaknesses of systems and to evaluate
potential protection measures. Formal methods and computer security
researchers, as well as security professionals from industry and
government, have proposed various graphical security modeling schemes.
Such models are used to capture different security facets (digital,
physical, and social) and address a range of challenges including
security assessment, risk analysis, automated defensing, secure
services composition, policy validation and verification. The
objective of GraMSec is to contribute to the development of
well-founded graphical security models, efficient algorithms for their
analysis, as well as methodologies for their practical usage.

The workshop seeks submissions from academia, industry, and government
presenting novel research on all theoretical and practical aspects of
graphical models for security. The topics of the workshop include, but
are not limited to:
- Attack trees, attack graphs, and their variants
- Petri nets, Markov chains, and Bayesian networks for security
- UML-based models and other graphical modeling approaches for security
- Enhancement and/or optimization of existing graphical security models
- Methods for (semi-)automatic generation of graphical security models
- Scalability of graphical security models
- Software tools for graphical security modeling and analysis
- Risk assessment and risk management using graphical security models
- Methods for quantitative analysis of graphical security models
- Formal semantics of graphical security models
- Formal verification of graphical security models
- Game theoretical approaches to graphical security models
- Visualization of system security
- Visual security modeling and analysis of socio-technical and cyber-physical systems
- Graphical models for system, organizational, and business security
- Graphical security models for emerging paradigms (e.g., Cloud computing, IoT, Software Defined Networks, Big Data)
- Case studies and experience reports on the use of graphical security models

We solicit two types of submissions:
- Regular papers (up to 15 pages) describing original and unpublished
  work within the scope of the workshop.
- Tool papers (up to 5 pages) describing software supporting graphical
  security modeling, analysis, and evaluation. Tool papers will be
  presented during a special tool session.

All submissions must be prepared using the LNCS style.

Each paper will undergo a thorough review process. All accepted  
(regular and tool) papers will be included in the workshop's 
post-proceedings, which will be published by Springer in the 
Lecture Notes in Computer Science (LNCS) series. Submissions should 
be made using the GraMSec'15 EasyChair web site.

Submission deadline: April 19, 2015
Acceptance notification: May 26, 2015
Camera ready version: June 15, 2015
Workshop: July 13, 2015

Sushil Jajodia, George Mason University, USA

Sjouke Mauw, University of Luxembourg, LU
Barbara Kordy, INSA Rennes, IRISA, FR

- Mathieu Acher, IRISA, France
- Massimiliano Albanese, George Mason University, USA
- Ludovic Apvrille, Institut Mines-Telecom, Telecom ParisTech, CNRS LTCI, France
- Thomas Bauereiss, DFKI GmbH, Germany
- Giampaolo Bella, University of Catania, Italy
- Stefano Bistarelli, University of Perugia, Italy
- Ahto Buldas, Cybernetica, Estonia
- Jason Crampton, Royal Holloway University of London, UK 
- Frederic Cuppens, Telecom Bretagne, France
- Mathias Ekstedt, Royal Institute of Technology, Sweden
- Olga Gadyatskaya, University of Luxembourg, Luxembourg
- Paolo Giorgini, University of Trento, Italy
- Erlend Andreas Gjare, SINTEF, Norway
- Dieter Gollmann, TU Hamburg, Germany
- Olivier Heen, Technicolor, France
- Siv Hilde Houmb, Secure-NOK AS, and Gjovik University College, Norway
- Ravi Jhawar, University of Luxembourg, Luxembourg
- Henk Jonkers, BiZZdesign, The Netherlands
- Jan Jurjens, Technical University Dortmund, Germany
- Jean-Louis Lanet, INRIA, France
- Gurvan Le Guernic, DGA Maitrise de l'Information, France 
- Dong Seong Kim, University of Canterbury, New Zealand
- Per Haakon Meland, SINTEF, Norway
- Jogesh Muppala, HKUST, Hong Kong
- Flemming Nielson, Technical University of Denmark, Denmark 
- Steven Noel, MITRE and George Mason University, USA 
- Andreas L. Opdahl, University of Bergen, Norway
- Stephane Paul, Thales Research and Technology, France
- Wolter Pieters, TU Delft and University of Twente, The Netherlands
- Ludovic Pietre-Cambacedes, EDF, France 
- Sophie Pinchinat, University Rennes 1, IRISA, France
- Vincenzo Piuri, University of Milan, Italy
- Cristian Prisacariu, University of Oslo, Norway
- Nicolas Prigent, Supelec, France
- Christian W. Probst, Technical University of Denmark, Denmark
- David Pym, University College London, UK
- Sasa Radomirovic, ETH Zurich, Switzerland
- Indrajit Ray, Colorado State University, USA
- Arend Rensink, University of Twente, The Netherlands
- Yves Roudier, EURECOM, France
- Pierangela Samarati, University of Milan, Italy
- Guttorm Sindre, Norwegian University of Science and Technology, Norway
- Ketil Stolen, Sintef, Norway
- Axel Tanner, IBM Research Zurich, Switzerland
- Kishor S. Trivedi, Duke University, USA
- Luca Vigano, King's College London, UK
- Lingyu Wang, Concordia University, Canada
- Jan Willemson, Cybernetica, Estonia

This call for papers and additional information about the workshop
can be found at http://gramsec.uni.lu/
Concurrency mailing list
Ismael Rodríguez | 30 Mar 14:42 2015

Re: CONCUR 2015 - Call for papers

Our apologies if you have received multiple copies.
(second and last) CALL FOR PAPERS: CONCUR 2015
Madrid, Spain
1-4 September, 2015
Conference website:
This call for papers, including PC members and invited speakers, is also available to
download as a PDF:
The 26th Conference on Concurrency Theory will take place in Madrid, from 1st to 4th
September, 2015. It will be co-located with the 12th QEST, the 13th FORMATS, the 10th
TGC, the WS-FM/BEAT, and a collection of Workshops, thus producing our "Madrid meet 2015"
The purpose of the CONCUR conferences is to bring together researchers, developers and
students in order to contribute to the development and dissemination of the theory of
concurrency and its applications. Twenty five years after our first meeting in 1990,
it is still the reference annual event for researchers in this field.
The host this year will be the "Universidad Complutense de Madrid", close to the
historical and (new) business center of Madrid, the capital of Spain.
Submissions are solicited in semantics, logics, verification and analysis of concurrent
systems. The main topics are (but are not strictly limited to):
- Basic models of concurrency: abstract machines, domain theoretic models, game theoretic
  models, categorical models, process algebras, graph transformation systems, coalgebraic
  models, and Petri nets;
- Logics for concurrency: modal logics, probabilistic and stochastic logics, temporal
  logics, and resource logics;
- Models of specialized systems: biology-inspired systems, circuits, hybrid systems,
  mobile and collaborative systems, multi-core processors, probabilistic systems,
  real-time systems, service oriented computing, synchronous systems, and cloud computing;
- Verification and analysis techniques for concurrent systems: abstract interpretation,
  atomicity checking, model checking, race detection, pre-order and equivalence checking,
  run-time verification, state-space exploration, static analysis, testing, theorem
  proving, and type systems;
- Related programming models: distributed, component based, object-oriented, and web
- Security issues in concurrent systems.
Submissions will be in electronic form via EasyChair
The usage of pdflatex and the LIPIcs style file
are mandatory: no changes to font size, page geometry etc. are permitted. Authors are
invited to submit a draft of at most 13 pages including references. Submissions not in
the correct format or submitted after the deadline will not be considered.
If necessary, the paper may be supplemented with a clearly marked appendix, which will be
reviewed at the discretion of the program committee and the reviewers.
As usual, for an accepted paper to be included in the proceedings, one of the authors
must commit to presenting the paper at the conference.
All papers must be original and unpublished. Simultaneous submission to other conferences
or workshops with published proceedings or to journals is not allowed. Exceptionally,
however, concurrent submissions to CONCUR and TGC are allowed, and, in fact encouraged,
for those paper that may potentially enhance both conferences. Authors of such double
submissions should identify them to the Program Chairs at the time of submission (by
choosing the "Regular paper submitted also to TGC" category in the EasyChair site).
Reviews may be shared between CONCUR and TGC. Submissions accepted by CONCUR will be
considered automatically withdrawn from TGC.
For the first time this year CONCUR will have an open publication of its proceedings,
initiating a new collection in LIPIcs (Leibniz International Proceedings in Informatics),
published under an open access license by Dagstuhl Publishing. As usual, the Proceedings
will be (e-)available (now to everybody!) before the conference. Authors will retain full
rights over their work. The accepted papers will be published under a CC-BY license.
The best papers accepted to CONCUR 2015 will be invited to submit a full/extended version
to a premium special issue in the Springer journal Acta Informatica. Premium special issues
are a new offer by Springer for a small selection of top conferences. It means unrestricted
open access, without any fee at all neither for the authors, nor for the Editors of each
Submission of Abstracts: April 13th, 2015
Submission of Papers: April 20th, 2015 (firm)
Notification: June 15th, 2015
Final version: July 3rd, 2015
Email:  concur2015-OeTanhCOBDI@public.gmane.org
Concurrency mailing list
Nickovic Dejan | 3 Apr 00:25 2015

CfP: RV'15 - The 15th International Conference on Runtime Verification

                 CALL FOR PAPERS

                15th International Conference on
                      Runtime Verification

                        Vienna, Austria
                      22-25 September 2015


RV'15, the 15th International Conference on Runtime Verification,
will take place at Vienna University of Technology, Vienna, Austria,
from 22 to 25 September 2015.

** Scope **

Runtime verification is concerned with monitoring and analysis of
software and hardware system executions.  Runtime verification
techniques are crucial for system correctness, reliability, and
robustness; they are significantly more powerful and versatile than
conventional testing, and more practical than exhaustive formal
verification. Runtime verification can be used prior to deployment,
for testing, verification, and debugging purposes, and after
deployment for ensuring reliability, safety, and security and
for providing fault containment and recovery as well as online
system repair. Topics of interest to the conference include:

    - specification languages
    - specification mining
    - program instrumentation
    - monitor construction techniques
    - logging, recording, and replay
    - fault detection, localization, containment, recovery and repair
    - program steering and adaptation
    - metrics and statistical information gathering
    - combination of static and dynamic analyses
    - program execution visualization
    - monitoring techniques for safety/mission-critical systems
    - monitoring distributed systems, cloud services, and big data applications
    - monitoring security and privacy policies

Application areas of runtime verification include safety/mission-critical
systems, enterprise and systems software, autonomous and reactive control
systems, health management and diagnosis systems, and system security and privacy.

** Invited Speakers **

Patrice Godefroid, Microsoft Research, USA
Sriram Sankaranarayanan, University of Colorado Boulder, USA
Georg Weissenbacher, Vienna University of Technology, Austria

** General Chair **

Radu Grosu, Vienna University of Technology, Austria

** Program Chairs **

Ezio Bartocci, Vienna University of Technology, Austria
Rupak Majumdar, Max Planck Institute, Germany

** Tool Chair/Publicity Chair **

Dejan Nickovic, Austrian Institute of Technology, Austria

** Program Committee **

Thomas Ball, Microsoft, USA
Howard Barringer, University of Manchester, UK
Ezio Bartocci, Vienna University of Technology, Austria (PC Chair)
David Basin, ETH Zurich, Switzerland
Andreas Baurer, TU Munich, Germany
Saddek Bensalem, VERIMAG, France
Eric Bodden, TU Darmstadt, Germany
Borzoo Bonakdarpour, McMaster University, Canada
Luca Bortolussi, University of Trieste, Italy
Laura Bozzelli, UPW, Spain
Rohit Chadha, University of Missouri, USA
Satish Chandra, Samsung Electronics, USA
Dino Distefano, Facebook, UK
Alastair Donaldson, Imperial College London, UK
Alexandre Donzé, UC Berkeley, USA
Georgios Fainekos, Arizona State University, USA
Yliès Falcone, University of Grenoble I, France
Bernd Finkbeiner, Saarland University, Germany
Milos Gligoric, University of Illunois at Urbana-Champaign, USA
Radu Grosu, Vienna University of Technology, Austria (General Chair)
Kim Larsen, Aalborg Univeristy, Denmark
Insup Lee, University of Pennsylvania, USA
Klaus Havelund, NASA JPL, USA
Aditya Kanade, Indian Institute of Science, India
Panagiotis Katsaros, Aristotle University of Thessaloniki, Greece
Safraz Khurshid, The University of Texas at Austin, USA
Marta Kwiatkowska, University of Oxford, UK
Axel Legay, INRIA Rennes, France
Martin Leucker, University of Lübeck, Germany
Rupak Majumdar, Max Planck Institute, Germany (PC Chair)
Oded Maler, VERIMAG, France
Leonardo Mariani, University of Milano Bicocca, Italy
Dejan Nickovic, Austrian Institute of Technology, Austria
Joel Ouaknine, Oxford University, UK
Gordon Pace, University of Malta, Malta
Doron Peled, Bar Ilan University, Israel
Pavithra Prabhakar, IMDEA Software Institute, USA
Grigore Rosu, University of Illinois at Urbana-Champaign, USA
Abhik Roychoudhury, National University of Singapore, Singapore
Koushik Sen, UC Berkeley, USA
Scott A. Smolka, Stony Brook University, USA
Oleg Sokolsky, University of Pennsylvania, USA
Bernhard Steffen, TU Dortmund, Germany
Scott D. Stoller, Stony Brook University, USA
Emina Torlak, UC Berkeley, USA
Serdar Taşıran, Koç University, Turkey
Lenore Zuck, University of Illinois at Chicago, USA

**  Research Papers Track **

Research papers can be submitted in two categories: regular and short papers.
Papers in both categories will be reviewed by the conference Program Committee.
All accepted technical papers will appear in an LNCS volume. Submitted papers
must use the LNCS style. At least one author of each accepted paper
must attend RV’15 to present the paper. Papers must be submitted electronically
using the EasyChair system.

* Regular Papers *

Regular Papers (up to 15 pages) should present original unpublished results.
Theoretical and experimental papers as well as papers on applications of runtime
verification and case studies are all welcome.  The Program Committee of RV 2015
will give this year a best paper award. The Best Paper Award recipient is given
public recognition and will receive one high-end NVIDIA GPU equipment (Titan Black
for a value of $1,150) donated by NVIDIA.
A selection of accepted regular papers will be invited to appear in a special issue of
the Springer Journal on Formal Methods in System Design.

* Short Papers *
Short Papers (up to 5 pages) may present novel but not necessarily thoroughly
worked out ideas, for example emerging runtime verification techniques and applications,
or techniques and applications that establish relationships between runtime verification
and other domains. Accepted short papers will be presented in special short talk
(10 minutes) and poster sessions.

** Tool Demonstration Track **

The aim of the RV 2015 tool demonstration track is to provide an opportunity
for researchers and practitioners to show and to discuss the latest advances,
experiences and challenges in devising and developing reliable software tools
for runtime verification. Tool demonstration papers will be reviewed by the
Tools Track Program Committee. All accepted tool demonstration papers will
appear in the conference proceedings LNCS volume. Submitted papers must use
the LNCS style. At least one author of each accepted paper must attend RV’15
to present the paper. Papers must be submitted electronically using the
EasyChair system.

Tool papers should meet the following criteria:

    - A tool paper should present a new tool, a new tool component or novel
      extensions to existing tools supporting runtime verification. Each
      submission should be original and not published previously in a tool paper form.
    - Each submission must not exceed 8 pages in the LNCS/Springer proceeding
      format, including all text, references and figures. The paper must be
      written in English and provided in PDF format.
    - Each submission must be accompanied at the time of the submission by a
      short screencast (between 5-10 minutes), with voice and overlay text
      commentary illustrating the demonstration of the tool (a link to it
      should be provided in the paper).
    - The paper must include information on tool availability, maturity,
      selected experimental results and it should provide a link to a
      website containing the theoretical background and user guide.
      Furthermore, we strongly encourage authors to make their tools and
      benchmarks available with their submission.
    - Each tool paper must include a script in an appendix (not included
      in the page count) describing how the demo will be conducted during
      the conference presentation with screenshots presenting step-by-step
      the tool’s capabilities, highlighting the main characteristics and
      the usage.

* Tool Evaluation *

Each submission will be reviewed by at least four members of the tool demonstration
track program committee. The evaluation criteria will include:

    - the presentation quality
    - the availability (possibly in a open-source format) of the software.
    - the relevance for the Runtime Verification audience
    - the technical soundness of the presented tool
    - the originality of the underlying ideas

* Tool Demonstration Committee *

Dejan Nickovic, Austrian Institute of Technology, Austria, Chair
Alexandre Donzé, UC Berkeley, USA
Martin Leucker, University of Lübeck, Germany
Milos Gligoric, University of Illunois at Urbana-Champaign, USA
Eugen Zalinescu, ETH Zurich, Switzerland
Gordon Pace, University of Malta, Malta

Important Dates:

Both research papers and tool demonstration tracks and the call
for tutorials will follow the following timeline:

Abstract deadline: April 12, 2015
Paper and submission deadline: April 19, 2015
Paper and Notification: May 31, 2015
Camera Ready submission: June 15, 2015
Conference dates: September 22-25, 2015




Dejan Nickovic
Senior Scientist
Department Digital Safety and Security

Business Unit Safe and Autonomous Systems

AIT Austrian Institute of Technology GmbH
Donau-City-Straße 1  |  1220 Vienna  | Austria
T +43(0) 50550-4021 | M +43(0) 66488-390038  |  F +43(0) 50550-4150
dejan.nickovic-c/U4JCCwIJZeoWH0uzbU5w@public.gmane.org  |  http://www.ait.ac.at


FN: 115980 i HG Wien  |  UID: ATU14703506
This email and any attachments thereto, is intended only for use by the addressee(s) named herein and may contain legally privileged and/or confidential information. If you are not the intended recipient, please notify the sender by return e-mail or by telephone and delete this message from your system and any printout thereof. Any unauthorized use, reproduction, or dissemination of this message is strictly prohibited. Please note that e-mails are susceptible to change. AIT Austrian Institute of Technology GmbH shall not be liable for the improper or incomplete transmission of the information contained in this communication, nor shall it be liable for any delay in its receipt.


Concurrency mailing list
Konev, Boris | 31 Mar 19:16 2015

Postdoctoral position at Liverpool

The University of Liverpool, Department of Computer Science, invites applications for a 

Postdoctoral Research Associate Position

in the EPSRC-funded project 

	Islands of Tractability in Ontology-Based Data Access

The position is available for three years starting July 1st, 2015.

The research associate will work under the supervision of Professor Frank Wolter in a joint
project with Dr Boris Konev and Dr Andre Hernich. The topic is theory and practice of 
ontology-based query answering for expressive ontology languages focusing on classes of
tractable ontology-based queries.  

Candidates should have a PhD in Computer Science, Logic, or Mathematics and relevant expertise in 
computational logic, complexity theory, database theory, or knowledge representation and reasoning.

For further details and application procedures, see 


Boris Konev
University of Liverpool
Department of Computer Science
Liverpool, L69 3BX, UK
Email: konev@...
Tel: (+44) 151 795 4260
URL: http://www.csc.liv.ac.uk/~konev

Concurrency mailing list