JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for CPHC-CONF Archives


CPHC-CONF Archives

CPHC-CONF Archives


cphc-conf@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

CPHC-CONF Home

CPHC-CONF Home

CPHC-CONF  April 2018

CPHC-CONF April 2018

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

Call For Participation: CF18 - Final Program / Early Registration April 13

From:

Jose Cano <[log in to unmask]>

Reply-To:

Jose Cano <[log in to unmask]>

Date:

Tue, 10 Apr 2018 21:47:22 +0100

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (366 lines)

==================================================================
  ACM International Conference on Computing Frontiers 2018 (CF'18)
                  May 8 - 10, 2018, Ischia, Italy

                      CALL FOR PARTICIPATION

                    www.computingfrontiers.org
==================================================================

EXTENDED Early Registration Deadline: April 13, 2018

The ACM International Conference on Computing Frontiers 2018 will be
held May 8 - 10 in Ischia, Italy. Computing Frontiers is an eclectic,
collaborative community of researchers who investigate emerging
technologies in the broad field of computing: our common goal is to
drive the scientific breakthroughs that transform society. Technology
is experiencing revolutions in memory devices and systems, networks,
electronic device production, machine learning, data analytics, cloud
computing, techniques to improve power and energy efficiency, systems
portability/wearability, to name but a few areas. New application
domains that affect everyday life are emerging, especially in the era
of highly interconnected and collaborative cyber-physical systems.
Boundaries between the state-of-the-art and revolutionary innovation
constitute the frontiers that mark the advances of science,
engineering, and information technology.




FINAL PROGRAM
===============================

ACM Computing Froniers 2018 runs for 3 days. See our website
for the exact schedule. For the papers to be presented in the
various sessions and workshops, see below.

We will have
- two keynotes, a panel,
- 8 technical sessions (some topics below split into 2 sessions)
- 2 short paper sessions associated with a poster session,
- special sessions on large graph analytics and EU projects,
- 4 half-day workshops in parallel to the main track




KEYNOTES
===============================

We are pleased to announce the following keynote talks.

Arvind (CSAIL, MIT): Low-Power Appliances for Big-Data Analytics Using
   Flash Storage and Hardware Accelerators

Rosa M. Badia (Barcelona Supercomputing Center): Programmability
   versus Performance Tradeoff: Overcoming the Hardware Challenges from
   a Task-Based Approach




TECHNICAL SESSIONS
===============================



APPLICATIONS
-------------------------------

FreeDA: Deploying Incompatible Stock Dynamic Analyses in Production
via Multi-Version Execution. Luís Pina, Anastasios Andronidis, and
Cristian Cadar

Disease gene identification by walking on multilayer heterogeneous
networks.  Cangfeng Ding and Kan Li

Similarity based classification of ADHD using Singular Value
Decomposition.  Taban Eslami and Fahad Saeed

MOCL: An Efficient OpenCL Implementation for the Matrix-2000
Architecture.  Peng Zhang, Jianbin Fang, Canqun Yang, Tao Tang, Chun
Huang and Zheng Wang

QUENN: QUantization Engine for low-power Neural Networks. Miguel de
Prado Escudero, Maurizio Denna, Luca Benini and Nuria Pazos

Evaluating the Impact of Pushing Voice-Driven Interaction Pipelines to
the Edge.  Smruthi Sridhar and Matthew E. Tolentino


ARCHITECTURE
-------------------------------

Adaptive and Polymorphic VLIW Processor to Optimize Fault Tolerance,
Energy Consumption, and Performance.  Anderson Luiz Sartor, Arthur
F. Lorenzon, Sandip Kundu, Israel Koren and Antonio Carlos S. Beck

MIComp: 3D On-chip Magneto-Inductive Computing with Simultaneous
Wireless Information and Power Transfer. Burhan Gulbahar and Gorkem
Memisoglu

An FPGA Framework for Edge-Centric Graph Processing. Shijie Zhou,
Rajgopal Kannan, Hanqing Zeng and Viktor Prasanna


MEMORY SYSTEMS
-------------------------------

A Prefetch-Aware Memory System for Data Access Patterns in Multimedia
Applications. Tareq Alawneh and Ahmed Elhossini

Flexible Associativity for DRAM Caches. Elvira Teran, Zeshan Chishti,
Zhe Wang, Chris Wilkerson and Daniel A. Jimenez

A File System Bypassing Volatile Main Memory: Towards A Single-Level
Persistent Store. Deng Zhou, Wen Pan, Tao Xie and Wei Wang

A methodology for efficient code optimizations and memory management.
Vasilis Kelefouras and Karim Djemame

Design space exploration for PIM architectures in 3D-stacked memories.
Joýo P. C. Lima, Paulo C. Santos, Marco A. Z. Alves, Antonio
C. S. Beck and Luigi Carro

CMH: Compression Management for Improving Capacity in the Hybrid
Memory Cube.  Cheng Qian, Bruce Childers, Libo Huang, Qi Yu and
Zhiying Wang


RESILIENCE
-------------------------------

Modeling SSD RAID Reliability under General Settings. Zhiyong Wu,
Yongkun Li, Patrick P. C. Lee and Yinlong Xu

On The Theory of Speculative Checkpointing: Time and Energy
Considerations.  Omer Subasi and Sriram Krishnamoorthy

Comparative Analysis of Soft-Error Detection Strategies: A Case Study
with Iterative Methods.  Gokcen Kestor, Burcu Ozcelik Mutlu, Joseph
Manzano, Omer Subasi, Osman Unsal and Sriram Krishnamoorthy


SECURITY
-------------------------------

Vulnerability Analysis of Android Auto Infotainment Apps. Amit
Mandal, Agostino Cortesi, Pietro Ferrara, Federica Panarotto and
Fausto Spoto

VPsec: Countering Fault Attacks in General Purpose Microprocessors
with Value Prediction.  Rosario Cammarota and Rami Sheikh


MISCELLANEOUS
-------------------------------

Opportunistic Named Functions in Disruption-tolerant Emergency
Networks.  Pablo Graubner, Patrick Lampe, Jonas Höchst, Lars
Baumgärtner, Mira Mezini and Bernd Freisleben

GANFuzz: A GAN-based industrial network protocol fuzzing framework.
Zhicheng Hu, Jianqi Shi, Yanhong Huang, Jiawen Xiong and Xiangxing Bu

Taming Irregular Applications via Advanced Dynamic Parallelism on
GPUs.  Jing Zhang, Ashwin Aji, Michael Chu, Hao Wang and Wu-Chun Feng




SHORT PAPERS AND POSTERS
===============================

Comparative Realization of Error Detection Schemes for Implementations
of MixColumns in Lightweight Cryptography.  Anita Aghaie, Mehran
Mozaffari Kermani and Reza Azarderakhsh

Reliable Hardware Architectures for Efficient Secure Hash Functions
ECHO and Fugue.  Mehran Mozaffari Kermani, Reza Azarderakhsh and
Siavash Bayat-Sarmadi

Gathering and Analyzing Identity Leaks for a proactive Warning of
affected Users.  Timo Malderle, Matthias Wübbeling, Sven Knauer and
Michael Meier

Comprehensive Assessment of Run-Time Hardware-Supported Malware
Detection Using General and Ensemble Learning.  Hossein Sayadi, Sai
Manoj Pudukotai Dinakarrao, Setareh Rafatirad and Houman Homayoun

Network-on-Chip Evaluation for a Novel Neural Architecture.  Markos
Kynigos, Javier Navaridas, Luis Plana and Steve Furber

D3NOC: A Dynamic Data-Driven Hybrid Photonic Plasmonic NoC.  Armin
Mehrabian, Shuai Sun, Vikram Narayana, Jeff Anderson, Jiaxin Peng,
Volker Sorger and Tarek El-Ghazawi

Dual-Threshold Directed Execution Progress Maximization for
Nonvolatile Processors.  Dongqin Zhou, Keni Qiu and Yongpan Liu

An area and power efficient on-the-fly LBCS transformation for
implantable neuronal signal acquisition systems.  Cosimo Aprile,
Johannes Wüthrich, Luca Baldassarre, Yusuf Leblebici and Volkan Cevher

Automatic Instrumentation of Dataflow Application using PAPI.  Daniel
Madroñal, Raquel Lazcano, Antoine Morvan, Ruben Salvador, Karol
Desnos, Eduardo Juarez and Cesar Sanz

Make Software Harder.  Benjamin Andreassen Bjørnseth, Jan Christian
Meyer and Lasse Natvig

GPU Power Prediction via Ensemble Machine Learning for DVFS Space
Exploration.  Bishwajit Dutta, Vignesh Adhinarayanan and Wu-Chun Feng

A Decoupled Access-Execute Architecture for Reconfigurable
Accelerators.  George Charitopoulos, Charalampos Vatsolakis, Grigorios
Chrysos and Dionisios Pnevmatikatos

APAT: An Access Pattern Analysis Tool For Distributed Arrays.  Engin
Kayraklioglu and Tarek El-Ghazawi

Horizon: A Multi-abstraction Framework for Graph Analytics.  Adnan
Haider, Fabio Checconi, Xinyu Que, Lars Schneidenbach, Daniele Buono
and Xian-He Sun

Online Anomaly Detection Framework for Spark Systems via Stage-Task
Behavior Modeling.  Rui Ren, Shuai Tian, Jianfeng Zhan and Lei Wang

RRPNN:Review Rating Prediction Neural Network with Distributed
Representation of Users and Products.  Weilin Liu




SPECIAL SESSIONS
===============================


LARGE SCALE GRAPH ANALYTICS
-------------------------------

GraphBLAS: Handling performance concerns in large graph analytics.
Manoj Kumar

Streaming Graph Analysis: New Models, New Architectures. Jason Riedy

A Hybrid Data Model for Large-Scale Analytics.  John Feo


EUROPEAN AND NATIONAL PROJECTS
-------------------------------

Autotuning and Adaptivity in Energy Efficient HPC Systems: The ANTAREX
toolbox.  Gianluca Palermo

LEGaTO Project: Towards Energy-Efficient, Secure, Fault-tolerant
Toolset for Heterogeneous Computing.  Osman Unsal, Adrián Cristal

HPC4AI: an AI-on-demand federated platform endeavor.  Marco Aldinucci

The SAGE Project: a Storage Centric Approach for Exascale Computing.
Stefano Markidis




WORKSHOPS
===============================

There will be the following four half-day workshops, in parallel to
the main track of the conference:


WORKSHOP 1
International Workshop on Big Data Analytics (BigDAW '18)
-------------------------------

Data cube and cloud resources as platform for seamless geospatial
computation.  Giuliano Andrea Pagani and Luca Trani

Improving Public Datasets Markings’ Quality using Unsupervised
Refinement Kernels.  Anca Ioana Petre, Cosmin Toca, Carmen Patrascu
and Mihai Ciuc

The D.A.V.I.D.E. Big-Data-Powered Fine-Grain Power and Performance
Monitoring Support.  Andrea Bartolini, Andrea Borghesi, Antonio Libri,
Francesco Beneventi, Daniele Gregori, Simone Tinti, Cosimo Gianfreda
and Piero Altoe


WORKSHOP 2
Malicious Software and Hardware in the Internet of Things (MAL-IoT '18)
-------------------------------

Hash-based signatures for the Internet of Things.  Paolo Palmieri

Higher Order Side-Channel Attacks Resilient S-boxes.  Liran Lerman,
Stjepan Picek, Nikita Veshchikov and Olivier Markowitch

Digital Signatures and Signcryption Schemes on Embedded Devices: a
Trade-off between Computation and Storage.  Jori Winderickx, An
Braeken, Dave Singelée, Roel Peeters, Thijs Vandenryt, Ronald Thoelen
and Nele Mentens



WORKSHOP 3
4th Workshop on Design of Low Power EMbedded Systems (LP-EMS '18),
-------------------------------

Power Modeling on FPGA: A Neural Model for RT-Level Power Estimation.
Yehya Nasser, Jean-Christophe Prevotet and Maryline Helard

Always-ON Visual node with a Hardware-Software Event-Based Binarized
Neural Network Inference Engine.  Manuele Rusci, Davide Rossi, Eric
Flamand, Massimo Gottardi, Elisabetta Farella and Luca Benini

A constrained extremum-seeking control for CPU thermal management.
Federico Reghenzani, Simone Formentin, Giuseppe Massari and William
Fornaciari

Thermal Image-Based CNN’s for Ultra-Low Power People Recognition.
Andres Gomez, Francesco Conti and Luca Benini


WORKSHOP 4
Workshop on Sensor Data Fusion and Machine Learning for the Next
Generation of Cyber-Physical Systems (SeFuMAL '18)
-------------------------------

Machine Learning Application for Patients Activity Recognition with
Pressure Sensing in Bed.  Shengwei Luo, Chunhui Zhao, Limin Lu and
Yongji Fu

Learning-Based Indoor Localization for Industrial Applications.
Hendrik Laux, Andreas Bytyn, Gerd Ascheid, Anke Schmeink, Gunes
Karabulut Kurt and Guido Dartmann

Supporting Sensor Orchestration in Non-Stationary Environments.
Christoph-Alexander Holst and Volker Lohweg

Forest Fire Detection using Spiking Neural Networks. Yuling Luo, Qian
Lu, Junxiu Liu, Qiang Fu, Jim Harkin, Mcdaid Liam, Jordi
Martínez-Corral and Guillermo Biot-Marí

Distributed learning-based state prediction for multi-agent systems
with reduced communication effort.  Daniel Hinkelmann, Anke Schmeink
and Guido Dartmann




FURTHER INFORMATION
===============================

For further details and registration, check out our web site at

   http://computingfrontiers.org

Early registration ends on April 13, 2018.



-- 
The University of Edinburgh is a charitable body, registered in
Scotland, with registration number SC005336.

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

May 2024
April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
August 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
August 2008
July 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
August 2007
July 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
2006
2005
2004
2003
2002
2001
2000
1999
1998


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager