Fast Abstracts are lightly-reviewed 2-page manuscripts in IEEE format describing unpublished, in-progress, novel work, opinions or ideas that address any issue relevant to dependability. Major topics of interest can be found in the LADC Call for Papers. Fast Abstracts are a good opportunity for authors to share preliminary results, speculate on new directions to open problems or to present challenging or controversial issues.
To promote the discussion even with a remote conference, we plan to organize the session as a dynamic sequence of 5-mins slots to present each accepted work. At the end of the session, we will award the i) most challenging work and ii) most attractive presentation and provide the two presenters with a certificate.
Submission deadline for Fast Abstracts is purposedly set after Notification deadline of the main track of the conference. This allows resubmitting a rejected paper as a Fast Abstract, to present it in a way other than a full research paper, which may better suit your work.
- Paper submission: Sep 27, 2021.
- Author notification: Oct 08, 2021.
- Camera Ready: Oct 13, 2021.
Academics and industrial practitioners are invited to submit fast abstracts limited to two pages (IEEE double-column format). Accepted papers will be published in the supplemental volume of the LADC 2021 proceedings published by SBC. If accepted, the corresponding author is committing to present the paper at the conference.
Papers must be submitted via JEMS.
Major topics include, but are not limited to:
- Fault-tolerant hardware architectures, multi-core systems, virtualization, nanoscale computers, hardware dependability assessment.
- Frameworks and software architectures for dependability, runtime monitoring, adaptation, model-driven dependability engineering, testing, verification & validation, software certification.
- Dependability of networks (LAN, WAN, mobile, ad-hoc, sensor networks, protocols, SDN).
- Dependability of data storage and databases.
- Dependability and human issues, human-computer interaction, management of complex systems.
- Security foundations, policies, protocols, access control, intrusion detection, intrusion tolerance.
- Incidents & accidents, risk perception and analysis, safety-critical applications and systems.
- Critical infrastructure protection.
- Dependability and security modeling, measurement and benchmarking.
- Dependability of maintenance, tuning performance and availability, security configuration.