ISARCS 2013: SUBMISSION DEADLINE EXTENDED BY TWO WEEKS

1 view
Skip to first unread message

Davide Falessi

unread,
Feb 8, 2013, 9:05:26 AM2/8/13
to software-arch...@googlegroups.com

ATTENTION: SUBMISSION DEADLINE EXTENDED BY TWO WEEKS

--------------------------------------------------------------------------------------
    CALL FOR PAPERS
4TH ACM SIGSOFT International Symposium on Architecting Critical Systems (ISARCS 2013)
   Vancouver, Canada, June 17-21, 2013
     http://isarcs.comparch2013.org/

  (part of the CompArch federated conference series)
  Supported by ACM SIGSOFT (http://www.sigsoft.org/)


--------------------------------------------------------------------------------------

ISARCS is the premier symposium in the area of architectural design for dependable, safe and secure systems. It provides an exclusive forum for exchanging views on the theory and practice for architecting critical systems. A critical system is characterized by the perceived severity of consequences that system failures may cause. In that respect, in addition to appropriate development methods, techniques and tools, a critical system also requires the provision of assurances that it is able to fulfill its specified service.

As software systems continue to pervade every facet of our daily lives, our dependence on their safety, security, availability, and reliability grows. It has become increasingly clear that the architecture of a critical software system plays a crucial role in fulfilling its dependability requirements. This has called for effective methods, techniques, and tools that take architectural concerns into consideration during the design, construction, testing, maintenance, and upgrade of such systems.


ISARCS welcomes submissions from both industry and academia, including, but not limited to, the following topics:

- Architectural knowledge and patterns for critical systems
- Tools for construction, design, and testing of critical systems
- Architectural description languages, models, and notations
- Design techniques for software safety and security
- Testing and analysis of critical systems
- Self-healing and self-protecting critical systems
- Evolution and maintenance of critical systems
- Fault tolerant software design
- Industrial reports, case studies, and application domains
- Formal methods, model checking, and theorem proving for critical software design
- Emerging techniques for the construction of critical systems (MDE, AOP, etc.)

--------------------------------------------------------------------------------------

Reply all
Reply to author
Forward
0 new messages