ICA3PP 2019

19th International Conference on Algorithms and Architectures for Parallel Processing
Melbourne, Australia
9-11 Dec 2019

About ICA3PP 2019

ICA3PP 2019 is the 19th in this series of conferences started in 1995 that are devoted to algorithms and architectures for parallel processing. ICA3PP is now recognized as the main regular event of the world that is covering the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems. As applications of computing systems have permeated in every aspect of daily life, the power of computing system has become increasingly critical. This conference provides a forum for academics and practitioners from countries around the world to exchange ideas for improving the efficiency, performance, reliability, security and interoperability of computing systems and applications.

Following the traditions of the previous successful ICA3PP conferences held in Hangzhou, Brisbane, Singapore, Melbourne, Hong Kong, Beijing, Cyprus, Taipei, Busan, Melbourne, Fukuoka, Vietri sul Mare, Dalian, Japan, Zhangjiajie, Granada, Helsinki, and Guangzhou, ICA3PP 2019 will be held in Melbourne, Australia. The objective of ICA3PP 2019 is to bring together researchers and practitioners from academia, industry and governments to advance the theories and technologies in parallel and distributed computing. ICA3PP 2019 will focus on two broad areas of parallel and distributed computing, i.e. architectures, algorithms and networks, and systems and applications. The conference of ICA3PP 2019 will be organized by Swinburne University of Technology, Australia.

Important Dates

Paper Submission Due24 Jun 2019 Extended to 8 July 2019 Extended to 18 July 2019
Author Notification24 Jul 2019 Extended to 15 August 2019 Extended to 25 August 2019
Camera-ready Paper Due14 Aug 2019 Extended to 28 Aug 2019 Extended to 7 Sep 2019
Registration Due25 Sep 2019
Conference Date9-11 Dec 2019

News & Updates

Conference Program is online
Conference program is online. View Program New
Author notification extended
Due to the large volume of submissions, the author notification is extended by one day (to 26 August). We appreciate your understanding.
Submission due date extended
The submission due date for ICA3PP 2019 is extended to 18 July 2019.
Submission due date extended
The submission due date for ICA3PP 2019 is extended to 8 July 2019.
Special issues added.
Special issues for ICA3PP are now added.
Call for paper released.
ICA3PP call for paper is online now. Download PDF

Keynote Speakers

Note: The order of speakers is sorted according to the alphabetical order of surname.

GPU-based Parallel Computing for Real-Time Optimization

Y. Thomas Hou
Virginia Tech
USA

Learn More

Abstract

A holy grail in optimization is to solve large-scale complex mixed integer nonlinear program (MINLP) in real time. Such type of optimization problems is very common in wireless networks, particularly in resource allocation. Traditional, optimal (or near-optimal) solutions to these problems would take much time and cannot be used as practical solutions in the field to meet a system’s real-time requirement. At best, these solutions can only be used as benchmarks to measure the performance of fast heuristics, whose performance may either be severely compromised or can hardly offer any performance guarantee. Recently, in our research on designing a proportional-fair (PF) scheduler for 5G NR, we found that the state-of-the-art GPU can be exploited to offer near-optimal solution to complex optimization problems in real time (e.g., 100 µs time scale). The key ideas in our solution design include (i) decomposing a large-scale complex optimization problem into a massive number of small and independent sub-problems; (ii) selecting a subset of sub-problems from the most promising search space through intensification and random sampling; and (iii) fitting the selected subset of problems into GPU processing cores for very simple computation. In this talk, I will share our experience in this research and show the design of GPF – a GPU-based proportional fair (PF) scheduler that can meet the ∼100 µs time requirement. By implementing our proposed GPF on an off-the-shelf NVIDIA Quadro P6000 GPU, we show that GPF is able to achieve near-optimal performance while meeting the ∼100 µs time requirement. Our design experience shows that a GPU-based parallel computing holds the potential to crack the ever-lasting grand challenge of solving large-scale complex MINLP in real time.

Biography

Tom Hou is the Bradley Distinguished Professor of Electrical and Computer Engineering at Virginia Tech, USA. He received his Ph.D. degree from NYU Tandon School of Engineering (formerly Polytechnic University) in 1998. His current research focuses on developing innovative solutions to complex science and engineering problems arising from wireless and mobile networks. He is particularly interested in exploring new performance limits at the network layer by exploiting advances at the physical layer. In recent years, he has been actively working on real-time optimization based on GPU platform and solving large-scale complex optimization problems for various wireless networks. He is also interested in wireless security. Prof. Hou was named an IEEE Fellow for contributions to modeling and optimization of wireless networks. He has published two textbooks: Cognitive Radio Communications and Networks: Principles and Practices (Academic Press/Elsevier, 2009) and Applied Optimization Methods for Wireless Networks (Cambridge University Press, 2014). Prof. Hou’s research was recognized by five best paper awards from the IEEE and two paper awards from the ACM. He holds five U.S. patents.
In addition to his research activities, Prof. Hou has also been active in the research community. He was an Area Editor of IEEE Transaction on Wireless Communications (Wireless Networking area), and an Editor of IEEE Transactions on Mobile Computing, IEEE Journal on Selected Areas in Communications – Cognitive Radio Series, and IEEE Wireless Communications. Currently, he is an Editor of IEEE/ACM Transactions on Networking and ACM Transactions on Sensor Networks. He is the Steering Committee Chair of IEEE INFOCOM conference – the largest and top ranked conference in networking. He was a member of the Board of Governors as well as a Distinguished Lecturer of the IEEE Communications Society.

Evening Out the Stumbling Blocks for Today’s Blockchain Systems

Hai Jin
Huazhong University of Science and Technology
China

Learn More

Abstract

Blockchain is the fascinating distributed ledger technology, which holds out the promise of disintermediation, transparency, and openness. An increasing number of businesses, academics and even governments are starting to view blockchain systems as the cornerstone of trust the Web 3.0 era (next generation value Internet). This presentation will first trace the source and the current development status of blockchain systems in various application areas. Secondly, a roadmap of the major theoretical and practical challenging issues faced by these blockchain systems will be laid out. Finally, I will give a glimpse of harnessing the super-abundant opportunities of blockchain systems in the future landscape.

Biography

Hai Jin is a Cheung Kung Scholars Chair Professor of Computer Science and Engineering at Huazhong University of Science and Technology. Jin received his Ph.D. in computer engineering from Huazhong University of Science and Technology in 1994. In 1996, he was awarded a German Academic Exchange Service fellowship to visit the Technical University of Chemnitz in Germany. Jin worked at The University of Hong Kong between 1998 and 2000, and as a visiting scholar at the University of Southern California between 1999 and 2000. He was awarded Excellent Youth Award from the National Science Foundation of China in 2001. Jin is the chief scientist of ChinaGrid, the largest grid computing project in China, and the chief scientists of National 973 Basic Research Program Project of Virtualization Technology of Computing System, and Cloud Security.
Jin is a IEEE Fellow, CCF Fellow, and a member of the ACM. He has co-authored 22 books and published over 700 research papers. His research interests include computer architecture, virtualization technology, cluster computing and cloud computing, peer-to-peer computing, network storage, and network security.

5G Mobile Edge Computing: Research Roadmap of the H2020 5G-Coral Project

Ying-Dar Lin
National Chiao Tung University
Taiwan

Learn More

Abstract

5G promises to deliver enhanced mobile broadband (eMBB), massive machine type communication (mMTC), and ultra reliable low latency communication (URLLC). To support mMTC and URLLC, 5G needs to carry out computations closer to subscribers at the “edge” instead of the cloud, which turns 5G into an infrastructure for both communication and computing. Just like cloud computing, edge computing shall also be virtualized. On the other hand, communication is also being virtualized with software defined networking (SDN) and network function virtualization (NFV) which virtualize control plane and data plane, respectively. When applied to 5G, together they virtualize functions in access and core networks, and release them to run on any virtualized computing platform. Combining virtualization needs in edge computing and communication, 5G mobile edge computing (MEC) is virtualizing eNB (evolved node B), EPC (evolved packet core), and CO (central office) into VeNB, vEPC, and CORD (central office re-architected as a datacenter). They are not just communication devices anymore, but also serve as computing datacenters with many open source resources like OpenDaylight and OpenStack. After streamline the above evolution path, we then introduce 5G-Coral, an H2020 EU-TW project with Taiwanese and European partners, including NCTU, ITRI, ADLink, UC3M, Ericsson, InterDigital, Telecom Italia, SICS, Telcaria, and Azcom. We then give an overview of our research roadmap on 5 key components, including service chain routing, multi-RAT offloading, multi-tenant slicing, horizontal and vertical federation, and capacity optimization. Selected results are then presented. Key findings include (1) the 3-tier architecture with edge computing saves about 20.7% capacity cost over the traditional 2-tier architecture, with 70% of capacity allocated to the edges; (2) multi-RAT offloading reduces about 40% capacity cost with a large number of UEs; (3) some use cases in 5G would capture 1.5 to 2.3 times more resource than required if without slicing; (4) the low-latency authentication with MEC reduces over 90% overhead if done with the cloud.

Biography

YING-DAR LIN is a Distinguished Professor of computer science at National Chiao Tung University (NCTU), Taiwan. He received his Ph.D. in computer science from the University of California at Los Angeles (UCLA) in 1993. He was a visiting scholar at Cisco Systems, San Jose, during 2007–2008, CEO at Telecom Technology Center, Taiwan, during 2010-2011, and Vice President of National Applied Research Labs (NARLabs), Taiwan, during 2017-2018. Since 2002, he has been the founder and director of Network Benchmarking Lab (NBL, www.nbl.org.tw), which reviews network products with real traffic and has been an approved test lab of the Open Networking Foundation (ONF) since July 2014. He also cofounded L7 Networks Inc. in 2002, later acquired by D-Link Corp, and O’Prueba Inc. in 2018. His research interests include network security, wireless communications, and network softwarization. His work on multi-hop cellular was the first along this line, and has been cited over 850 times and standardized into IEEE 802.11s, IEEE 802.15.5, IEEE 802.16j, and 3GPP LTE-Advanced. He is an IEEE Fellow (class of 2013), IEEE Distinguished Lecturer (2014–2017), ONF Research Associate, and received in 2017 Research Excellence Award and K. T. Li Breakthrough Award. He has served or is serving on the editorial boards of several IEEE journals and magazines, and is the Editor-in-Chief of IEEE Communications Surveys and Tutorials (COMST). He published a textbook, Computer Networks: An Open Source Approach (www.mhhe.com/lin), with Ren-Hung Hwang and Fred Baker (McGraw-Hill, 2011).

AI Security: A Case in dealing with malicious agents

Wanlei Zhou
University of Technology Sydney
Australia

Learn More

Abstract

Artificial Intelligence is now applied to almost every aspects of our lives, including agriculture, autonomous vehicles, banking, gaming, healthcare, marketing, politics, social networks, etc. However, wide applications of AI also bring serious security issues. For example, disasters may happen if an autonomous car is controlled by a malicious user. One way to address the AI security issues is to make sure that the AI supported applications still function correctly despite the presence of malicious agents. In this presentation we focus on multi-agent security, aiming to overcome two limitations of existing agent advising approaches: the presence of malicious agents giving false advices and the communication overhead. We propose a novel differentially private agent advising approach to overcome the two limitations. We use the differential privacy technique to reduce the impact of malicious agents without identifying them. Also, by adopting the privacy budget concept of differential privacy, the proposed approach can naturally control communication overhead. The experimental results demonstrate the effectiveness of the proposed approach.

Biography

Professor Wanlei Zhou is currently the Head of School of Computer Science in University of Technology Sydney (UTS), Australia. He received the B.Eng and M.Eng degrees from Harbin Institute of Technology, Harbin, China in 1982 and 1984, respectively, and the PhD degree from The Australian National University, Canberra, Australia, in 1991, all in Computer Science and Engineering. He also received a DSc degree (a higher Doctorate degree) from Deakin University in 2002. Before joining UTS, Professor Zhou held the positions of Alfred Deakin Professor, Chair of Information Technology, and Associate Dean (International Research Engagement) of Faculty of Science, Engineering and Built Environment, Deakin University. Professor Zhou has been the Head of School of Information Technology twice (Jan 2002-Apr 2006 and Jan 2009-Jan 2015) and Associate Dean of Faculty of Science and Technology in Deakin University (May 2006-Dec 2008). Professor Zhou also served as a lecturer in University of Electronic Science and Technology of China, a system programmer in HP at Massachusetts, USA; a lecturer in Monash University, Melbourne, Australia; and a lecturer in National University of Singapore, Singapore. His research interests include security and privacy, bioinformatics, and e-learning. Professor Zhou has published more than 400 papers in refereed international journals and refereed international conferences proceedings, including many articles in IEEE transactions and journals.

Conference Schedule

9 Dec10 Dec11 Dec
Room 1Room 2Room 3Room 1Room 2Room 3Room 1Room 2Room 3
Registration
07:45-17:00
Opening
08:30-09:00
Keynote 3
08:30-09:20
Keynote 4
08:30-09:20
Keynote 1
09:00-09:50
Panel Discussion 2
09:20-10:20
Session 16
09:20-10:40
Session 17
09:20-10:40
Session 18
09:20-10:40
Coffee Break
Keynote 2
10:10-11:00
Session 7
10:40-12:20
Session 8
10:40-12:20
Session 9
10:40-12:20
Session 19
11:00-12:40
Session 20
11:00-12:40
Session 21
11:00-12:40
Panel Discussion 1
11:00-12:00
Lunch
Session 1
13:20-15:00
Session 2
13:20-15:00
Session 3
13:20-15:00
Session 10
13:30-15:10
Session 11
13:30-15:10
Session 12
13:30-15:10
Coffee Break
Session 4
15:20-17:00
Session 5
15:20-17:00
Session 6
15:20-17:00
Session 13
15:30-17:10
Session 14
15:30-17:10
Session 15
15:30-17:10
Welcome Reception
17:00-18:00
Conference Banquet
18:00-21:00

Technical Program

Keynotes
Keynote 1 (9 Dec) 9:00-9:50
GPU-based Parallel Computing for Real-Time Optimization
Prof Tom Hou, Virginia Tech, US
Keynote 2 (9 Dec) 10:10-11:00
5G Mobile Edge Computing: Research Roadmap on Routing, Offloading, Slicing, Federation, and Optimization
Prof Ying-Dar Lin, National Chiao Tung University, Taiwan
Keynote 3 (10 Dec) 8:30-9:20
AI Security: A Case in dealing with malicious agents
Prof Wanlei Zhou, University of Technology Sydney, Australia
Keynote 4 (11 Dec) 8:30-9:20
Evening Out the Stumbling Blocks for Today’s Blockchain Systems
Prof Hai Jin, Huazhong University of Science and Technology, China
Panel Discussion 1 - Impact-driven innovation and transformation
11:00-12:00 (9 Dec)
Moderator: Prof. Yang Xiang
David Abramson
Director, Research Computing Centre
The University of Queensland, Australia

Meikang Qiu
Professor, Department of Computer Science
Pace University, US

Weijia Jia
Deputy Director and Chair Professor, State Key Laboratory of Internet of Things for Smart City
University of Macau, Macau

Xinghuo Yu
Associate Deputy Vice Chancellor, Research and Innovation Capability
RMIT University, Australia

Phoebe Chen
Professor and Chair, Department of Computer Science and Information Technology
La Trobe University, Australia
Panel Discussion 2 - Emerging technologies for the future
9:20-10:20 (10 Dec)
Moderator: Dr. Sheng Wen
You-Gan Wang
Professor
Queensland University of Technology, Australia

Keqiu Li
Dean, College of Intelligence and Computing
Tianjin University, China

Hua Wang
Professor
Victoria University, Australia

Jinjun Chen
Deputy Director, Swinburne Data Science Research Institute
Swinburne University of Technology, Australia
Session 1: Parallel & Distributed Architectures
13:20-15:00 (9 Dec) [Room 1]
PPS: A Low-Latency and Low-Complexity switching architecture based on packet prefetch and arbitration prediction
SWR: Using Windowed Reordering to Achieve Fast and Balanced Heuristic for Streaming Vertex-Cut Graph Partitioning
Flexible Data Flow Architecture for Embedded Hardware Accelerators
HBL-Sketch: A New Three-tier Sketch for Accurate Network Measurement
Accelerating Large Integer Multiplication Using Intel AVX-512IFMA
Session 2: Software Systems & Programming Models
13:20-15:00 (9 Dec) [Room 2]
Accelerating Lattice Boltzmann Method by Fully Exposing Vectorizable Loops
A Solution for High Availability Memory Access
Verification of Microservices Using Metamorphic Testing
A New Robust and Reversible Watermarking Technique Based on Erasure Code
Exit-Less Hypercall: Asynchronous System Calls in Virtualized Processes
Session 3: Distributed & Parallel & Network-based Computing
13:20-15:00 (9 Dec) [Room 3]
Impromptu Rendezvous Based Multi-Threaded Algorithm for Shortest Lagrangian Path Problem on Road Networks
FANG: Fast and Efficient Successor-State Generation for Heuristic Optimization on GPUs
DETER: Streaming Graph Partitioning via Combined Degree and Cluster Information
Which Node Properties Identify the Propagation Source in Networks?
t/t-Diagnosability of BCube Network
Session 4: Parallel & Distributed Architectures
15:20-17:00 (9 Dec) [Room 1]
A Communication-Avoiding Algorithm for Molecular Dynamics Simulation
Out-of-Core GPU-Accelerated Causal Structure Learning
Rise the Momentum: A Method for Reducing the Training Error on Multiple GPUs
Pimiento: A Vertex-Centric Graph-Processing Framework on a Single Machine
SPM: Modelling Spark Task Execution Time from The Sub-Stage Perspective
Session 5: Software Systems & Programming Models
15:20-17:00 (9 Dec) [Room 2]
Automatic Optimization of Python Skeletal Parallel Programs
Accurate Network Flow Measurement with Deterministic Admission Policy
A Comparison Study of VAE and GAN for Software Fault Prediction
Parallel Software Testing Sequence Generation Method Target at Full Covering Tested Behaviours
A Framework for Designing Autonomous Parallel Data Warehouses
Session 6: Distributed & Parallel & Network-based Computing
15:20-17:00 (9 Dec) [Room 3]
Reliability Aware Cost Optimization for Memory Constrained Cloud Workflows
Null Model and Community Structure in Heterogeneous Networks
Stable Clustering Method for Routing Establishment in Vehicular Ad-Hoc Networks
Utility-based location distribution reverse auction incentive mechanism for mobile crowd sensing network
Safeguarding Against Active Routing Attack via Online Learning
Session 7: Big Data & its Applications
10:40-12:20 (10 Dec) [Room 1]
Strark-H: A Strategy for Spatial Data Storage to Improve Query Efficiency Based on Spark
Multitask Assignment Algorithm Based on Decision Tree in Spatial Crowdsourcing Environment
TIMOM: a novel time influence multi-objective optimization cloud data storage model for business process management
RTEF-PP: A Robust Trust Evaluation Framework with Privacy Protection for Cloud Services Providers
A Privacy-Preserving Access Control Scheme with Verifiable and Outsourcing Capabilities in Fog-Cloud Computing
Session 8: Distributed & Parallel Algorithms
10:40-12:20 (10 Dec) [Room 2]
Efficient Pattern Matching on CPU-GPU Heterogeneous Systems
Improving Performance of Batch Point-to-point Communications by Active Contention Reduction through Congestion-avoiding Message Scheduling
A Fault Detection Algorithm for Cloud Computing using QPSO-based Weighted One-Class Support Vector Machine
Neuron Fault Tolerance Capability Based Computation Reuse in DNNs
Reliability Enhancement of Neural Networks via Neuron-level Vulnerability Quantization
Session 9: Applications of Distributed & Parallel Computing
10:40-12:20 (10 Dec) [Room 3]
An Open Identity Authentication Scheme Based on Blockchain
RBAC-GL:A role-based access control gasless architecture of consortium blockchain
Developing Patrol Strategies for the Cooperative Opportunistic Criminals
Deep Learning vs. Traditional Probabilistic Models: Case Study on Short Inputs for Password Guessing
A Fully Anonymous Authentication Scheme Based on Medical Environment
Session 10: Parallel & Distributed Architectures
13:30-15:10 (10 Dec) [Room 1]
Improving the Parallelism of CESM on GPU
Parallel approach to sliding window sums
ParaMoC:A Parallel Model Checker for Pushdown Systems
FastDRC: Fast and Scalable Genome Compression Based on Distributed and Parallel Processing
A Parallel Approach to Advantage Actor Critic in Deep Reinforcement Learning
Session 11: Big Data & its Applications
13:30-15:10 (10 Dec) [Room 2]
Utility-aware Edge Server Deployment in Mobile Edge Computing
Predicting Hard Drive Failures for Cloud Storage Systems
Mobility-Aware Workflow Offloading and Scheduling Strategy for Mobile Edge Computing
HSPP: Load-Balanced and Low-Latency File Partition and Placement Strategy on Distributed Heterogeneous Storage with Erasure Coding
Adaptive Clustering for Outlier Identification in High-dimensional Data
Session 12: Big Data & its Applications
13:30-15:10 (10 Dec) [Room 3]
Penguin Search Aware Proactive Application Placement
A Data Uploading Strategy in Vehicular Ad-hoc Networks Targeted on Dynamic Topology: Clustering and Cooperation
An Asynchronous Algorithm to Reduce the Number of Data Exchanges
Two-Stage Clustering Hot Events Detection Model for Micro-Blog on Spark
Cloud Server Load Turning Point Prediction Based on Feature Enhanced Multi-task LSTM
Session 13: Applications of Distributed & Parallel Computing
15:30-17:10 (10 Dec) [Room 1]
A New Bitcoin Address Association Method Using a Two-level Learner Model
Fog Computing based Traffic and Car Parking Intelligent System
Blockchain-PUF-based Secure Authentication Protocol for Internet of Things
Selective velocity distributed indexing for continuously moving objects model
PMRS: A Privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud Data
Session 14: Service Dependability & Security
15:30-17:10 (10 Dec) [Room 2]
Semi-supervised Deep Learning for Network Anomaly Detection
Moving Target Defense Against Injection Attacks
Tiger tally: Cross-domain scheme for Different Authentication Mechanism
Simultaneously Advising Via Differential Privacy In Cloud servers Environment
Feature Generation: A Novel Intrusion Detection Model Based on Prototypical Network
Session 15: IoT and CPS Computing
15:30-17:10 (10 Dec) [Room 3]
Spare Representation for Device-Free Human Detection and Localization with COTS RFID
A Novel Approach to Cost-Efficient Scheduling of Multi-Workflows in the Edge Computing Environment With Proximity Constraint
Differential Privacy Preservation for Smart Meter Systems
Sampling based Katz Centrality Estimation for Large-Scale Social Networks
Location Prediction for Social Media Users Based on Information Fusion
Session 16: IoT and CPS Computing
09:20-10:40 (11 Dec) [Room 1]
DCRRDT: A Method for Deployment and Control of RFID Sensors under Digital Twin-driven for Indoor Supervision
Dynamic Ring Structure Based Target Localization Algorithm in Wireless Sensor Networks
Concurrent software fine-coarse-grained automatic modeling method for algorithm error detection
Understanding the Resource Demand Differences of Deep Neural Network Training
Session 17: Service Dependability & Security
09:20-10:40 (11 Dec) [Room 2]
An Approach of Secure Two-way-pegged Multi-Sidechain
RaNetMalDozer: A Novel NN-based Model for Android Malware Detection over Task Kernel Structures
A vulnerability assessment method based on cooperative game theory
Enhancing Model Performance for Fraud Detection by Feature Engineering and Compact Unified Expressions
Session 18: Service Dependability & Security
09:20-10:40 (11 Dec) [Room 3]
Generative Adversarial Nets Enhanced Continual Data Release Using Differential Privacy
Practical IDS on In-vehicle Network against Diversified Attack Models
Privacy-Preserving Fine-grained Outsourcing PHR with Efficient Policy Updating
Network Intrusion Detection Framework Based on Embedded Tree Model
Session 19: Service Dependability & Security
11:00-12:40 (11 Dec) [Room 1]
Topic Reconstruction: A Novel Method Based on LDA Oriented to Intrusion Detection
PDGAN: A Novel Poisoning Defense Method in Federated Learning using Generative Adversarial Network
A Geo-indistinguishable Location Privacy Preservation Scheme for Location-Based Services in Vehicular Networks
A Behavior-based Method for Distinguishing the Type of C&C Channel
Data Poisoning Attacks on Graph Convolutional Matrix Completion
Session 20: Service Dependability & Security
11:00-12:40 (11 Dec) [Room 2]
Secure Data Deduplication with Resistance to Side-Channel Attacks via Fog Computing
Ultragloves:Lowcost Finger-level Interaction System for VR-applications based on ultrasonic movement tracking
Adaptive detection method for Packet-In message injection attack in SDN
Lightweight Outsourced Privacy-preserving Heart Failure Prediction Based on GRU
DAPS:A Decentralized Anonymous Payment Scheme with Supervision
Session 21: Performance Modelling & Evaluation
11:00-12:40 (11 Dec) [Room 3]
Secure Multi-receiver Communications: Models, Proofs, and Implementation
EC-ARR: Using Active Reconstruction to Optimize SSD Read Performance
Research of Benchmarking and Selection for TSDB
HDF5-based I/O Optimization for Extragalactic HI Data Pipeline of FAST
Twitter Event Detection under Spatio-temporal Constraints
Social Events
Welcome Reception
17:00-18:00 (9 Dec) [Deakin Downtown]
Conference Banquet
18:00-21:00 (10 Dec) [GoldLeaf Docklands]
Note: our student helpers will take you from the conference venue to the restaurant immediately after the ending of all programs on that day.

Call For Papers

We invite submissions from academia, government, and industry presenting novel research on all aspects of information security and privacy primitives or protocols. Topics of ICA3PP 2019 include but are not limited to the following areas:

Track 1: Parallel and Distributed Architectures

  • Parallel Architectures
  • Parallel Programming Paradigms
  • Heterogeneous Systems
  • Service-Oriented Architectures

Track 2: Software Systems and Programming Models

  • Cluster, Distributed & Parallel Operating Systems and Middleware
  • Programming Models for Compute and Storage
  • Parallel File Systems and Storage
  • Parallel and Distributed Databases
  • Tools for Programming and Analysis of System Software

Track 3: Distributed and Network-based Computing

  • Mobile and Wireless Computing
  • Cloud, Grid, and Services Computing
  • Web and Internet Computing
  • Interconnection Networks
  • Network Simulations

Track 4: Big Data and its Applications

  • Architecture, Networks and Systems of Big Data
  • Big Data Applications, Algorithms and Data Structures
  • Research and Development Trends of Big Data
  • Big Data Benchmarking, Interoperability, Monitoring, Security, Privacy and Management
  • Distributed Data Analytics and Feature Extraction
  • Big Data Interoperability and Orchestration
  • Parallel Processing for Big Data

Track 5: Parallel and Distributed Algorithms

  • Reliability and Fault-tolerant Computing
  • High-performance Scientific Computing
  • Parallel and Distributed Algorithms
  • Resource Management and Scheduling

Track 6: Applications of Parallel and Distributed Computing

  • Multimedia in Parallel Computing
  • Parallel Computing in Bioinformatics
  • Parallel Machine Learning Algorithms
  • Industrial Applications

Track 7: Service Dependability and Security in Distributed and Parallel Systems

  • Dependability Issues in Computer Networks and Communications
  • Dependability Issues in Distributed and Parallel Systems
  • Dependability of Software Defined Networks
  • Self-healing, Self-protecting and Fault-tolerant Systems
  • Network and Information Security
  • Trust, Security and Privacy in Cloud computing, Social Networks, and Internet of Things

Track 8: Internet of Things and Cyber-Physical-Social Computing

  • Social Computing and Analytics on Cyber-Physical Data
  • Smart Communities with Cyber-Physical Systems
  • Ubiquitous Sensing in Social Networks
  • Building Social Life Networks
  • Pervasive/Ubiquitous Control, Computing and Networking
  • Cyber-Physical Systems and Networks
  • Cyber-Physical Social Applications and Case Studies

Track 9: Performance Modeling and Evaluation

  • Performance of Parallel & Distributed Computing Systems
  • Software and Hardware Reliability, Testing, Verification and Validation
  • Tools and Environments for Parallel & Distributed Software Development
  • Optimization, Modeling and Simulation
  • Stochastic Analysis, Statistical Analysis and Simulation
  • Data Collection and Analysis
  • Planning, Scheduling and Quality-of-Service
  • Game theory, Economics and Control Theory

Journal Special Issues

Selected papers presented at the ICA3PP 2019 will be invited to consider submission (after significant extension) for special issues in the following journals:

Sensors Impact Factor: 2.475
Special Issue on Threat Identification and Defence for Internet-of-Things
Learn more
Concurrency and Computation: Practice and Experience (CCPE) Impact Factor: 1.114
Special Issue on Security and Privacy in IoT Communication
Learn more
Computers & Electrical Engineering Impact Factor: 1.747
Special Issue on Blockchain Techniques for the Internet of Vehicles Security
Learn more
IEEE Access Impact Factor: 3.557

Learn more
Journal of Information Security and Applications Impact Factor: Pending

Learn more
Symmetry Impact Factor: 1.256
Special Issue on Symmetry and Asymmetry Applications for Internet of Things Security and Privacy
Learn more
International Journal of Network Management Impact Factor: 1.34
Special Issue on Trust and Privacy in Internet of Things: Challenges and Solutions
Learn more

Author Instructions

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submitted papers must be clearly presented in English, must not exceed 15 pages (plus up to 5 extra pages with over length charge) in Springer LNCS Format, including tables, figures, references and appendixes. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work.

ICA3PP Paper Submission Link

Accepted Papers

PPS: A Low-Latency and Low-Complexity switching architecture based on packet prefetch and arbitration prediction
Yi Dai
SWR: Using Windowed Reordering to Achieve Fast and Balanced Heuristic for Streaming Vertex-Cut Graph Partitioning
Jie Wang and Dagang Li
Flexible Data Flow Architecture for Embedded Hardware Accelerators
Jens Froemmer, Nico Bannow, Axel Aue, Christoph Grimm and Klaus Schneider
HBL-Sketch: a New Three-tier Sketch for Accurate Network Measurement
Keyan Zhao, Junxiao Wang, Heng Qi, Xin Xie, Xiaobo Zhou and Keqiu Li
Accelerating Large Integer Multiplication Using Intel AVX-512IFMA
Takuya Edamatsu and Daisuke Takahashi
A Communication-Avoiding Algorithm for Molecular Dynamics Simulation
Bei Wang, Yifeng Chen and Chaofeng Hou
Out-of-Core GPU-Accelerated Causal Structure Learning
Christopher Schmidt, Johannes Huegle, Siegfried Horschig and Matthias Uflacker
Rise the Momentum: A Method for Reducing the Training Error on Multiple GPUs
Yu Tang, Lujia Yin, Zhaoning Zhang and Dongsheng Li
Pimiento: A Vertex-Centric Graph-Processing Framework on a Single Machine
Jianqiang Huang, Wei Qin, Xiaoying Wang and Wenguang Chen
SPM: Modeling Spark Task Execution Time from The Sub-Stage Perspective
Wei Li, Shengjie Hu, Di Wang, Tianba Chen and Li Yunchun
Improving the Parallelism of CESM on GPU
Zehui Jin, Ming Dun, Xin You, Hailong Yang, Yunchun Li, Yingchun Lin, Zhongzhi Luan and Depei Qian
Parallel approach to sliding window sums
Roman Snytsar and Yatish Turakhia
A Framework for Designing Autonomous Parallel Data Warehouses
Soumia Benkrid and Ladjel Bellatreche
Accelerating Lattice Boltzmann Method by Fully Exposing Vectorizable Loops
Bin Qu, Song Liu, Hailong Huang, Jiajun Yuan, Qian Wang and Weiguo Wu
A Solution for High Availability Memory Access
Chunjing Gan, Bin Wang, Zhi-Jie Wang, Huazhong Liu, Dingyu Yang, Jian Yin, Shiyou Qian and Song Guo
Verication of Microservices Using Metamorphic Testing
Gang Luo, Xi Zheng, Huai Liu, Rongbin Xu, Dinesh Nagumothu, Ranjith Janapareddi, Er Zhuang and Xiao Liu
A New Robust and Reversible Watermarking Technique Based on Erasure Code
Heyan Chai, Shuqiang Yang, Zoe L. Jiang, Hengyu Luo, Xuan Wang and Yiqun Chen
Exit-Less Hypercall: Asynchronous System Calls in Virtualized Processes
Guoxi Li, Wenhai Lin and Wenzhi Chen
Automatic Optimization of Python Skeletal Parallel Programs
Frederic Loulergue and Jolan Philippe
Accurate Network Flow Measurement with Deterministic Admission Policy
Hongchao Du, Rui Wang, Zhaoyan Shen and Zhiping Jia
A Comparison Study of VAE and GAN for Software Fault Prediction
Yuanyuan Sun, Lele Xu, Lili Guo, Ye Li and Yongming Wang
Parallel Software Testing Sequence Generation Method Target at Full Covering Tested Behaviors
Tao Sun, Xiaoyun Wan, Wenjie Zhong, Xin Guo and Ting Zhang
Impromptu Rendezvous Based Multi-Threaded Algorithm for Shortest Lagrangian Path Problem on Road Networks
Kartik Vishwakarma and Venkata M. V. Gunturi
FANG: Fast and Efficient Successor-State Generation for Heuristic Optimization on GPUs
Marcel Köster, Julian Groß and Antonio Krueger
DETER: Streaming Graph Partitioning via Combined Degree and Cluster Information
Cong Hu, Jiang Zhong, Qi Li and Qing Li
Which Node Properties Identify the Propagation Source in Networks?
Zhong Li, Chunhe Xia, Tianbo Wang and Xiaochen Liu
t/t-Diagnosability of BCube Network
Yuhao Chen, Haiping Huang, Xiping Liu, Hua Dai and Zhijie Han
Reliability Aware Cost Optimization for Memory Constrained Cloud Workflows
E Cao, Saira Musa, Jianning Zhang, Mingsong Chen, Tongquan Wei, Xin Fu and Meikang Qiu
Null Model and Community Structure in Heterogeneous Networks
Xuemeng Zhai, Wanlei Zhou, Gaolei Fei, Hangyu Hu, Guangmin Hu and Youyang Qu
Stable Clustering Method for Routing Establishment in Vehicular Ad-Hoc Networks
Jieying Zhou, Pengfei He, Yinglin Liu and Weigang Wu
Utility-based location distribution reverse auction incentive mechanism for mobile crowd sensing network
Chunxiao Liu, Huilin Wang, Yanfeng Wang and Dawei Sun
Safeguarding Against Active Routing Attack via Online Learning
Meng Meng, Ruijuan Zheng, Mingchuan Zhang, Junlong Zhu and Qingtao Wu
Strark-H: A Strategy for Spatial Data Storage to Improve Query Efficiency Based on Spark
Weitao Zou, Weipeng Jing, Guangsheng Chen and Yang Lu
Multitask Assignment Algorithm Based on Decision Tree in Spatial Crowdsourcing Environment
Dunhui Yu, Xiaoxiao Zhang, Xingsheng Zhang and Lingli Zhang
TIMOM: a novel time influence multi-objective optimization cloud data storage model for business process management
Erzhou Zhu, Meng Li, Jia Xu, Xuejun Li, Feng Liu and Futian Wang
RTEF-PP: A Robust Trust Evaluation Framework with Privacy Protection for Cloud Services Providers
Hong Zhong, Jianzhong Zou, Jie Cui and Yan Xu
A Privacy-Preserving Access Control Scheme with Verifiable and Outsourcing Capabilities in Fog-Cloud Computing
Zhen Cheng, Jiale Zhang, Hongyan Qian, Mingrong Xiang and Di Wu
Utility-aware Edge Server Deployment in Mobile Edge Computing
Jianjun Qiu, Xin Li, Xiaolin Qin, Haiyan Wang and Yongbo Cheng
Predicting Hard Drive Failures for Cloud Storage Systems
Dongshi Liu, Gang Wang, Xiaoguang Liu and Zhongwei Li
Mobility-Aware Workflow Offloading and Scheduling Strategy for Mobile Edge Computing
Jia Xu, Xuejun Li, Xiao Liu, Chong Zhang, Lingmin Fan, Lina Gong and Juan Li
HSPP: Load-Balanced and Low-Latency File Partition and Placement Strategy on Distributed Heterogeneous Storage with Erasure Coding
Jiazhao Sun, Yunchun Li and Hailong Yang
Adaptive Clustering for Outlier Identification in High-dimensional Data
Srikanth Thudumu, Philip Branch, Jiong Jin and Jugdutt Singh
Penguin Search Aware Proactive Application Placement
Benamer Amira Rayane, Teyeb Hana and Ben Hadj Alouane Nejib
A Data Uploading Strategy in Vehicular Ad-hoc Networks Targeted on Dynamic Topology: Clustering and Cooperation
Zhipeng Gao, Xinyue Zheng, Kaile Xiao, Qian Wang and Zijia Mo
An Asynchronous Algorithm to Reduce the Number of Data Exchanges
Zhuo Tian, Lei Zhang and Yifeng Chen
Two-Stage Clustering Hot Events Detection Model for Micro-Blog on Spark
Ying Xia and Hanyu Huang
Cloud Server Load Turning Point Prediction Based on Feature Enhanced Multi-task LSTM
Li Ruan, Yu Bai and Limin Xiao
Efficient Pattern Matching on CPU-GPU Heterogeneous Systems
Victoria Sanz, Adrián Pousa, R. Marcelo Naiouf and Armando De Giusti
Improving Performance of Batch Point-to-point Communications by Active Contention Reduction through Congestion-avoiding Message Scheduling
Peng Jintao, Yang Zhang and Liu Qingkai
A Fault Detection Algorithm for Cloud Computing using QPSO-based Weighted One-Class Support Vector Machine
Xiahao Zhang and Yi Zhuang
Neuron Fault Tolerance Capability Based Computation Reuse in DNNs
Pengnian Qi, Jing Wang, Weigong Zhang and Xiaoyan Zhu
Reliability Enhancement of Neural Networks via Neuron-level Vulnerability Quantization
Keyao Li, Jing Wang, Xin Fu, Weigong Zhang and Xiufeng Sui
ParaMoC:A Parallel Model Checker for Pushdown Systems
Hansheng Wei, Xin Ye, Jianqi Shi and Yanhong Huang
FastDRC:Fast and Scalable Genome Compression Based on Distributed and Parallel Processing
Yimu Ji, Houzhi Fang, Haichang Yao, Jing He, Shuai Chen, Kui Li and Shangdong Liu
A Parallel Approach to Advantage Actor Critic in Deep Reinforcement Learning
Xing Zhu and Yunfei Du
An Open Identity Authentication Scheme Based on Blockchain
Yuxiang Chen and Dong Guishan
RBAC-GL:A role-based access control gasless architecture of consortium blockchain
Zhiyu Xu, Tengyun Jiao, Lin Yang, Donghai Liu, Sheng Wen and Yang Xiang
Developing Patrol Strategies for the Cooperative Opportunistic Criminals
Yanan Zhao, Mingchu Li and Cheng Guo
Deep Learning vs. Traditional Probabilistic Models: Case Study on Short Inputs for Password Guessing
Yuan Linghu, Xiangxue Li and Zhenlong Zhang
A Fully Anonymous Authentication Scheme Based on Medical Environment
Jing Lv, Ning Xi and Xue Rao
A New Bitcoin Address Association Method Using a Two-level Learner Model
Tengyu Liu, Jingguo Ge, Yulei Wu, Bowei Dai, Liangxiong Li, Zhongjiang Yao, Jifei Wen and Hongbin Shi
Fog Computing based Traffic and Car Parking Intelligent System
Walaa Alajali, Shang Gao and Abdulrahman D Alhusaynat
Blockchain-PUF-based Secure Authentication Protocol for Internet of Things
Akash Suresh Patil, Rafik Hamza, Hongyang Yan, Alzubair Hassan and Jin Li
Selective velocity distributed indexing for continuously moving objects model
Imene Bareche and Xia Ying
RaNetMalDozer: A Novel NN-based Model for Android Malware Detection over Task Kernel Structures
Xinning Wang and Chong Li
Moving Target Defense Against Injection Attacks
Huan Zhang, Kangfeng Zheng, Xiaodan Yan, Shoushan Luo and Bin Wu
Tiger tally: Cross-domain scheme for Different Authentication Mechanism
Dong Guishan and Chen Yuxiang
Simultaneously Advising Via Differential Privacy In Cloud servers Environment
Sheng Shen, Tianqing Zhu, Dayong Ye, Mengmeng Yang, Tingting Liao and Wanlei Zhou
Feature Generation: A Novel Intrusion Detection Model Based on Prototypical Network
Shizhao Wang, Chunhe Xia and Tianbo Wang
Topic Reconstruction: A Novel Method Based on LDA Oriented to Intrusion Detection
Shengwei Lei, Chunhe Xia, Tianbo Wang and Shizhao Wang
PDGAN: A Novel Poisoning Defense Method in Federated Learning using Generative Adversarial Network
Ying Zhao, Junjun Chen, Jia Zhang, Di Wu, Jian Teng and Shui Yu
A Geo-indistinguishable Location Privacy Preservation Scheme for Location-Based Services in Vehicular Networks
Li Luo, Zhenzhen Han and Chuan Xu
A Behavior-based Method for Distinguishing the Type of C&C Channel
Jianguo Jiang, Qilei Yin, Zhixin Shi, Guokun Xu and Xiaoyu Kang
Data Poisoning Attacks on Graph Convolutional Matrix Completion
Qi Zhou, Yizhi Ren, Tianyu Xia, Lifeng Yuan and Linqiang Chen
Secure Data Deduplication with Resistance to Side-Channel Attacks via Fog Computing
Fuyou Zhang, Saiyu Qi, Haoran Yuan and Meng Zhang
Ultragloves:Lowcost Finger-level Interaction System for VR-applications based on ultrasonic movement tracking
Si Li, Yanchao Zhao and Chengyong Liu
Adaptive detection method for Packet-In message injection attack in SDN
Xinyu Zhan, Mingsong Chen, Shui Yu and Yue Zhang
PMRS: A Privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud Data
Jingjing Bao, Hua Dai, Maohu Yang, Xun Yi, Geng Yang and Liang Liu
Lightweight Outsourced Privacy-preserving Heart Failure Prediction Based on GRU
Zuobin Ying, Shuanglong Cao, Shun Zhang and Ximeng Liu
DAPS:A Decentralized Anonymous Payment Scheme with Supervision
Zhaoyang Wang, Qingqi Pei, Xuefeng Liu, Lichuan Ma, Huizhong Li and Shui Yu
An Approach of Secure Two-way-pegged Multi-Sidechain
Jinnan Guo, Keke Gai, Liehuang Zhu and Zijian Zhang
Semi-supervised Deep Learning for Network Anomaly Detection
Yuanyuan Sun, Lili Guo, Ye Li, Lele Xu and Yongming Wang
A vulnerability assessment method based on cooperative game theory
Chenjian Duan, Zhen Wang, Hong Ding, Mengting Jiang, Yizhi Ren and Ting Wu
Enhancing Model Performance for Fraud Detection by Feature Engineering and Compact Unified Expressions
Ikram Ul Haq, Iqbal Gondal and Peter Vamplew
Network Intrusion Detection Framework Based on Embedded Tree Model
Jieying Zhou, Pengfei He, Rongfa Qiu and Shijun Yang
Generative Adversarial Nets Enhanced Continual Data Release Using Differential Privacy
Stella Ho, Youyang Qu, Longxiang Gao, Jianxin Li and Yong Xiang
Practical IDS on In-vehicle Network against Diversified Attack Models
Junchao Xiao, Hao Wu, Xiangxue Li and Yuan Linghu
Privacy-Preserving Fine-grained Outsourcing PHR with Efficient Policy Updating
Zuobin Ying, Maode Ma, Ximeng Liu and Wenjie Jiang
Spare Representation for Device-Free Human Detection and Localization with COTS RFID
Weiqing Huang, Shaoyi Zhu, Siye Wang, Jinxing Xie and Yanfang Zhang
A Novel Approach to Cost-Efficient Scheduling of Multi-Workflows in the Edge Computing Environment With Proximity Constraint
Yuyin Ma, Yunni Xia and Wanbo Zheng
Differential Privacy Preservation for Smart Meter Systems
Junfang Wu, Weizhong Qiang, Tianqing Zhu, Hai Jin, Peng Xu and Sheng Shen
Sampling based Katz Centrality Estimation for Large-Scale Social Networks
Mingkai Lin, Wenzhong Li, Cam-Tu Nguyen, Xiaoliang Wang and Sanglu Lu
Location Prediction for Social Media Users Based on Information Fusion
Gaolei Fei, Yang Liu, Yong Cheng, Fucai Yu and Guangmin Hu
DCRRDT: A Method for Deployment and Control of RFID Sensors under Digital Twin-driven for Indoor Supervision
Siye Wang, Mengnan Cai, Qinxuan Wu, Yijia Jin, Xinling Shen and Yanfang Zhang
Dynamic Ring Structure Based Target Localization Algorithm in Wireless Sensor Networks
Yu Pan, Qianqian Ren and Jinbao Li
Secure Multi-receiver Communications: Models, Proofs, and Implementation
Maomao Fu, Xiaozhuo Gu, Jingqiang Lin, Wenhao Dai and Han Wang
EC-ARR: Using Active Reconstruction to Optimize SSD Read Performance
Shuo Li, Mingzhu Deng, Fang Liu, Zhiguang Chen and Nong Xiao
Research of Benchmarking and Selection for TSDB
Feng Ye, Zihao Liu, Songjie Zhu, Peng Zhang and Yong Chen
HDF5-based I/O Optimization for Extragalactic HI Data Pipeline of FAST
Yiming Ji, Ce Yu, Jian Xiao, Hao Wang and Bo Zhang
Twitter Event Detection under Spatio-temporal Constraints
Gaolei Fei, Yong Cheng, Yang Liu, Zhuo Liu and Guangmin Hu
Concurrent software fine-coarse-grained automatic modeling method for algorithm error detection
Tao Sun, Jing Zhang and Wenjie Zhong
Understanding the Resource Demand Differences of Deep Neural Network Training
Jiangsu Du, Xin Zhu, Nan Hu and Yunfei Du
AdapTPA:An Adaptive Thread Partitioning Approach in Speculative Multithreading
Yuxiang Li Li, Lili Zhang and Zhiyong Zhang

Registration Information

Full registration payment is required by 25 September 2019 for EACH accepted paper. This deadline will be strictly enforced. Failure to pay the registration fee by 25 September 2019 will result in the exclusion of the papers from the Conference Proceedings.

Registration Fee

Registration Fee (in US Dollars)By 25 September 2019After 25 September 2019
Full RegistrationUSD$865Not Accepted
Student & Attendee RegistrationUSD$475USD$575
Extra Page (per page)USD$100Not Accepted
Additional Conference Banquet Ticket (per person)USD$100USD$100

All types of registration include: full attendance of the conference, welcome reception, conference banquet, morning teas, afternoon teas and lunches.

Student & Attendee Registration

Please note that if you are the only author registered for an accepted paper, you should choose Full Registration (instead of Student & Attendee Registration) even though you are a student.

If you have the student status, and your paper has been paid under Full Registration by a co-author, you may choose the Student & Attendee Registration rate. If you don’t have a paper, and want to participate the conference, you may also choose the Student & Attendee Registration rate.

Extra Page Costs

If extra pages are required, payment of USD$100 per extra page needs to be made together with the conference registration fee.

For full papers, the first 15 pages are included in the standard registration with an option to buy additional 5 extra pages (up to 20 pages in total). For short and workshop papers, the first 8 pages are included in the standard registration with an option to buy additional 2 extra pages (up to 10 pages in total).

Conference Banquet Tickets

A banquet ticket is included in all types of registration. Additional banquet tickets, e.g., if you want to bring your family, are available for purchase at the cost of USD$100 per person. Payment needs to be made together with the conference registration fee.

Invitation Letter

The invitation letter will be issued once your registration payment is received. Please note that no invitation letter can be issued before the payment.

Cancellation Policy

Registration for the conference cannot be canceled. There is no refund of registration fees.

Registration Method

Please click the following link to complete your registration.

ICA3PP 2019 Registration System

  • PAPER ID: For non-author registrations, please use "999" for Paper ID in corresponding parts.
  • PAPER Title: For non-author registrations, please use "No Paper" for Paper Title in corresponding parts.
  • NOTE: You may ignore the "IEEE Member ID" entry as this conference does not provide any discount for IEEE members.

Payment via Credit Card or Paypal

Payment via credit card or PayPal can be made directly in the registration system.

Payment via Bank Transfer

Payment via bank transfer are accepted at the following account. For participants who want to pay by bank transfer, please send the payment AS SOON AS POSSIBLE as it takes some time to process the payment.

Account nameInsightek
Bank NameCommonwealth Bank of Australia
Address of Insightek2B Service Road, Blackburn, VIC 3130, Australia
SWIFT codeCTBAAU2S
BSB/Account No063182 10939649
  • TRANSFER NOTE: Please include a note on the bank transfer indicating your name and paper ID.
  • TRANSFER COST: Bank transfer and other related fees have to be paid by the registrant. Please verify carefully during the transfer that all costs are charged to the sender and the correct amount will be received at the above account. Alternatively, please add extra $20.00 to the total amount of registration fee to cover the transfer cost.

After the bank transfer is completed, please send a scanned copy of the bank transfer transaction receipt to the conference secretary (email abby.xu@insightek.com.au) with your name and paper ID. We will confirm your registration once we receive the payment and the scanned transaction receipt.

Organising Committee

Honorary Chair

Yong Xiang, Deakin University, Australia

General Co-Chairs

David Abramson, The University of Queensland, Australia
Yi Pan, Georgia State University, USA
Yang Xiang, Swinburne University of Technology, Australia

Program Co-Chairs

Albert Zomaya, The University of Sydney, Australia
Laurence T. Yang, St. Francis Xavier University, Canada
Sheng Wen, Swinburne University of Technology, Australia

Publication Chair

Yu Wang, Guangzhou University, China

Publicity Chair

Jing He, Swinburne University of Technology, Australia

Steering Committee

Yang Xiang, Swinburne University of Technology, Australia (Chair)
Weijia Jia, Shanghai Jiaotong University, China
Yi Pan, Georgia State University, USA
Laurence T. Yang, St. Francis Xavier University, Canada
Wanlei Zhou, University of Technology Sydney, Australia

Program Committee

Marco Aldinucci, University of Torino, Italy
Pedro Alonso-Jordá, Universitat Politècnica de València, Spain
Daniel Andresen, Kansas State University, USA
Danilo Ardagna, Politecnico di Milano, Italy
Man Ho Au, The Hong Kong Polytechnic University, Hong Kong
Guillaume Aupy, INRIA, France
Joonsang Baek, University of Wollongong, Australia
Ladjel Bellatreche, LIAS/ENSMA, France
Siegfried Benkner, University of Vienna, Austria
Jorge Bernal Bernabe, University of Murcia, Spain
Thomas Boenisch, High performance Computing Center Stuttgart, Germany
George Bosilca, University of Tennessee, USA
Suren Byna, Lawrence Berkeley National Laboratory, USA
Massimo Cafaro, University of Salento, Italy
Philip Carns, Argonne National Laboratory, USA
Arcangelo Castiglione, University of Salerno, Italy
Tania Cerquitelli, Politecnico di Torino, Italy
Tzung-Shi Chen, National University of Tainan, Taiwan
Kim-Kwang Raymond Choo, The University of Texas at San Antonio, USA
Jose Alfredo Ferreira Costa, Federal University of Rio Grande do Norte, Brazil
Raphaël Couturier, University Bourgogne Franche-Comté, France
Masoud Daneshtalab, Mälardalen University, KTH Royal Institute of Technology, Sweden
Gregoire Danoy, University of Luxembourg, Luxembourg
Saptarshi Debroy, City University of New York, USA
Casimer Decusatis, Marist College, USA
Eugen Dedu, FEMTO-ST Institute, University Bourgogne Franche-Comté, CNRS, France
Frederic Desprez, INRIA, France
Juan-Carlos Díaz-Martín, University of Extremadura, Spain
Christian Esposito, University of Napoli Federico II, Italy
Ugo Fiore, Federico II University, Italy
Franco Frattolillo, University of Sannio, Italy
Marc Frincu, West University of Timisoara, Romania
Jorge G. Barbosa, University of Porto, Portugal
Jose Daniel Garcia, University Carlos III of Madrid, Spain
Luis Javier García Villalba, Universidad Complutense de Madrid, Spain
Harald Gjermundrod, University of Nicosia, Cyprus
Jing Gong, KTH Royal Institute of Technology, Sweden
Daniel Grosu, Wayne State University, USA
Houcine Hassan, Universitat Politècnica de València, Spain
Sun-Yuan Hsieh, National Cheng Kung University, Taiwan
Xinyi Huang, Fujian Normal University, China
Mauro Iacono, Università degli Studi della Campania Luigi Vanvitelli, Italy
Shadi Ibrahim, Inria Rennes Bretagne Atlantique Research Center, France
Yasuaki Ito, Hiroshima University, Japan
Edward Jung, Kennesaw State University, USA
Georgios Kambourakis, University of the Aegean, Greece
Helen Karatza, Aristotle University of Thessaloniki, Greece
Gabor Kecskemeti, Liverpool John Moores University, UK
Muhammad Khurram Khan, King Saud University, Saudi Arabia
Sokol Kosta, Aalborg University, Denmark
Dieter Kranzlmüller, Ludwig Maximilian University of Munich, Germany
Peter Kropf, University of Neuchâtel, Switzerland
Michael Kuhn, University of Hamburg, Germany
Julian Martin Kunkel, University of Reading, UK
Algirdas Lančinskas, Vilnius University, Italy
Che-Rung Lee, National Tsing Hua University, Taiwan
Laurent Lefevre, INRIA, France
Kenli Li, Hunan University, China
Xiao Liu, Deakin University, Australia
Jay Lofstead, Sandia National Laboratories, USA
Paul Lu, University of Alberta, Canada
Tomas Margalef, Universitat Autonoma de Barcelona, Spain
Stefano Markidis, KTH Royal Institute of Technology, Sweden
Barbara Masucci, University of Salerno, Italy
Susumu Matsumae, Saga University, Japan
Raffaele Montella, University of Naples Parthenope, Italy
Francesco Moscato, University of Campania Luigi Vanvitelli, Italy
Bogdan Nicolae, Argonne National Laboratory, USA
Anne-Cécile Orgerie, CNRS, France
Francesco Palmieri, University of Salerno, Italy
Dana Petcu, West University of Timisoara, Romania
Salvador Petit, Universitat Politècnica de València, Spain
Riccardo Petrolo, Konica Minolta Laboratory Europe
Florin Pop, University Politehnica of Bucharest, National Institute for Research and Development in Informatics (ICI), Romania
Radu Prodan, University of Klagenfurt, Austria
Suzanne Rivoire, Sonoma State University, USA
Ivan Rodero, Rutgers University, USA
Romain Rouvoy, University of Lille, Inria, IUF, France
Antonio Ruiz-Martínez, University of Murcia, Spain
Francoise Sailhan, CNAM, France
Sherif Sakr, The University of New South Wales, Australia
Ali Shoker, HASLab, INESC TEC, University of Minho, Portugal
Giandomenico Spezzano, CNR, Italy
Patricia Stolf, IRIT, France
Peter Strazdins, The Australian National University, Australia
Hari Subramoni, The Ohio State University, USA
Frederic Suter, CC IN2P3, CNRS, France
Andrei Tchernykh, CICESE Research Center, Mexico
Massimo Torquati, University of Pisa, Italy
Tomoaki Tsumura, Nagoya Institute of Technology, Japan
Vladimir Voevodin, RCC MSU, Russia
Xianglin Wei, Nanjing Telecommunication Technology Research Institute, China
Sheng Wen, Swinbourne University of Technology, Australia
Jigang Wu, Guangdong University of Technology, China
Roman Wyrzykowski, Czestochowa University of Technology, Poland
Ramin Yahyapour, GWDG, University of Göttingen, Germany
Laurence T. Yang, St Francis Xavier University, Canada
Wun-She Yap, Universiti Tunku Abdul Rahman, Malaysia
Junlong Zhou, Nanjing University of Science and Technology, China
Albert Zomaya, The University of Sydney, Australia

The 1st International Workshop on Recent Advances in Distributed and Parallel Computing (RADPC 2019)

Melbourne, Australia | 9-11 Dec 2019

The main goal of this workshop is to provide a timely forum for the exchange and dissemination of recent advances in the field of distributed and parallel computing. The workshop is meant to bridge research of theory and practice in all aspects of distributed and parallel computing. We are convinced that the workshop atmosphere will be conducive to open and mutually beneficial exchanges of ideas between the participants of these areas.

Topics of interest include, but are not limited to:

  • Parallel and Distributed Algorithms and Applications
  • Peer-to-Peer Computing
  • Cluster, Grid and Cloud Computing
  • Web-based Computing and Service-Oriented Architecture
  • Data Intensive Computing and Data Centre Architecture
  • Wireless and Mobile Computing
  • Security and Privacy
  • Performance Modelling and Evaluation

Important Dates

Paper Submission Due6 Sep 2019
Author Notification10 Sep 2019
Camera-ready Paper Due20 Sep 2019
Registration Due25 Sep 2019
Conference Date9-11 Dec 2019

Author Instructions

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submitted papers must be clearly presented in English, must not exceed 8 pages (plus up to 2 extra pages with over length charge) in Springer LNCS Format, including tables, figures, references and appendixes. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work.

RADPC2019 Paper Submission Link


Workshop Co-Chairs

Chao Chen, Swinburne University of Technology, Australia
Xiao Chen, Swinburne University of Technology, Australia

Program Committee (Shared with ICA3PP)

Marco Aldinucci, University of Torino, Italy
Pedro Alonso-Jordá, Universitat Politècnica de València, Spain
Daniel Andresen, Kansas State University, USA
Danilo Ardagna, Politecnico di Milano, Italy
Man Ho Au, The Hong Kong Polytechnic University, Hong Kong
Guillaume Aupy, INRIA, France
Joonsang Baek, University of Wollongong, Australia
Ladjel Bellatreche, LIAS/ENSMA, France
Siegfried Benkner, University of Vienna, Austria
Jorge Bernal Bernabe, University of Murcia, Spain
Thomas Boenisch, High performance Computing Center Stuttgart, Germany
George Bosilca, University of Tennessee, USA
Suren Byna, Lawrence Berkeley National Laboratory, USA
Massimo Cafaro, University of Salento, Italy
Philip Carns, Argonne National Laboratory, USA
Arcangelo Castiglione, University of Salerno, Italy
Tania Cerquitelli, Politecnico di Torino, Italy
Tzung-Shi Chen, National University of Tainan, Taiwan
Kim-Kwang Raymond Choo, The University of Texas at San Antonio, USA
Jose Alfredo Ferreira Costa, Federal University of Rio Grande do Norte, Brazil
Raphaël Couturier, University Bourgogne Franche-Comté, France
Masoud Daneshtalab, Mälardalen University, KTH Royal Institute of Technology, Sweden
Gregoire Danoy, University of Luxembourg, Luxembourg
Saptarshi Debroy, City University of New York, USA
Casimer Decusatis, Marist College, USA
Eugen Dedu, FEMTO-ST Institute, University Bourgogne Franche-Comté, CNRS, France
Frederic Desprez, INRIA, France
Juan-Carlos Díaz-Martín, University of Extremadura, Spain
Christian Esposito, University of Napoli Federico II, Italy
Ugo Fiore, Federico II University, Italy
Franco Frattolillo, University of Sannio, Italy
Marc Frincu, West University of Timisoara, Romania
Jorge G. Barbosa, University of Porto, Portugal
Jose Daniel Garcia, University Carlos III of Madrid, Spain
Luis Javier García Villalba, Universidad Complutense de Madrid, Spain
Harald Gjermundrod, University of Nicosia, Cyprus
Jing Gong, KTH Royal Institute of Technology, Sweden
Daniel Grosu, Wayne State University, USA
Houcine Hassan, Universitat Politècnica de València, Spain
Sun-Yuan Hsieh, National Cheng Kung University, Taiwan
Xinyi Huang, Fujian Normal University, China
Mauro Iacono, Università degli Studi della Campania Luigi Vanvitelli, Italy
Shadi Ibrahim, Inria Rennes Bretagne Atlantique Research Center, France
Yasuaki Ito, Hiroshima University, Japan
Edward Jung, Kennesaw State University, USA
Georgios Kambourakis, University of the Aegean, Greece
Helen Karatza, Aristotle University of Thessaloniki, Greece
Gabor Kecskemeti, Liverpool John Moores University, UK
Muhammad Khurram Khan, King Saud University, Saudi Arabia
Sokol Kosta, Aalborg University, Denmark
Dieter Kranzlmüller, Ludwig Maximilian University of Munich, Germany
Peter Kropf, University of Neuchâtel, Switzerland
Michael Kuhn, University of Hamburg, Germany
Julian Martin Kunkel, University of Reading, UK
Algirdas Lančinskas, Vilnius University, Italy
Che-Rung Lee, National Tsing Hua University, Taiwan
Laurent Lefevre, INRIA, France
Kenli Li, Hunan University, China
Xiao Liu, Deakin University, Australia
Jay Lofstead, Sandia National Laboratories, USA
Paul Lu, University of Alberta, Canada
Tomas Margalef, Universitat Autonoma de Barcelona, Spain
Stefano Markidis, KTH Royal Institute of Technology, Sweden
Barbara Masucci, University of Salerno, Italy
Susumu Matsumae, Saga University, Japan
Raffaele Montella, University of Naples Parthenope, Italy
Francesco Moscato, University of Campania Luigi Vanvitelli, Italy
Bogdan Nicolae, Argonne National Laboratory, USA
Anne-Cécile Orgerie, CNRS, France
Francesco Palmieri, University of Salerno, Italy
Dana Petcu, West University of Timisoara, Romania
Salvador Petit, Universitat Politècnica de València, Spain
Riccardo Petrolo, Konica Minolta Laboratory Europe
Florin Pop, University Politehnica of Bucharest, National Institute for Research and Development in Informatics (ICI), Romania
Radu Prodan, University of Klagenfurt, Austria
Suzanne Rivoire, Sonoma State University, USA
Ivan Rodero, Rutgers University, USA
Romain Rouvoy, University of Lille, Inria, IUF, France
Antonio Ruiz-Martínez, University of Murcia, Spain
Francoise Sailhan, CNAM, France
Sherif Sakr, The University of New South Wales, Australia
Ali Shoker, HASLab, INESC TEC, University of Minho, Portugal
Giandomenico Spezzano, CNR, Italy
Patricia Stolf, IRIT, France
Peter Strazdins, The Australian National University, Australia
Hari Subramoni, The Ohio State University, USA
Frederic Suter, CC IN2P3, CNRS, France
Andrei Tchernykh, CICESE Research Center, Mexico
Massimo Torquati, University of Pisa, Italy
Tomoaki Tsumura, Nagoya Institute of Technology, Japan
Vladimir Voevodin, RCC MSU, Russia
Xianglin Wei, Nanjing Telecommunication Technology Research Institute, China
Sheng Wen, Swinbourne University of Technology, Australia
Jigang Wu, Guangdong University of Technology, China
Roman Wyrzykowski, Czestochowa University of Technology, Poland
Ramin Yahyapour, GWDG, University of Göttingen, Germany
Laurence T. Yang, St Francis Xavier University, Canada
Wun-She Yap, Universiti Tunku Abdul Rahman, Malaysia
Junlong Zhou, Nanjing University of Science and Technology, China
Albert Zomaya, The University of Sydney, Australia

Venue

ICA3PP 2019 will be held at Deakin Downtown in Melbourne's CBD. Deakin Downtown is located on Level 12 of Tower 2, Collins Square at 727 Collins Street in Docklands. Various public transport options are available. It is only 5 minutes from Southern Cross Station.

Nearby Hotels

5 Star

4 Star

3 Star

Backpackers

All hotels listed above are within 5-15 minutes walking distance to the conference venue. Booking can be made through the hotel website directly, or through other travel agent websites such as booking.com, agoda.com, expedia.com, wotif.com, hotels.com, priceline.com, ctrip.com etc. Note that we do not have any discount with any hotel. We recommend conference participants to book their hotel as early as possible. There are many booking options available such that customers do not need to pay until check-in and they can freely cancel the booking up to one or two days before arrivial. Conference participants may choose this option to book the hotel first, before getting their required internal approval or visa.

Location

Melbourne: The Most Liveable City