19th International Conference on Algorithms and Architectures for Parallel Processing
Melbourne, Australia
| 9-11 Dec 2019
ICA3PP 2019 is the 19th in this series of conferences started in 1995 that are devoted to algorithms and architectures for parallel processing. ICA3PP is now recognized as the main regular event of the world that is covering the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems. As applications of computing systems have permeated in every aspect of daily life, the power of computing system has become increasingly critical. This conference provides a forum for academics and practitioners from countries around the world to exchange ideas for improving the efficiency, performance, reliability, security and interoperability of computing systems and applications.
Following the traditions of the previous successful ICA3PP conferences held in Hangzhou, Brisbane, Singapore, Melbourne, Hong Kong, Beijing, Cyprus, Taipei, Busan, Melbourne, Fukuoka, Vietri sul Mare, Dalian, Japan, Zhangjiajie, Granada, Helsinki, and Guangzhou, ICA3PP 2019 will be held in Melbourne, Australia. The objective of ICA3PP 2019 is to bring together researchers and practitioners from academia, industry and governments to advance the theories and technologies in parallel and distributed computing. ICA3PP 2019 will focus on two broad areas of parallel and distributed computing, i.e. architectures, algorithms and networks, and systems and applications. The conference of ICA3PP 2019 will be organized by Swinburne University of Technology, Australia.
Paper Submission Due | |
Author Notification | |
Camera-ready Paper Due | |
Registration Due | 25 Sep 2019 |
Conference Date | 9-11 Dec 2019 |
Conference Program is online Conference program is online. View Program New |
Author notification extended Due to the large volume of submissions, the author notification is extended by one day (to 26 August). We appreciate your understanding. |
Submission due date extended The submission due date for ICA3PP 2019 is extended to 18 July 2019. |
Submission due date extended The submission due date for ICA3PP 2019 is extended to 8 July 2019. |
Special issues added. Special issues for ICA3PP are now added. |
Call for paper released. ICA3PP call for paper is online now. Download PDF |
Note: The order of speakers is sorted according to the alphabetical order of surname.
A holy grail in optimization is to solve large-scale complex mixed integer nonlinear program (MINLP) in real time. Such type of optimization problems is very common in wireless networks, particularly in resource allocation. Traditional, optimal (or near-optimal) solutions to these problems would take much time and cannot be used as practical solutions in the field to meet a system’s real-time requirement. At best, these solutions can only be used as benchmarks to measure the performance of fast heuristics, whose performance may either be severely compromised or can hardly offer any performance guarantee. Recently, in our research on designing a proportional-fair (PF) scheduler for 5G NR, we found that the state-of-the-art GPU can be exploited to offer near-optimal solution to complex optimization problems in real time (e.g., 100 µs time scale). The key ideas in our solution design include (i) decomposing a large-scale complex optimization problem into a massive number of small and independent sub-problems; (ii) selecting a subset of sub-problems from the most promising search space through intensification and random sampling; and (iii) fitting the selected subset of problems into GPU processing cores for very simple computation. In this talk, I will share our experience in this research and show the design of GPF – a GPU-based proportional fair (PF) scheduler that can meet the ∼100 µs time requirement. By implementing our proposed GPF on an off-the-shelf NVIDIA Quadro P6000 GPU, we show that GPF is able to achieve near-optimal performance while meeting the ∼100 µs time requirement. Our design experience shows that a GPU-based parallel computing holds the potential to crack the ever-lasting grand challenge of solving large-scale complex MINLP in real time.
Tom Hou is the Bradley Distinguished Professor of Electrical and Computer Engineering at Virginia Tech, USA. He received his Ph.D. degree from NYU Tandon School of Engineering (formerly Polytechnic University) in 1998. His current research focuses on developing innovative solutions to complex science and engineering problems arising from wireless and mobile networks. He is particularly interested in exploring new performance limits at the network layer by exploiting advances at the physical layer. In recent years, he has been actively working on real-time optimization based on GPU platform and solving large-scale complex optimization problems for various wireless networks. He is also interested in wireless security. Prof. Hou was named an IEEE Fellow for contributions to modeling and optimization of wireless networks. He has published two textbooks: Cognitive Radio Communications and Networks: Principles and Practices (Academic Press/Elsevier, 2009) and Applied Optimization Methods for Wireless Networks (Cambridge University Press, 2014). Prof. Hou’s research was recognized by five best paper awards from the IEEE and two paper awards from the ACM. He holds five U.S. patents.
In addition to his research activities, Prof. Hou has also been active in the research community. He was an Area Editor of IEEE Transaction on Wireless Communications (Wireless Networking area), and an Editor of IEEE Transactions on Mobile Computing, IEEE Journal on Selected Areas in Communications – Cognitive Radio Series, and IEEE Wireless Communications. Currently, he is an Editor of IEEE/ACM Transactions on Networking and ACM Transactions on Sensor Networks. He is the Steering Committee Chair of IEEE INFOCOM conference – the largest and top ranked conference in networking. He was a member of the Board of Governors as well as a Distinguished Lecturer of the IEEE Communications Society.
Hai Jin
Huazhong University of Science and Technology
China
Blockchain is the fascinating distributed ledger technology, which holds out the promise of disintermediation, transparency, and openness. An increasing number of businesses, academics and even governments are starting to view blockchain systems as the cornerstone of trust the Web 3.0 era (next generation value Internet). This presentation will first trace the source and the current development status of blockchain systems in various application areas. Secondly, a roadmap of the major theoretical and practical challenging issues faced by these blockchain systems will be laid out. Finally, I will give a glimpse of harnessing the super-abundant opportunities of blockchain systems in the future landscape.
Hai Jin is a Cheung Kung Scholars Chair Professor of Computer Science and Engineering at Huazhong University of Science and Technology. Jin received his Ph.D. in computer engineering from Huazhong University of Science and Technology in 1994. In 1996, he was awarded a German Academic Exchange Service fellowship to visit the Technical University of Chemnitz in Germany. Jin worked at The University of Hong Kong between 1998 and 2000, and as a visiting scholar at the University of Southern California between 1999 and 2000. He was awarded Excellent Youth Award from the National Science Foundation of China in 2001. Jin is the chief scientist of ChinaGrid, the largest grid computing project in China, and the chief scientists of National 973 Basic Research Program Project of Virtualization Technology of Computing System, and Cloud Security.
Jin is a IEEE Fellow, CCF Fellow, and a member of the ACM. He has co-authored 22 books and published over 700 research papers. His research interests include computer architecture, virtualization technology, cluster computing and cloud computing, peer-to-peer computing, network storage, and network security.
Ying-Dar Lin
National Chiao Tung University
Taiwan
5G promises to deliver enhanced mobile broadband (eMBB), massive machine type communication (mMTC), and ultra reliable low latency communication (URLLC). To support mMTC and URLLC, 5G needs to carry out computations closer to subscribers at the “edge” instead of the cloud, which turns 5G into an infrastructure for both communication and computing. Just like cloud computing, edge computing shall also be virtualized. On the other hand, communication is also being virtualized with software defined networking (SDN) and network function virtualization (NFV) which virtualize control plane and data plane, respectively. When applied to 5G, together they virtualize functions in access and core networks, and release them to run on any virtualized computing platform. Combining virtualization needs in edge computing and communication, 5G mobile edge computing (MEC) is virtualizing eNB (evolved node B), EPC (evolved packet core), and CO (central office) into VeNB, vEPC, and CORD (central office re-architected as a datacenter). They are not just communication devices anymore, but also serve as computing datacenters with many open source resources like OpenDaylight and OpenStack. After streamline the above evolution path, we then introduce 5G-Coral, an H2020 EU-TW project with Taiwanese and European partners, including NCTU, ITRI, ADLink, UC3M, Ericsson, InterDigital, Telecom Italia, SICS, Telcaria, and Azcom. We then give an overview of our research roadmap on 5 key components, including service chain routing, multi-RAT offloading, multi-tenant slicing, horizontal and vertical federation, and capacity optimization. Selected results are then presented. Key findings include (1) the 3-tier architecture with edge computing saves about 20.7% capacity cost over the traditional 2-tier architecture, with 70% of capacity allocated to the edges; (2) multi-RAT offloading reduces about 40% capacity cost with a large number of UEs; (3) some use cases in 5G would capture 1.5 to 2.3 times more resource than required if without slicing; (4) the low-latency authentication with MEC reduces over 90% overhead if done with the cloud.
YING-DAR LIN is a Distinguished Professor of computer science at National Chiao Tung University (NCTU), Taiwan. He received his Ph.D. in computer science from the University of California at Los Angeles (UCLA) in 1993. He was a visiting scholar at Cisco Systems, San Jose, during 2007–2008, CEO at Telecom Technology Center, Taiwan, during 2010-2011, and Vice President of National Applied Research Labs (NARLabs), Taiwan, during 2017-2018. Since 2002, he has been the founder and director of Network Benchmarking Lab (NBL, www.nbl.org.tw), which reviews network products with real traffic and has been an approved test lab of the Open Networking Foundation (ONF) since July 2014. He also cofounded L7 Networks Inc. in 2002, later acquired by D-Link Corp, and O’Prueba Inc. in 2018. His research interests include network security, wireless communications, and network softwarization. His work on multi-hop cellular was the first along this line, and has been cited over 850 times and standardized into IEEE 802.11s, IEEE 802.15.5, IEEE 802.16j, and 3GPP LTE-Advanced. He is an IEEE Fellow (class of 2013), IEEE Distinguished Lecturer (2014–2017), ONF Research Associate, and received in 2017 Research Excellence Award and K. T. Li Breakthrough Award. He has served or is serving on the editorial boards of several IEEE journals and magazines, and is the Editor-in-Chief of IEEE Communications Surveys and Tutorials (COMST). He published a textbook, Computer Networks: An Open Source Approach (www.mhhe.com/lin), with Ren-Hung Hwang and Fred Baker (McGraw-Hill, 2011).
Wanlei Zhou
University of Technology Sydney
Australia
Artificial Intelligence is now applied to almost every aspects of our lives, including agriculture, autonomous vehicles, banking, gaming, healthcare, marketing, politics, social networks, etc. However, wide applications of AI also bring serious security issues. For example, disasters may happen if an autonomous car is controlled by a malicious user. One way to address the AI security issues is to make sure that the AI supported applications still function correctly despite the presence of malicious agents. In this presentation we focus on multi-agent security, aiming to overcome two limitations of existing agent advising approaches: the presence of malicious agents giving false advices and the communication overhead. We propose a novel differentially private agent advising approach to overcome the two limitations. We use the differential privacy technique to reduce the impact of malicious agents without identifying them. Also, by adopting the privacy budget concept of differential privacy, the proposed approach can naturally control communication overhead. The experimental results demonstrate the effectiveness of the proposed approach.
Professor Wanlei Zhou is currently the Head of School of Computer Science in University of Technology Sydney (UTS), Australia. He received the B.Eng and M.Eng degrees from Harbin Institute of Technology, Harbin, China in 1982 and 1984, respectively, and the PhD degree from The Australian National University, Canberra, Australia, in 1991, all in Computer Science and Engineering. He also received a DSc degree (a higher Doctorate degree) from Deakin University in 2002. Before joining UTS, Professor Zhou held the positions of Alfred Deakin Professor, Chair of Information Technology, and Associate Dean (International Research Engagement) of Faculty of Science, Engineering and Built Environment, Deakin University. Professor Zhou has been the Head of School of Information Technology twice (Jan 2002-Apr 2006 and Jan 2009-Jan 2015) and Associate Dean of Faculty of Science and Technology in Deakin University (May 2006-Dec 2008). Professor Zhou also served as a lecturer in University of Electronic Science and Technology of China, a system programmer in HP at Massachusetts, USA; a lecturer in Monash University, Melbourne, Australia; and a lecturer in National University of Singapore, Singapore. His research interests include security and privacy, bioinformatics, and e-learning. Professor Zhou has published more than 400 papers in refereed international journals and refereed international conferences proceedings, including many articles in IEEE transactions and journals.
9 Dec | 10 Dec | 11 Dec | ||||||
---|---|---|---|---|---|---|---|---|
Room 1 | Room 2 | Room 3 | Room 1 | Room 2 | Room 3 | Room 1 | Room 2 | Room 3 |
Registration 07:45-17:00 | ||||||||
Opening 08:30-09:00 | Keynote 3 08:30-09:20 | Keynote 4 08:30-09:20 | ||||||
Keynote 1 09:00-09:50 | Panel Discussion 2 09:20-10:20 | Session 16 09:20-10:40 | Session 17 09:20-10:40 | Session 18 09:20-10:40 | ||||
Coffee Break | ||||||||
Keynote 2 10:10-11:00 | Session 7 10:40-12:20 | Session 8 10:40-12:20 | Session 9 10:40-12:20 | Session 19 11:00-12:40 | Session 20 11:00-12:40 | Session 21 11:00-12:40 | ||
Panel Discussion 1 11:00-12:00 | ||||||||
Lunch | ||||||||
Session 1 13:20-15:00 | Session 2 13:20-15:00 | Session 3 13:20-15:00 | Session 10 13:30-15:10 | Session 11 13:30-15:10 | Session 12 13:30-15:10 | |||
Coffee Break | ||||||||
Session 4 15:20-17:00 | Session 5 15:20-17:00 | Session 6 15:20-17:00 | Session 13 15:30-17:10 | Session 14 15:30-17:10 | Session 15 15:30-17:10 | |||
Welcome Reception 17:00-18:00 | Conference Banquet 18:00-21:00 |
Keynotes |
---|
Keynote 1 (9 Dec) 9:00-9:50 GPU-based Parallel Computing for Real-Time Optimization Prof Tom Hou, Virginia Tech, US |
Keynote 2 (9 Dec) 10:10-11:00 5G Mobile Edge Computing: Research Roadmap on Routing, Offloading, Slicing, Federation, and Optimization Prof Ying-Dar Lin, National Chiao Tung University, Taiwan |
Keynote 3 (10 Dec) 8:30-9:20 AI Security: A Case in dealing with malicious agents Prof Wanlei Zhou, University of Technology Sydney, Australia |
Keynote 4 (11 Dec) 8:30-9:20 Evening Out the Stumbling Blocks for Today’s Blockchain Systems Prof Hai Jin, Huazhong University of Science and Technology, China |
Panel Discussion 1 - Impact-driven innovation and transformation 11:00-12:00 (9 Dec) Moderator: Prof. Yang Xiang |
---|
David Abramson Director, Research Computing Centre The University of Queensland, Australia Meikang Qiu Professor, Department of Computer Science Pace University, US Weijia Jia Deputy Director and Chair Professor, State Key Laboratory of Internet of Things for Smart City University of Macau, Macau Xinghuo Yu Associate Deputy Vice Chancellor, Research and Innovation Capability RMIT University, Australia Phoebe Chen Professor and Chair, Department of Computer Science and Information Technology La Trobe University, Australia |
Panel Discussion 2 - Emerging technologies for the future 9:20-10:20 (10 Dec) Moderator: Dr. Sheng Wen |
---|
You-Gan Wang Professor Queensland University of Technology, Australia Keqiu Li Dean, College of Intelligence and Computing Tianjin University, China Hua Wang Professor Victoria University, Australia Jinjun Chen Deputy Director, Swinburne Data Science Research Institute Swinburne University of Technology, Australia |
Session 1: Parallel & Distributed Architectures 13:20-15:00 (9 Dec) [Room 1] |
---|
PPS: A Low-Latency and Low-Complexity switching architecture based on packet prefetch and arbitration prediction |
SWR: Using Windowed Reordering to Achieve Fast and Balanced Heuristic for Streaming Vertex-Cut Graph Partitioning |
Flexible Data Flow Architecture for Embedded Hardware Accelerators |
HBL-Sketch: A New Three-tier Sketch for Accurate Network Measurement |
Accelerating Large Integer Multiplication Using Intel AVX-512IFMA |
Session 2: Software Systems & Programming Models 13:20-15:00 (9 Dec) [Room 2] |
---|
Accelerating Lattice Boltzmann Method by Fully Exposing Vectorizable Loops |
A Solution for High Availability Memory Access |
Verification of Microservices Using Metamorphic Testing |
A New Robust and Reversible Watermarking Technique Based on Erasure Code |
Exit-Less Hypercall: Asynchronous System Calls in Virtualized Processes |
Session 3: Distributed & Parallel & Network-based Computing 13:20-15:00 (9 Dec) [Room 3] |
---|
Impromptu Rendezvous Based Multi-Threaded Algorithm for Shortest Lagrangian Path Problem on Road Networks |
FANG: Fast and Efficient Successor-State Generation for Heuristic Optimization on GPUs |
DETER: Streaming Graph Partitioning via Combined Degree and Cluster Information |
Which Node Properties Identify the Propagation Source in Networks? |
t/t-Diagnosability of BCube Network |
Session 4: Parallel & Distributed Architectures 15:20-17:00 (9 Dec) [Room 1] |
---|
A Communication-Avoiding Algorithm for Molecular Dynamics Simulation |
Out-of-Core GPU-Accelerated Causal Structure Learning |
Rise the Momentum: A Method for Reducing the Training Error on Multiple GPUs |
Pimiento: A Vertex-Centric Graph-Processing Framework on a Single Machine |
SPM: Modelling Spark Task Execution Time from The Sub-Stage Perspective |
Session 5: Software Systems & Programming Models 15:20-17:00 (9 Dec) [Room 2] |
---|
Automatic Optimization of Python Skeletal Parallel Programs |
Accurate Network Flow Measurement with Deterministic Admission Policy |
A Comparison Study of VAE and GAN for Software Fault Prediction |
Parallel Software Testing Sequence Generation Method Target at Full Covering Tested Behaviours |
A Framework for Designing Autonomous Parallel Data Warehouses |
Session 6: Distributed & Parallel & Network-based Computing 15:20-17:00 (9 Dec) [Room 3] |
---|
Reliability Aware Cost Optimization for Memory Constrained Cloud Workflows |
Null Model and Community Structure in Heterogeneous Networks |
Stable Clustering Method for Routing Establishment in Vehicular Ad-Hoc Networks |
Utility-based location distribution reverse auction incentive mechanism for mobile crowd sensing network |
Safeguarding Against Active Routing Attack via Online Learning |
Session 7: Big Data & its Applications 10:40-12:20 (10 Dec) [Room 1] |
---|
Strark-H: A Strategy for Spatial Data Storage to Improve Query Efficiency Based on Spark |
Multitask Assignment Algorithm Based on Decision Tree in Spatial Crowdsourcing Environment |
TIMOM: a novel time influence multi-objective optimization cloud data storage model for business process management |
RTEF-PP: A Robust Trust Evaluation Framework with Privacy Protection for Cloud Services Providers |
A Privacy-Preserving Access Control Scheme with Verifiable and Outsourcing Capabilities in Fog-Cloud Computing |
Session 8: Distributed & Parallel Algorithms 10:40-12:20 (10 Dec) [Room 2] |
---|
Efficient Pattern Matching on CPU-GPU Heterogeneous Systems |
Improving Performance of Batch Point-to-point Communications by Active Contention Reduction through Congestion-avoiding Message Scheduling |
A Fault Detection Algorithm for Cloud Computing using QPSO-based Weighted One-Class Support Vector Machine |
Neuron Fault Tolerance Capability Based Computation Reuse in DNNs |
Reliability Enhancement of Neural Networks via Neuron-level Vulnerability Quantization |
Session 9: Applications of Distributed & Parallel Computing 10:40-12:20 (10 Dec) [Room 3] |
---|
An Open Identity Authentication Scheme Based on Blockchain |
RBAC-GL:A role-based access control gasless architecture of consortium blockchain |
Developing Patrol Strategies for the Cooperative Opportunistic Criminals |
Deep Learning vs. Traditional Probabilistic Models: Case Study on Short Inputs for Password Guessing |
A Fully Anonymous Authentication Scheme Based on Medical Environment |
Session 10: Parallel & Distributed Architectures 13:30-15:10 (10 Dec) [Room 1] |
---|
Improving the Parallelism of CESM on GPU |
Parallel approach to sliding window sums |
ParaMoC:A Parallel Model Checker for Pushdown Systems |
FastDRC: Fast and Scalable Genome Compression Based on Distributed and Parallel Processing |
A Parallel Approach to Advantage Actor Critic in Deep Reinforcement Learning |
Session 11: Big Data & its Applications 13:30-15:10 (10 Dec) [Room 2] |
---|
Utility-aware Edge Server Deployment in Mobile Edge Computing |
Predicting Hard Drive Failures for Cloud Storage Systems |
Mobility-Aware Workflow Offloading and Scheduling Strategy for Mobile Edge Computing |
HSPP: Load-Balanced and Low-Latency File Partition and Placement Strategy on Distributed Heterogeneous Storage with Erasure Coding |
Adaptive Clustering for Outlier Identification in High-dimensional Data |
Session 12: Big Data & its Applications 13:30-15:10 (10 Dec) [Room 3] |
---|
Penguin Search Aware Proactive Application Placement |
A Data Uploading Strategy in Vehicular Ad-hoc Networks Targeted on Dynamic Topology: Clustering and Cooperation |
An Asynchronous Algorithm to Reduce the Number of Data Exchanges |
Two-Stage Clustering Hot Events Detection Model for Micro-Blog on Spark |
Cloud Server Load Turning Point Prediction Based on Feature Enhanced Multi-task LSTM |
Session 13: Applications of Distributed & Parallel Computing 15:30-17:10 (10 Dec) [Room 1] |
---|
A New Bitcoin Address Association Method Using a Two-level Learner Model |
Fog Computing based Traffic and Car Parking Intelligent System |
Blockchain-PUF-based Secure Authentication Protocol for Internet of Things |
Selective velocity distributed indexing for continuously moving objects model |
PMRS: A Privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud Data |
Session 14: Service Dependability & Security 15:30-17:10 (10 Dec) [Room 2] |
---|
Semi-supervised Deep Learning for Network Anomaly Detection |
Moving Target Defense Against Injection Attacks |
Tiger tally: Cross-domain scheme for Different Authentication Mechanism |
Simultaneously Advising Via Differential Privacy In Cloud servers Environment |
Feature Generation: A Novel Intrusion Detection Model Based on Prototypical Network |
Session 15: IoT and CPS Computing 15:30-17:10 (10 Dec) [Room 3] |
---|
Spare Representation for Device-Free Human Detection and Localization with COTS RFID |
A Novel Approach to Cost-Efficient Scheduling of Multi-Workflows in the Edge Computing Environment With Proximity Constraint |
Differential Privacy Preservation for Smart Meter Systems |
Sampling based Katz Centrality Estimation for Large-Scale Social Networks |
Location Prediction for Social Media Users Based on Information Fusion |
Session 16: IoT and CPS Computing 09:20-10:40 (11 Dec) [Room 1] |
---|
DCRRDT: A Method for Deployment and Control of RFID Sensors under Digital Twin-driven for Indoor Supervision |
Dynamic Ring Structure Based Target Localization Algorithm in Wireless Sensor Networks |
Concurrent software fine-coarse-grained automatic modeling method for algorithm error detection |
Understanding the Resource Demand Differences of Deep Neural Network Training |
Session 17: Service Dependability & Security 09:20-10:40 (11 Dec) [Room 2] |
---|
An Approach of Secure Two-way-pegged Multi-Sidechain |
RaNetMalDozer: A Novel NN-based Model for Android Malware Detection over Task Kernel Structures |
A vulnerability assessment method based on cooperative game theory |
Enhancing Model Performance for Fraud Detection by Feature Engineering and Compact Unified Expressions |
Session 18: Service Dependability & Security 09:20-10:40 (11 Dec) [Room 3] |
---|
Generative Adversarial Nets Enhanced Continual Data Release Using Differential Privacy |
Practical IDS on In-vehicle Network against Diversified Attack Models |
Privacy-Preserving Fine-grained Outsourcing PHR with Efficient Policy Updating |
Network Intrusion Detection Framework Based on Embedded Tree Model |
Session 19: Service Dependability & Security 11:00-12:40 (11 Dec) [Room 1] |
---|
Topic Reconstruction: A Novel Method Based on LDA Oriented to Intrusion Detection |
PDGAN: A Novel Poisoning Defense Method in Federated Learning using Generative Adversarial Network |
A Geo-indistinguishable Location Privacy Preservation Scheme for Location-Based Services in Vehicular Networks |
A Behavior-based Method for Distinguishing the Type of C&C Channel |
Data Poisoning Attacks on Graph Convolutional Matrix Completion |
Session 20: Service Dependability & Security 11:00-12:40 (11 Dec) [Room 2] |
---|
Secure Data Deduplication with Resistance to Side-Channel Attacks via Fog Computing |
Ultragloves:Lowcost Finger-level Interaction System for VR-applications based on ultrasonic movement tracking |
Adaptive detection method for Packet-In message injection attack in SDN |
Lightweight Outsourced Privacy-preserving Heart Failure Prediction Based on GRU |
DAPS:A Decentralized Anonymous Payment Scheme with Supervision |
Session 21: Performance Modelling & Evaluation 11:00-12:40 (11 Dec) [Room 3] |
---|
Secure Multi-receiver Communications: Models, Proofs, and Implementation |
EC-ARR: Using Active Reconstruction to Optimize SSD Read Performance |
Research of Benchmarking and Selection for TSDB |
HDF5-based I/O Optimization for Extragalactic HI Data Pipeline of FAST |
Twitter Event Detection under Spatio-temporal Constraints |
Social Events |
---|
Welcome Reception 17:00-18:00 (9 Dec) [Deakin Downtown] |
Conference Banquet 18:00-21:00 (10 Dec) [GoldLeaf Docklands] |
Note: our student helpers will take you from the conference venue to the restaurant immediately after the ending of all programs on that day. |
We invite submissions from academia, government, and industry presenting novel research on all aspects of information security and privacy primitives or protocols. Topics of ICA3PP 2019 include but are not limited to the following areas:
Track 1: Parallel and Distributed Architectures
Track 2: Software Systems and Programming Models
Track 3: Distributed and Network-based Computing
Track 4: Big Data and its Applications
Track 5: Parallel and Distributed Algorithms
Track 6: Applications of Parallel and Distributed Computing
Track 7: Service Dependability and Security in Distributed and Parallel Systems
Track 8: Internet of Things and Cyber-Physical-Social Computing
Track 9: Performance Modeling and Evaluation
Selected papers presented at the ICA3PP 2019 will be invited to consider submission (after significant extension) for special issues in the following journals:
Sensors Impact Factor: 2.475 Special Issue on Threat Identification and Defence for Internet-of-Things Learn more | |
Concurrency and Computation: Practice and Experience (CCPE) Impact Factor: 1.114 Special Issue on Security and Privacy in IoT Communication Learn more | |
Computers & Electrical Engineering Impact Factor: 1.747 Special Issue on Blockchain Techniques for the Internet of Vehicles Security Learn more | |
IEEE Access Impact Factor: 3.557 Learn more | |
Journal of Information Security and Applications Impact Factor: Pending Learn more | |
Symmetry Impact Factor: 1.256 Special Issue on Symmetry and Asymmetry Applications for Internet of Things Security and Privacy Learn more | |
International Journal of Network Management Impact Factor: 1.34 Special Issue on Trust and Privacy in Internet of Things: Challenges and Solutions Learn more | |
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submitted papers must be clearly presented in English, must not exceed 15 pages (plus up to 5 extra pages with over length charge) in Springer LNCS Format, including tables, figures, references and appendixes. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work.
PPS: A Low-Latency and Low-Complexity switching architecture based on packet prefetch and arbitration prediction Yi Dai |
SWR: Using Windowed Reordering to Achieve Fast and Balanced Heuristic for Streaming Vertex-Cut Graph Partitioning Jie Wang and Dagang Li |
Flexible Data Flow Architecture for Embedded Hardware Accelerators Jens Froemmer, Nico Bannow, Axel Aue, Christoph Grimm and Klaus Schneider |
HBL-Sketch: a New Three-tier Sketch for Accurate Network Measurement Keyan Zhao, Junxiao Wang, Heng Qi, Xin Xie, Xiaobo Zhou and Keqiu Li |
Accelerating Large Integer Multiplication Using Intel AVX-512IFMA Takuya Edamatsu and Daisuke Takahashi |
A Communication-Avoiding Algorithm for Molecular Dynamics Simulation Bei Wang, Yifeng Chen and Chaofeng Hou |
Out-of-Core GPU-Accelerated Causal Structure Learning Christopher Schmidt, Johannes Huegle, Siegfried Horschig and Matthias Uflacker |
Rise the Momentum: A Method for Reducing the Training Error on Multiple GPUs Yu Tang, Lujia Yin, Zhaoning Zhang and Dongsheng Li |
Pimiento: A Vertex-Centric Graph-Processing Framework on a Single Machine Jianqiang Huang, Wei Qin, Xiaoying Wang and Wenguang Chen |
SPM: Modeling Spark Task Execution Time from The Sub-Stage Perspective Wei Li, Shengjie Hu, Di Wang, Tianba Chen and Li Yunchun |
Improving the Parallelism of CESM on GPU Zehui Jin, Ming Dun, Xin You, Hailong Yang, Yunchun Li, Yingchun Lin, Zhongzhi Luan and Depei Qian |
Parallel approach to sliding window sums Roman Snytsar and Yatish Turakhia |
A Framework for Designing Autonomous Parallel Data Warehouses Soumia Benkrid and Ladjel Bellatreche |
Accelerating Lattice Boltzmann Method by Fully Exposing Vectorizable Loops Bin Qu, Song Liu, Hailong Huang, Jiajun Yuan, Qian Wang and Weiguo Wu |
A Solution for High Availability Memory Access Chunjing Gan, Bin Wang, Zhi-Jie Wang, Huazhong Liu, Dingyu Yang, Jian Yin, Shiyou Qian and Song Guo |
Verication of Microservices Using Metamorphic Testing Gang Luo, Xi Zheng, Huai Liu, Rongbin Xu, Dinesh Nagumothu, Ranjith Janapareddi, Er Zhuang and Xiao Liu |
A New Robust and Reversible Watermarking Technique Based on Erasure Code Heyan Chai, Shuqiang Yang, Zoe L. Jiang, Hengyu Luo, Xuan Wang and Yiqun Chen |
Exit-Less Hypercall: Asynchronous System Calls in Virtualized Processes Guoxi Li, Wenhai Lin and Wenzhi Chen |
Automatic Optimization of Python Skeletal Parallel Programs Frederic Loulergue and Jolan Philippe |
Accurate Network Flow Measurement with Deterministic Admission Policy Hongchao Du, Rui Wang, Zhaoyan Shen and Zhiping Jia |
A Comparison Study of VAE and GAN for Software Fault Prediction Yuanyuan Sun, Lele Xu, Lili Guo, Ye Li and Yongming Wang |
Parallel Software Testing Sequence Generation Method Target at Full Covering Tested Behaviors Tao Sun, Xiaoyun Wan, Wenjie Zhong, Xin Guo and Ting Zhang |
Impromptu Rendezvous Based Multi-Threaded Algorithm for Shortest Lagrangian Path Problem on Road Networks Kartik Vishwakarma and Venkata M. V. Gunturi |
FANG: Fast and Efficient Successor-State Generation for Heuristic Optimization on GPUs Marcel Köster, Julian Groß and Antonio Krueger |
DETER: Streaming Graph Partitioning via Combined Degree and Cluster Information Cong Hu, Jiang Zhong, Qi Li and Qing Li |
Which Node Properties Identify the Propagation Source in Networks? Zhong Li, Chunhe Xia, Tianbo Wang and Xiaochen Liu |
t/t-Diagnosability of BCube Network Yuhao Chen, Haiping Huang, Xiping Liu, Hua Dai and Zhijie Han |
Reliability Aware Cost Optimization for Memory Constrained Cloud Workflows E Cao, Saira Musa, Jianning Zhang, Mingsong Chen, Tongquan Wei, Xin Fu and Meikang Qiu |
Null Model and Community Structure in Heterogeneous Networks Xuemeng Zhai, Wanlei Zhou, Gaolei Fei, Hangyu Hu, Guangmin Hu and Youyang Qu |
Stable Clustering Method for Routing Establishment in Vehicular Ad-Hoc Networks Jieying Zhou, Pengfei He, Yinglin Liu and Weigang Wu |
Utility-based location distribution reverse auction incentive mechanism for mobile crowd sensing network Chunxiao Liu, Huilin Wang, Yanfeng Wang and Dawei Sun |
Safeguarding Against Active Routing Attack via Online Learning Meng Meng, Ruijuan Zheng, Mingchuan Zhang, Junlong Zhu and Qingtao Wu |
Strark-H: A Strategy for Spatial Data Storage to Improve Query Efficiency Based on Spark Weitao Zou, Weipeng Jing, Guangsheng Chen and Yang Lu |
Multitask Assignment Algorithm Based on Decision Tree in Spatial Crowdsourcing Environment Dunhui Yu, Xiaoxiao Zhang, Xingsheng Zhang and Lingli Zhang |
TIMOM: a novel time influence multi-objective optimization cloud data storage model for business process management Erzhou Zhu, Meng Li, Jia Xu, Xuejun Li, Feng Liu and Futian Wang |
RTEF-PP: A Robust Trust Evaluation Framework with Privacy Protection for Cloud Services Providers Hong Zhong, Jianzhong Zou, Jie Cui and Yan Xu |
A Privacy-Preserving Access Control Scheme with Verifiable and Outsourcing Capabilities in Fog-Cloud Computing Zhen Cheng, Jiale Zhang, Hongyan Qian, Mingrong Xiang and Di Wu |
Utility-aware Edge Server Deployment in Mobile Edge Computing Jianjun Qiu, Xin Li, Xiaolin Qin, Haiyan Wang and Yongbo Cheng |
Predicting Hard Drive Failures for Cloud Storage Systems Dongshi Liu, Gang Wang, Xiaoguang Liu and Zhongwei Li |
Mobility-Aware Workflow Offloading and Scheduling Strategy for Mobile Edge Computing Jia Xu, Xuejun Li, Xiao Liu, Chong Zhang, Lingmin Fan, Lina Gong and Juan Li |
HSPP: Load-Balanced and Low-Latency File Partition and Placement Strategy on Distributed Heterogeneous Storage with Erasure Coding Jiazhao Sun, Yunchun Li and Hailong Yang |
Adaptive Clustering for Outlier Identification in High-dimensional Data Srikanth Thudumu, Philip Branch, Jiong Jin and Jugdutt Singh |
Penguin Search Aware Proactive Application Placement Benamer Amira Rayane, Teyeb Hana and Ben Hadj Alouane Nejib |
A Data Uploading Strategy in Vehicular Ad-hoc Networks Targeted on Dynamic Topology: Clustering and Cooperation Zhipeng Gao, Xinyue Zheng, Kaile Xiao, Qian Wang and Zijia Mo |
An Asynchronous Algorithm to Reduce the Number of Data Exchanges Zhuo Tian, Lei Zhang and Yifeng Chen |
Two-Stage Clustering Hot Events Detection Model for Micro-Blog on Spark Ying Xia and Hanyu Huang |
Cloud Server Load Turning Point Prediction Based on Feature Enhanced Multi-task LSTM Li Ruan, Yu Bai and Limin Xiao |
Efficient Pattern Matching on CPU-GPU Heterogeneous Systems Victoria Sanz, Adrián Pousa, R. Marcelo Naiouf and Armando De Giusti |
Improving Performance of Batch Point-to-point Communications by Active Contention Reduction through Congestion-avoiding Message Scheduling Peng Jintao, Yang Zhang and Liu Qingkai |
A Fault Detection Algorithm for Cloud Computing using QPSO-based Weighted One-Class Support Vector Machine Xiahao Zhang and Yi Zhuang |
Neuron Fault Tolerance Capability Based Computation Reuse in DNNs Pengnian Qi, Jing Wang, Weigong Zhang and Xiaoyan Zhu |
Reliability Enhancement of Neural Networks via Neuron-level Vulnerability Quantization Keyao Li, Jing Wang, Xin Fu, Weigong Zhang and Xiufeng Sui |
ParaMoC:A Parallel Model Checker for Pushdown Systems Hansheng Wei, Xin Ye, Jianqi Shi and Yanhong Huang |
FastDRC:Fast and Scalable Genome Compression Based on Distributed and Parallel Processing Yimu Ji, Houzhi Fang, Haichang Yao, Jing He, Shuai Chen, Kui Li and Shangdong Liu |
A Parallel Approach to Advantage Actor Critic in Deep Reinforcement Learning Xing Zhu and Yunfei Du |
An Open Identity Authentication Scheme Based on Blockchain Yuxiang Chen and Dong Guishan |
RBAC-GL:A role-based access control gasless architecture of consortium blockchain Zhiyu Xu, Tengyun Jiao, Lin Yang, Donghai Liu, Sheng Wen and Yang Xiang |
Developing Patrol Strategies for the Cooperative Opportunistic Criminals Yanan Zhao, Mingchu Li and Cheng Guo |
Deep Learning vs. Traditional Probabilistic Models: Case Study on Short Inputs for Password Guessing Yuan Linghu, Xiangxue Li and Zhenlong Zhang |
A Fully Anonymous Authentication Scheme Based on Medical Environment Jing Lv, Ning Xi and Xue Rao |
A New Bitcoin Address Association Method Using a Two-level Learner Model Tengyu Liu, Jingguo Ge, Yulei Wu, Bowei Dai, Liangxiong Li, Zhongjiang Yao, Jifei Wen and Hongbin Shi |
Fog Computing based Traffic and Car Parking Intelligent System Walaa Alajali, Shang Gao and Abdulrahman D Alhusaynat |
Blockchain-PUF-based Secure Authentication Protocol for Internet of Things Akash Suresh Patil, Rafik Hamza, Hongyang Yan, Alzubair Hassan and Jin Li |
Selective velocity distributed indexing for continuously moving objects model Imene Bareche and Xia Ying |
RaNetMalDozer: A Novel NN-based Model for Android Malware Detection over Task Kernel Structures Xinning Wang and Chong Li |
Moving Target Defense Against Injection Attacks Huan Zhang, Kangfeng Zheng, Xiaodan Yan, Shoushan Luo and Bin Wu |
Tiger tally: Cross-domain scheme for Different Authentication Mechanism Dong Guishan and Chen Yuxiang |
Simultaneously Advising Via Differential Privacy In Cloud servers Environment Sheng Shen, Tianqing Zhu, Dayong Ye, Mengmeng Yang, Tingting Liao and Wanlei Zhou |
Feature Generation: A Novel Intrusion Detection Model Based on Prototypical Network Shizhao Wang, Chunhe Xia and Tianbo Wang |
Topic Reconstruction: A Novel Method Based on LDA Oriented to Intrusion Detection Shengwei Lei, Chunhe Xia, Tianbo Wang and Shizhao Wang |
PDGAN: A Novel Poisoning Defense Method in Federated Learning using Generative Adversarial Network Ying Zhao, Junjun Chen, Jia Zhang, Di Wu, Jian Teng and Shui Yu |
A Geo-indistinguishable Location Privacy Preservation Scheme for Location-Based Services in Vehicular Networks Li Luo, Zhenzhen Han and Chuan Xu |
A Behavior-based Method for Distinguishing the Type of C&C Channel Jianguo Jiang, Qilei Yin, Zhixin Shi, Guokun Xu and Xiaoyu Kang |
Data Poisoning Attacks on Graph Convolutional Matrix Completion Qi Zhou, Yizhi Ren, Tianyu Xia, Lifeng Yuan and Linqiang Chen |
Secure Data Deduplication with Resistance to Side-Channel Attacks via Fog Computing Fuyou Zhang, Saiyu Qi, Haoran Yuan and Meng Zhang |
Ultragloves:Lowcost Finger-level Interaction System for VR-applications based on ultrasonic movement tracking Si Li, Yanchao Zhao and Chengyong Liu |
Adaptive detection method for Packet-In message injection attack in SDN Xinyu Zhan, Mingsong Chen, Shui Yu and Yue Zhang |
PMRS: A Privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud Data Jingjing Bao, Hua Dai, Maohu Yang, Xun Yi, Geng Yang and Liang Liu |
Lightweight Outsourced Privacy-preserving Heart Failure Prediction Based on GRU Zuobin Ying, Shuanglong Cao, Shun Zhang and Ximeng Liu |
DAPS:A Decentralized Anonymous Payment Scheme with Supervision Zhaoyang Wang, Qingqi Pei, Xuefeng Liu, Lichuan Ma, Huizhong Li and Shui Yu |
An Approach of Secure Two-way-pegged Multi-Sidechain Jinnan Guo, Keke Gai, Liehuang Zhu and Zijian Zhang |
Semi-supervised Deep Learning for Network Anomaly Detection Yuanyuan Sun, Lili Guo, Ye Li, Lele Xu and Yongming Wang |
A vulnerability assessment method based on cooperative game theory Chenjian Duan, Zhen Wang, Hong Ding, Mengting Jiang, Yizhi Ren and Ting Wu |
Enhancing Model Performance for Fraud Detection by Feature Engineering and Compact Unified Expressions Ikram Ul Haq, Iqbal Gondal and Peter Vamplew |
Network Intrusion Detection Framework Based on Embedded Tree Model Jieying Zhou, Pengfei He, Rongfa Qiu and Shijun Yang |
Generative Adversarial Nets Enhanced Continual Data Release Using Differential Privacy Stella Ho, Youyang Qu, Longxiang Gao, Jianxin Li and Yong Xiang |
Practical IDS on In-vehicle Network against Diversified Attack Models Junchao Xiao, Hao Wu, Xiangxue Li and Yuan Linghu |
Privacy-Preserving Fine-grained Outsourcing PHR with Efficient Policy Updating Zuobin Ying, Maode Ma, Ximeng Liu and Wenjie Jiang |
Spare Representation for Device-Free Human Detection and Localization with COTS RFID Weiqing Huang, Shaoyi Zhu, Siye Wang, Jinxing Xie and Yanfang Zhang |
A Novel Approach to Cost-Efficient Scheduling of Multi-Workflows in the Edge Computing Environment With Proximity Constraint Yuyin Ma, Yunni Xia and Wanbo Zheng |
Differential Privacy Preservation for Smart Meter Systems Junfang Wu, Weizhong Qiang, Tianqing Zhu, Hai Jin, Peng Xu and Sheng Shen |
Sampling based Katz Centrality Estimation for Large-Scale Social Networks Mingkai Lin, Wenzhong Li, Cam-Tu Nguyen, Xiaoliang Wang and Sanglu Lu |
Location Prediction for Social Media Users Based on Information Fusion Gaolei Fei, Yang Liu, Yong Cheng, Fucai Yu and Guangmin Hu |
DCRRDT: A Method for Deployment and Control of RFID Sensors under Digital Twin-driven for Indoor Supervision Siye Wang, Mengnan Cai, Qinxuan Wu, Yijia Jin, Xinling Shen and Yanfang Zhang |
Dynamic Ring Structure Based Target Localization Algorithm in Wireless Sensor Networks Yu Pan, Qianqian Ren and Jinbao Li |
Secure Multi-receiver Communications: Models, Proofs, and Implementation Maomao Fu, Xiaozhuo Gu, Jingqiang Lin, Wenhao Dai and Han Wang |
EC-ARR: Using Active Reconstruction to Optimize SSD Read Performance Shuo Li, Mingzhu Deng, Fang Liu, Zhiguang Chen and Nong Xiao |
Research of Benchmarking and Selection for TSDB Feng Ye, Zihao Liu, Songjie Zhu, Peng Zhang and Yong Chen |
HDF5-based I/O Optimization for Extragalactic HI Data Pipeline of FAST Yiming Ji, Ce Yu, Jian Xiao, Hao Wang and Bo Zhang |
Twitter Event Detection under Spatio-temporal Constraints Gaolei Fei, Yong Cheng, Yang Liu, Zhuo Liu and Guangmin Hu |
Concurrent software fine-coarse-grained automatic modeling method for algorithm error detection Tao Sun, Jing Zhang and Wenjie Zhong |
Understanding the Resource Demand Differences of Deep Neural Network Training Jiangsu Du, Xin Zhu, Nan Hu and Yunfei Du |
AdapTPA:An Adaptive Thread Partitioning Approach in Speculative Multithreading Yuxiang Li Li, Lili Zhang and Zhiyong Zhang |
Full registration payment is required by 25 September 2019 for EACH accepted paper. This deadline will be strictly enforced. Failure to pay the registration fee by 25 September 2019 will result in the exclusion of the papers from the Conference Proceedings.
Registration Fee (in US Dollars) | By 25 September 2019 | After 25 September 2019 |
---|---|---|
Full Registration | USD$865 | Not Accepted |
Student & Attendee Registration | USD$475 | USD$575 |
Extra Page (per page) | USD$100 | Not Accepted |
Additional Conference Banquet Ticket (per person) | USD$100 | USD$100 |
All types of registration include: full attendance of the conference, welcome reception, conference banquet, morning teas, afternoon teas and lunches.
Please note that if you are the only author registered for an accepted paper, you should choose Full Registration (instead of Student & Attendee Registration) even though you are a student.
If you have the student status, and your paper has been paid under Full Registration by a co-author, you may choose the Student & Attendee Registration rate. If you don’t have a paper, and want to participate the conference, you may also choose the Student & Attendee Registration rate.
If extra pages are required, payment of USD$100 per extra page needs to be made together with the conference registration fee.
For full papers, the first 15 pages are included in the standard registration with an option to buy additional 5 extra pages (up to 20 pages in total). For short and workshop papers, the first 8 pages are included in the standard registration with an option to buy additional 2 extra pages (up to 10 pages in total).
A banquet ticket is included in all types of registration. Additional banquet tickets, e.g., if you want to bring your family, are available for purchase at the cost of USD$100 per person. Payment needs to be made together with the conference registration fee.
The invitation letter will be issued once your registration payment is received. Please note that no invitation letter can be issued before the payment.
Registration for the conference cannot be canceled. There is no refund of registration fees.
Please click the following link to complete your registration.
ICA3PP 2019 Registration System
Payment via credit card or PayPal can be made directly in the registration system.
Payment via bank transfer are accepted at the following account. For participants who want to pay by bank transfer, please send the payment AS SOON AS POSSIBLE as it takes some time to process the payment.
Account name | Insightek |
Bank Name | Commonwealth Bank of Australia |
Address of Insightek | 2B Service Road, Blackburn, VIC 3130, Australia |
SWIFT code | CTBAAU2S |
BSB/Account No | 063182 10939649 |
After the bank transfer is completed, please send a scanned copy of the bank transfer transaction receipt to the conference secretary (email abby.xu@insightek.com.au) with your name and paper ID. We will confirm your registration once we receive the payment and the scanned transaction receipt.
Yong Xiang, Deakin University, Australia
David Abramson, The University of Queensland, Australia
Yi Pan, Georgia State University, USA
Yang Xiang, Swinburne University of Technology, Australia
Albert Zomaya, The University of Sydney, Australia
Laurence T. Yang, St. Francis Xavier University, Canada
Sheng Wen, Swinburne University of Technology, Australia
Yu Wang, Guangzhou University, China
Jing He, Swinburne University of Technology, Australia
Yang Xiang, Swinburne University of Technology, Australia (Chair)
Weijia Jia, Shanghai Jiaotong University, China
Yi Pan, Georgia State University, USA
Laurence T. Yang, St. Francis Xavier University, Canada
Wanlei Zhou, University of Technology Sydney, Australia
Marco Aldinucci, University of Torino, Italy
Pedro Alonso-Jordá, Universitat Politècnica de València, Spain
Daniel Andresen, Kansas State University, USA
Danilo Ardagna, Politecnico di Milano, Italy
Man Ho Au, The Hong Kong Polytechnic University, Hong Kong
Guillaume Aupy, INRIA, France
Joonsang Baek, University of Wollongong, Australia
Ladjel Bellatreche, LIAS/ENSMA, France
Siegfried Benkner, University of Vienna, Austria
Jorge Bernal Bernabe, University of Murcia, Spain
Thomas Boenisch, High performance Computing Center Stuttgart, Germany
George Bosilca, University of Tennessee, USA
Suren Byna, Lawrence Berkeley National Laboratory, USA
Massimo Cafaro, University of Salento, Italy
Philip Carns, Argonne National Laboratory, USA
Arcangelo Castiglione, University of Salerno, Italy
Tania Cerquitelli, Politecnico di Torino, Italy
Tzung-Shi Chen, National University of Tainan, Taiwan
Kim-Kwang Raymond Choo, The University of Texas at San Antonio, USA
Jose Alfredo Ferreira Costa, Federal University of Rio Grande do Norte, Brazil
Raphaël Couturier, University Bourgogne Franche-Comté, France
Masoud Daneshtalab, Mälardalen University, KTH Royal Institute of Technology, Sweden
Gregoire Danoy, University of Luxembourg, Luxembourg
Saptarshi Debroy, City University of New York, USA
Casimer Decusatis, Marist College, USA
Eugen Dedu, FEMTO-ST Institute, University Bourgogne Franche-Comté, CNRS, France
Frederic Desprez, INRIA, France
Juan-Carlos Díaz-Martín, University of Extremadura, Spain
Christian Esposito, University of Napoli Federico II, Italy
Ugo Fiore, Federico II University, Italy
Franco Frattolillo, University of Sannio, Italy
Marc Frincu, West University of Timisoara, Romania
Jorge G. Barbosa, University of Porto, Portugal
Jose Daniel Garcia, University Carlos III of Madrid, Spain
Luis Javier García Villalba, Universidad Complutense de Madrid, Spain
Harald Gjermundrod, University of Nicosia, Cyprus
Jing Gong, KTH Royal Institute of Technology, Sweden
Daniel Grosu, Wayne State University, USA
Houcine Hassan, Universitat Politècnica de València, Spain
Sun-Yuan Hsieh, National Cheng Kung University, Taiwan
Xinyi Huang, Fujian Normal University, China
Mauro Iacono, Università degli Studi della Campania Luigi Vanvitelli, Italy
Shadi Ibrahim, Inria Rennes Bretagne Atlantique Research Center, France
Yasuaki Ito, Hiroshima University, Japan
Edward Jung, Kennesaw State University, USA
Georgios Kambourakis, University of the Aegean, Greece
Helen Karatza, Aristotle University of Thessaloniki, Greece
Gabor Kecskemeti, Liverpool John Moores University, UK
Muhammad Khurram Khan, King Saud University, Saudi Arabia
Sokol Kosta, Aalborg University, Denmark
Dieter Kranzlmüller, Ludwig Maximilian University of Munich, Germany
Peter Kropf, University of Neuchâtel, Switzerland
Michael Kuhn, University of Hamburg, Germany
Julian Martin Kunkel, University of Reading, UK
Algirdas Lančinskas, Vilnius University, Italy
Che-Rung Lee, National Tsing Hua University, Taiwan
Laurent Lefevre, INRIA, France
Kenli Li, Hunan University, China
Xiao Liu, Deakin University, Australia
Jay Lofstead, Sandia National Laboratories, USA
Paul Lu, University of Alberta, Canada
Tomas Margalef, Universitat Autonoma de Barcelona, Spain
Stefano Markidis, KTH Royal Institute of Technology, Sweden
Barbara Masucci, University of Salerno, Italy
Susumu Matsumae, Saga University, Japan
Raffaele Montella, University of Naples Parthenope, Italy
Francesco Moscato, University of Campania Luigi Vanvitelli, Italy
Bogdan Nicolae, Argonne National Laboratory, USA
Anne-Cécile Orgerie, CNRS, France
Francesco Palmieri, University of Salerno, Italy
Dana Petcu, West University of Timisoara, Romania
Salvador Petit, Universitat Politècnica de València, Spain
Riccardo Petrolo, Konica Minolta Laboratory Europe
Florin Pop, University Politehnica of Bucharest, National Institute for Research and Development in Informatics (ICI), Romania
Radu Prodan, University of Klagenfurt, Austria
Suzanne Rivoire, Sonoma State University, USA
Ivan Rodero, Rutgers University, USA
Romain Rouvoy, University of Lille, Inria, IUF, France
Antonio Ruiz-Martínez, University of Murcia, Spain
Francoise Sailhan, CNAM, France
Sherif Sakr, The University of New South Wales, Australia
Ali Shoker, HASLab, INESC TEC, University of Minho, Portugal
Giandomenico Spezzano, CNR, Italy
Patricia Stolf, IRIT, France
Peter Strazdins, The Australian National University, Australia
Hari Subramoni, The Ohio State University, USA
Frederic Suter, CC IN2P3, CNRS, France
Andrei Tchernykh, CICESE Research Center, Mexico
Massimo Torquati, University of Pisa, Italy
Tomoaki Tsumura, Nagoya Institute of Technology, Japan
Vladimir Voevodin, RCC MSU, Russia
Xianglin Wei, Nanjing Telecommunication Technology Research Institute, China
Sheng Wen, Swinbourne University of Technology, Australia
Jigang Wu, Guangdong University of Technology, China
Roman Wyrzykowski, Czestochowa University of Technology, Poland
Ramin Yahyapour, GWDG, University of Göttingen, Germany
Laurence T. Yang, St Francis Xavier University, Canada
Wun-She Yap, Universiti Tunku Abdul Rahman, Malaysia
Junlong Zhou, Nanjing University of Science and Technology, China
Albert Zomaya, The University of Sydney, Australia
Melbourne, Australia | 9-11 Dec 2019
The main goal of this workshop is to provide a timely forum for the exchange and dissemination of recent advances in the field of distributed and parallel computing. The workshop is meant to bridge research of theory and practice in all aspects of distributed and parallel computing. We are convinced that the workshop atmosphere will be conducive to open and mutually beneficial exchanges of ideas between the participants of these areas.
Paper Submission Due | 6 Sep 2019 |
Author Notification | 10 Sep 2019 |
Camera-ready Paper Due | 20 Sep 2019 |
Registration Due | 25 Sep 2019 |
Conference Date | 9-11 Dec 2019 |
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submitted papers must be clearly presented in English, must not exceed 8 pages (plus up to 2 extra pages with over length charge) in Springer LNCS Format, including tables, figures, references and appendixes. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work.
RADPC2019 Paper Submission Link
Chao Chen, Swinburne University of Technology, Australia
Xiao Chen, Swinburne University of Technology, Australia
Marco Aldinucci, University of Torino, Italy
Pedro Alonso-Jordá, Universitat Politècnica de València, Spain
Daniel Andresen, Kansas State University, USA
Danilo Ardagna, Politecnico di Milano, Italy
Man Ho Au, The Hong Kong Polytechnic University, Hong Kong
Guillaume Aupy, INRIA, France
Joonsang Baek, University of Wollongong, Australia
Ladjel Bellatreche, LIAS/ENSMA, France
Siegfried Benkner, University of Vienna, Austria
Jorge Bernal Bernabe, University of Murcia, Spain
Thomas Boenisch, High performance Computing Center Stuttgart, Germany
George Bosilca, University of Tennessee, USA
Suren Byna, Lawrence Berkeley National Laboratory, USA
Massimo Cafaro, University of Salento, Italy
Philip Carns, Argonne National Laboratory, USA
Arcangelo Castiglione, University of Salerno, Italy
Tania Cerquitelli, Politecnico di Torino, Italy
Tzung-Shi Chen, National University of Tainan, Taiwan
Kim-Kwang Raymond Choo, The University of Texas at San Antonio, USA
Jose Alfredo Ferreira Costa, Federal University of Rio Grande do Norte, Brazil
Raphaël Couturier, University Bourgogne Franche-Comté, France
Masoud Daneshtalab, Mälardalen University, KTH Royal Institute of Technology, Sweden
Gregoire Danoy, University of Luxembourg, Luxembourg
Saptarshi Debroy, City University of New York, USA
Casimer Decusatis, Marist College, USA
Eugen Dedu, FEMTO-ST Institute, University Bourgogne Franche-Comté, CNRS, France
Frederic Desprez, INRIA, France
Juan-Carlos Díaz-Martín, University of Extremadura, Spain
Christian Esposito, University of Napoli Federico II, Italy
Ugo Fiore, Federico II University, Italy
Franco Frattolillo, University of Sannio, Italy
Marc Frincu, West University of Timisoara, Romania
Jorge G. Barbosa, University of Porto, Portugal
Jose Daniel Garcia, University Carlos III of Madrid, Spain
Luis Javier García Villalba, Universidad Complutense de Madrid, Spain
Harald Gjermundrod, University of Nicosia, Cyprus
Jing Gong, KTH Royal Institute of Technology, Sweden
Daniel Grosu, Wayne State University, USA
Houcine Hassan, Universitat Politècnica de València, Spain
Sun-Yuan Hsieh, National Cheng Kung University, Taiwan
Xinyi Huang, Fujian Normal University, China
Mauro Iacono, Università degli Studi della Campania Luigi Vanvitelli, Italy
Shadi Ibrahim, Inria Rennes Bretagne Atlantique Research Center, France
Yasuaki Ito, Hiroshima University, Japan
Edward Jung, Kennesaw State University, USA
Georgios Kambourakis, University of the Aegean, Greece
Helen Karatza, Aristotle University of Thessaloniki, Greece
Gabor Kecskemeti, Liverpool John Moores University, UK
Muhammad Khurram Khan, King Saud University, Saudi Arabia
Sokol Kosta, Aalborg University, Denmark
Dieter Kranzlmüller, Ludwig Maximilian University of Munich, Germany
Peter Kropf, University of Neuchâtel, Switzerland
Michael Kuhn, University of Hamburg, Germany
Julian Martin Kunkel, University of Reading, UK
Algirdas Lančinskas, Vilnius University, Italy
Che-Rung Lee, National Tsing Hua University, Taiwan
Laurent Lefevre, INRIA, France
Kenli Li, Hunan University, China
Xiao Liu, Deakin University, Australia
Jay Lofstead, Sandia National Laboratories, USA
Paul Lu, University of Alberta, Canada
Tomas Margalef, Universitat Autonoma de Barcelona, Spain
Stefano Markidis, KTH Royal Institute of Technology, Sweden
Barbara Masucci, University of Salerno, Italy
Susumu Matsumae, Saga University, Japan
Raffaele Montella, University of Naples Parthenope, Italy
Francesco Moscato, University of Campania Luigi Vanvitelli, Italy
Bogdan Nicolae, Argonne National Laboratory, USA
Anne-Cécile Orgerie, CNRS, France
Francesco Palmieri, University of Salerno, Italy
Dana Petcu, West University of Timisoara, Romania
Salvador Petit, Universitat Politècnica de València, Spain
Riccardo Petrolo, Konica Minolta Laboratory Europe
Florin Pop, University Politehnica of Bucharest, National Institute for Research and Development in Informatics (ICI), Romania
Radu Prodan, University of Klagenfurt, Austria
Suzanne Rivoire, Sonoma State University, USA
Ivan Rodero, Rutgers University, USA
Romain Rouvoy, University of Lille, Inria, IUF, France
Antonio Ruiz-Martínez, University of Murcia, Spain
Francoise Sailhan, CNAM, France
Sherif Sakr, The University of New South Wales, Australia
Ali Shoker, HASLab, INESC TEC, University of Minho, Portugal
Giandomenico Spezzano, CNR, Italy
Patricia Stolf, IRIT, France
Peter Strazdins, The Australian National University, Australia
Hari Subramoni, The Ohio State University, USA
Frederic Suter, CC IN2P3, CNRS, France
Andrei Tchernykh, CICESE Research Center, Mexico
Massimo Torquati, University of Pisa, Italy
Tomoaki Tsumura, Nagoya Institute of Technology, Japan
Vladimir Voevodin, RCC MSU, Russia
Xianglin Wei, Nanjing Telecommunication Technology Research Institute, China
Sheng Wen, Swinbourne University of Technology, Australia
Jigang Wu, Guangdong University of Technology, China
Roman Wyrzykowski, Czestochowa University of Technology, Poland
Ramin Yahyapour, GWDG, University of Göttingen, Germany
Laurence T. Yang, St Francis Xavier University, Canada
Wun-She Yap, Universiti Tunku Abdul Rahman, Malaysia
Junlong Zhou, Nanjing University of Science and Technology, China
Albert Zomaya, The University of Sydney, Australia
ICA3PP 2019 will be held at Deakin Downtown in Melbourne's CBD. Deakin Downtown is located on Level 12 of Tower 2, Collins Square at 727 Collins Street in Docklands. Various public transport options are available. It is only 5 minutes from Southern Cross Station.
All hotels listed above are within 5-15 minutes walking distance to the conference venue. Booking can be made through the hotel website directly, or through other travel agent websites such as booking.com, agoda.com, expedia.com, wotif.com, hotels.com, priceline.com, ctrip.com etc. Note that we do not have any discount with any hotel. We recommend conference participants to book their hotel as early as possible. There are many booking options available such that customers do not need to pay until check-in and they can freely cancel the booking up to one or two days before arrivial. Conference participants may choose this option to book the hotel first, before getting their required internal approval or visa.