Get our official conference app
For Blackberry or Windows Phone, Click here

For feature details, visit Whova

Key Dates Full Papers

Abstract Submission Deadline

January 28, 2021 (AoE)
January 21, 2021 (AoE)

Paper Submission Deadline

February 4, 2021 (AoE)
January 28, 2021 (AoE)

Author Notification

March 19, 2021
March 15, 2021

Final Papers Due

March 25, 2021


Submit your paper here

Download CFP

TXT Format | PDF Format

Download Call for EU Projects

TXT Format | PDF Format


Previous Conferences

2020, 2019, 2018, 2017, 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007, 2006, 2005, 2004


General Co-Chairs

Maurizio Palesi
University of Catania, IT
Antonino Tumeo
Pacific Northwest National Laboratory, USA

Program Co-Chairs

Georgios I. Goumas
National Technical University of Athens, GR
Carmen G. Almudever
Delft University of Technology, NL

For more information, visit the website at


Computing Frontiers 2021 will feature co-located workshops. Submission of papers to the workshops is handled separately from the main conference. Please refer to the websites of the workshops for submission deadlines and more details.

Malicious Software and Hardware in Internet of Things (MaL-IoT '21)

Aim and scope:
Cyber-physical and smart embedded systems, already highly networked, will be even more connected in the near future to form the Internet of Things, handling large amount of private and safety critical data. The pervasive diffusion of these devices will create several threats to privacy and could open new possibilities for attackers, since the security of even large portions of the Internet of Things could be harmed by compromising a reduced number of components. The possibility of securely updating devices should be guaranteed and it should be possible to verify and assert the root of trust of components. With respect to this context we expect contributions in different areas of security in Internet of Things. Topics of the workshop include but are not limit to:

  1. Malicious firmware design and detection
  2. Malware in Internet of Things applications
  3. Hardware root of trust
  4. Privacy issues of smart-home systems and complex systems
  5. Hardware Trojans and their effects on systems
  6. Hardware authentication and IP protection
  7. Secure communication and key-management
  8. Implementation attacks and countermeasures
  9. Emerging threats and attack vectors in the Internet of Things
  10. Supply chain security

Workshop Website:

Important Dates:
Submissions Deadline: February 20, 2021
Author Notification: March 20, 2021
Camera-Ready Papers Due: March 25, 2021


Big Data Analytics Workshop — Big Data [Special Session #3]

Aim and Scope:
Data analytics is transforming the world of science, health, commerce, defense, and social activities. Complex scientific and human systems are being designed, managed, and optimized using first-principal simulations, data science, machine learning, and graph methods. Many real-world analytic workloads are a mix of algorithms and data types best supported by different programming and parallel execution models. The composability of models and the capability of target computer systems to efficiently and transparently support the diverse model is key to achieving performance and productivity requirements of emerging real-world uses.

This workshop seeks paper on mixed data analytic workflows, algorithms, composability, optimizations, programming environments, hardware designs, and benchmark studies. Besides regular papers, extended abstracts papers describing innovative ideas related to the workshop theme are also encouraged.

Workshop Website:

Important Dates:
Submissions Deadline: February 28, 2021
Author Notification: March 20, 2021
Camera-Ready Papers Due: March 25, 2021