<div dir="ltr"><div class="gmail_quote"><br><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr">

<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:center" align="center"><b><span style="font-size:20pt;line-height:107%;font-family:"Arial",sans-serif">Workshops co-located with ICCAC 2017
Conference</span></b></p>

<p class="MsoNormal" style="text-align:center;line-height:normal" align="center"><span style="font-size:12pt;font-family:"Arial",sans-serif">IEEE
International Conference on Cloud and Autonomic Computing (ICCAC) 2017<br>
</span><span style="font-family:"Arial",sans-serif">University
of Arizona, Tucson, Arizona; September 18<sup>th</sup> – 22<sup>nd</sup>,
2017<br>
</span><span lang="DE"><a href="http://autonomic-conference.org" target="_blank"><span style="font-family:"Arial",sans-serif">http://autonomic-conference.or<wbr>g</span></a></span></p><p class="MsoNormal" style="text-align:center;line-height:normal" align="center"><span lang="DE"><a href="http://autonomic-conference.org" target="_blank"><span style="font-family:"Arial",sans-serif"></span></a></span></p><div><a href="http://autonomic-conference.org" target="_blank">​​</a></div><span style="font-family:"Arial",sans-serif" lang="DE"> </span><span style="font-family:"Arial",sans-serif"></span><p></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify"><b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Overview </span></b></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Cloud
platforms and services present common and cross-cutting multiple management challenges
and autonomic computing systems address these challenges by integrating
monitoring, decision-processing, and actuation capabilities based on high-level
policies. The workshops co-located with ICCAC 2017 conference (in addition to
the poster session, panel, and keynote speakers) would like to bring together
researchers and practitioners to address the multiple facets of cloud and
autonomic computing. Therefore, for the workshops below, we would like you to
consider submitting your ongoing work that has not been published before and
includes original work, and may not be under consideration for another workshop,
conference, or journal. Accepted papers must be presented at the workshop to be
included in the proceedings in IEEEXplore. </span></p>

<h1>The IEEE Workshop on Automation of Cloud Configuration and Operations
(ACCO)</h1>

<p class="MsoNormal" style="margin:6pt 0in 0.0001pt;text-align:justify"><b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Scope and
Topics </span></b></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpFirst" style="margin:0in 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Dynamic configuration of cloud system resources to improve performance,
security, and availability.</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:0in 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Automated data storage configuration and management in cloud systems.</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:0in 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Techniques to aggregate cloud infrastructures into well-defined
components or structures that support automatic configuration and runtime
management.</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:0in 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Intelligent cloud workload characterization and prediction to achieve
fault tolerance, reliability and greater resilient operations.</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:0in 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Tools to automatically configure, monitor, and validate security of
cloud systems and their applications.</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:0in 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Tools and techniques to pre-certify virtual machine (VM) templates,
cloud template configurations and applications.</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpLast" style="margin:0in 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Tools to provide cloud users full visibility into security and
operations of cloud systems and applications.</span></p>

<p class="MsoNormal" style="margin:6pt 0in 0.0001pt;text-align:justify"><b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Important
Dates</span></b></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>Ÿ</span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> Paper submission: June 25,
2017<span>               </span></span><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>Ÿ</span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> Author notification: July 9, 2017<span>               </span></span><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>Ÿ</span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> Camera-ready version: July 21, 2017</span></p>

<p class="MsoNormal" style="margin:6pt 0in 0.0001pt;text-align:justify"><b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Submission
link:</span></b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">
<a href="https://easychair.org/conferences/?conf=acco17" target="_blank">https://easychair.org/conferen<wbr>ces/?conf=acco17</a></span></p>

<h1>Workshop on InfoSymbiotics: DDDAS Dynamic Data Driven Applications Systems</h1>

<p class="MsoNormal" style="margin:6pt 0in 0.0001pt;text-align:justify"><b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Scope and
Topics: </span></b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Advances
in the DDDAS paradigm that combine real-world applications, contemporary
mathematical approaches, and real-time large scale measurements, that focus on
computing and software solutions that meet the emerging demands of big-data
solutions. Key applications requiring DDDAS high-end computing solutions
include distributed wireless platforms, collections of data for situation
awareness, and critical infrastructure systems.</span></p>

<p class="MsoNormal" style="margin:6pt 0in 0.0001pt;text-align:justify"><b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Important
Dates</span></b></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>Ÿ</span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> Paper submission: June 25,
2017<span>               </span></span><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>Ÿ</span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> Author notification: July 9, 2017<span>               </span></span><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>Ÿ</span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> Camera-ready version: July 21, 2017</span></p>

<p class="MsoNormal" style="margin:6pt 0in 0.0001pt;text-align:justify"><b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Submission
link:</span></b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> <a href="https://easychair.org/conferences/?conf=infosymbioticdddas17" target="_blank">https://easychair.org/conferen<wbr>ces/?conf=infosymbioticdddas17</a></span></p>

<h1>The 1st International Workshop on Autonomics and Cloud Security</h1>

<p class="MsoNormal" style="margin:6pt 0in 0.0001pt;text-align:justify"><b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Scope and
Topics </span></b></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpFirst" style="margin:0in 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">  </span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">The use of autonomic computing techniques to address cloud security</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Challenges in autonomics and cloud security and privacy</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Emerging issues in autonomic cloud security</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Autonomic identity and access management in cloud computing</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Autonomic cybersecurity monitoring and incident response in cloud
computing</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Autonomic auditing and accountability in cloud computing</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Autonomic approaches to usable security in cloud computing</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Autonomic security protocols in cloud computing</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Autonomic approaches to privacy in the cloud</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Autonomic approaches for securing data and communication in the cloud</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Secure autonomics-based cloud federation</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Self-adaptive security policies</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Self-configuration of cloud systems</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Scalable cybersecurity in the cloud</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Autonomic event recovery in the cloud</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Autonomic approaches to moving target defense in the cloud</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Autonomic approaches to cyber defense in the cloud</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Autonomic approaches to intrusion detection and prevention systems in
the cloud</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Techniques and approaches for building resilient cloud systems</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Cybersecurity in fog and edge computing</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Application of big data analytics to securing the cloud</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Autonomic approaches to trusted computing</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:0in 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Techniques and approaches for securing cloud-based autonomic systems</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Cybersecurity in the cloud for supporting IoT applications</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Security protocols in cloud-based autonomic systems</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Techniques and approaches for privacy preservation in cloud-based
autonomic systems</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Event detection and forensics in cloud-based autonomic systems</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Techniques and approaches for cloud-based autonomic systems resiliency</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Secure computing techniques for the cloud (securing data-in-processing
via Homomorphic Encryption, Secure Multi-Party Computation, and other secure
computing techniques).</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Techniques and approaches for anomaly detection in cloud-based autonomic
systems</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Scalable cybersecurity in cloud-based autonomic systems</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Ethical hacking and penetration testing in cloud-based autonomic systems</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpLast" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>§<span style="font:7pt "Times New Roman""> 
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Case studies in securing cloud-based systems</span></p>

<p class="MsoNormal" style="margin:6pt 0in 0.0001pt;text-align:justify"><b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Important
Dates</span></b></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>Ÿ</span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> Paper submission: June 30,
2017<span>               </span></span><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>Ÿ</span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> Author notification: July 11, 2017<span>               </span></span><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>Ÿ</span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> Camera-ready version: July 21, 2017</span></p>

<p class="MsoNormal" style="margin:6pt 0in 0.0001pt;text-align:justify"><b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Submission
link:</span></b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> <a href="https://easychair.org/conferences/?conf=acs17" target="_blank">https://easychair.org/conferen<wbr>ces/?conf=acs17</a></span></p>

<h1>International Workshop on Autonomic Systems for Big Data Analytics (ASBDA
2017)<span style="font-size:10pt;line-height:107%"></span></h1>

<p class="MsoNormal" style="margin:6pt 0in 0.0001pt;text-align:justify"><b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Scope and
Topics </span></b></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpFirst" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Autonomic provisioning of Big Data applications in Cloud, distributed
Cloud and edge computing environments</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Autonomic resource management and admission control for Big Data systems</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Autonomic data caching, movement and partitioning for Big Data systems</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Customizations and extensions of existing software infrastructures and
platforms to support autonomic Big data analytics</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Elastic techniques to cope with bursty workloads and varying resource
demands</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Runtime reconfiguration strategies to cope with highly dynamic execution
environments</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Self-adaptive scheduling and placement strategies for Big Data systems
on clusters, Clouds, and distributed Clouds</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpLast" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Applications and case studies of autonomic Big Data analytics in various
domains, including astrophysics, biology, climate change, healthcare, Internet
of Things, Smart Cities, and social networks</span></p>

<p class="MsoNormal" style="margin:6pt 0in 0.0001pt;text-align:justify"><b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Important
Dates</span></b></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>Ÿ</span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> Paper submission: June 9,
2017<span>               </span></span><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>Ÿ</span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> Author notification: July 7, 2017<span>               </span></span><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>Ÿ</span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> Camera-ready version: July 21, 2017</span></p>

<p class="MsoNormal" style="margin:6pt 0in 0.0001pt;text-align:justify"><b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Submission
link:</span></b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> <a href="https://easychair.org/conferences/?conf=asbda2017" target="_blank">https://easychair.org/conferen<wbr>ces/?conf=asbda2017</a></span></p>

<h1>1st Workshop on Autonomic Management of Large Scale Container-based Systems
(AMLCS)<span style="font-size:10pt;line-height:107%"></span></h1>

<p class="MsoNormal" style="margin:6pt 0in 0.0001pt;text-align:justify"><b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Scope and
Topics </span></b></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpFirst" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Performance modeling of container based systems</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Monitoring of container based systems</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Characterization of containerized workload</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Orchestration models, mechanisms and policies for large-scale
deployments</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Resource management at run time</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Autonomic management of large-scale container-based systems</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Management of container in cloud networking (eg NFV)</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpLast" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Use cases and challenges for the management / orchestration of
large-scale container-based systems - Cloud, HPC, Big Data, IoT applications
and Internet / Network Services</span></p>

<p class="MsoNormal" style="margin:6pt 0in 0.0001pt;text-align:justify"><b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Important
Dates</span></b></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>Ÿ</span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> Paper submission: June 25,
2017<span>               </span></span><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>Ÿ</span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> Author notification: July 9, 2017<span>               </span></span><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>Ÿ</span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> Camera-ready version: July 21, 2017</span></p>

<p class="MsoNormal" style="margin:6pt 0in 0.0001pt;text-align:justify"><b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Submission
link:</span></b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> <a href="https://easychair.org/conferences/?conf=amlcs17" target="_blank">https://easychair.org/conferen<wbr>ces/?conf=amlcs17</a></span></p>

<h1>The 5th International Workshop on Autonomic Management of high performance
Grid and Cloud Computing (AMGCC'17)<span style="font-size:10pt;line-height:107%"></span></h1>

<p class="MsoNormal" style="margin:6pt 0in 0.0001pt;text-align:justify"><b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Scope and
Topics </span></b></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpFirst" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Autonomic Workflow and Resource Management in Cloud and Grid</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Autonomous and Adaptive Management of Virtualized Resources</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">High Performance Grid and Cloud</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Security, Privacy, and Compliance Management for Hybrid Utility
Computing</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Performance and Usage Monitoring in Hybrid Infrastructures</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Autonomic Resource Discovery and Scheduling in Cloud and Grid</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Service-based Autonomic Management in Cloud and Grid</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Hybrid Cloud Resource Provisioning Orchestration</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Adaptive Resource Provisioning and Adjustment in Grid and Cloud</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Autonomics in High Performance Cloud Computing</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Cloud/Grid Workload Profiling and Autonomic Deployment Control</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Fault tolerance and Reliability in Hybrid Utility Computing</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Federation, Bridging, and Bursting of Grid and Cloud Resources</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpMiddle" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Data management and Analytics in Cloud</span></p>

<p class="m_-8997286927408551190m_6173574637825551414m_4960544486967627993m_7599627503035612507m_-4723668361322034428m_2204729299827043791gmail-MsoListParagraphCxSpLast" style="margin:6pt 0in 0.0001pt 0.25in;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       
</span></span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Cyber-infrastructure, System Architectures, Design and Deployment for
Grid, Cloud and Big Data</span></p>

<p class="MsoNormal" style="margin:6pt 0in 0.0001pt;text-align:justify"><b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Important
Dates</span></b></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>Ÿ</span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> Paper submission: June 12,
2017<span>               </span></span><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>Ÿ</span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> Author notification: July 10, 2017<span>               </span></span><span style="font-size:10pt;line-height:107%;font-family:Wingdings"><span>Ÿ</span></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> Camera-ready version: July 21, 2017</span></p>

<p class="MsoNormal" style="margin:6pt 0in 0.0001pt;text-align:justify"><b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">Submission
link:</span></b><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> <a href="https://easychair.org/conferences/?conf=amgcc17" target="_blank">https://easychair.org/conferen<wbr>ces/?conf=amgcc17</a></span></p>

<h1>Remote Attendance</h1>

<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">For any
person who wishes to participate but is unable due to the travel restrictions
imposed by the United States government, we will offer a “remote attendance”
registration at a discounted rate (to be announced later). Authors with
accepted papers will present their work remotely using videoconferencing.</span></p>

<h1>More information</h1>

<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify"><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif">For more
information, please visit </span><span lang="DE"><a href="http://autonomic-conference.org/iccac-2017/workshops.html" target="_blank"><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif" lang="EN-US">http://autonomic-conference.or<wbr>g/iccac-2017/workshops.html</span></a></span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif"> </span><span style="font-size:10pt;line-height:107%;font-family:"Times New Roman",serif" lang="DE"></span></p>

</div>
</div><br></div>
</div></div>
</div></div>
</div></div>
</div><br></div>
</div></div>