From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.1.3 (2006-06-01) on yquem.inria.fr X-Spam-Level: ** X-Spam-Status: No, score=2.1 required=5.0 tests=ADVANCE_FEE_1,AWL, MSGID_MULTIPLE_AT,SPF_SOFTFAIL autolearn=disabled version=3.1.3 X-Original-To: caml-list@yquem.inria.fr Delivered-To: caml-list@yquem.inria.fr Received: from mail3-relais-sop.national.inria.fr (mail3-relais-sop.national.inria.fr [192.134.164.104]) by yquem.inria.fr (Postfix) with ESMTP id 78580BBAF for ; Fri, 5 Jun 2009 15:11:20 +0200 (CEST) X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AqoEAIC2KEqT+goE/2dsb2JhbACXHqkxkDAFhAqITw X-IronPort-AV: E=Sophos;i="4.41,311,1241388000"; d="scan'208";a="28907341" Received: from ns4.ensta.fr ([147.250.10.4]) by mail3-smtp-sop.national.inria.fr with ESMTP; 05 Jun 2009 15:11:19 +0200 Received: from localhost (localhost [127.0.0.1]) by ns4.ensta.fr (Postfix) with ESMTP id C7D3FBDD15; Fri, 5 Jun 2009 15:10:14 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ensta.fr; h= content-language:x-mailer:content-transfer-encoding:content-type :mime-version:message-id:date:subject:from:received:received :x-virus-scanned:received:received:received:x-virus-scanned; s= ensta.paris; t=1244207414; bh=A9B61lnTPE2YFPi0hs0rNMwapytONg3Ltc Kv1g4tJts=; b=Aef51JHOLerrxoM3yq5XZ3dlUmIcNUSj5NWvxx3hGptYGb+qlx UZsqqhLQ1EdlLQQqOKbIErUG9I51x8q94D7RKSXK0v5LCuO/ACSBfoTSwzECpTRX l8aJvNZ4BRxVxkCcfrTq5nk81MuhU4PZFElVTAs9EUUDoldQQSwQXkYhc= X-Virus-Scanned: amavisd-new at ns4.ensta.fr Received: from ns4.ensta.fr ([127.0.0.1]) by localhost (ns4.ensta.fr [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ut53V55Nq6r9; Fri, 5 Jun 2009 15:10:14 +0200 (CEST) Received: from zomail.ensta.fr (zomail.ensta.fr [147.250.1.22]) by ns4.ensta.fr (Postfix) with ESMTP id B5630BDCF1; Fri, 5 Jun 2009 15:10:10 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by zomail.ensta.fr (Postfix) with ESMTP id DCD89C01B; Fri, 5 Jun 2009 15:11:14 +0200 (CEST) X-Virus-Scanned: amavisd-new at Received: from zomail.ensta.fr ([127.0.0.1]) by localhost (zomail.ensta.fr [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a+9K1oVjcItr; Fri, 5 Jun 2009 15:11:14 +0200 (CEST) Received: from anasys1 (anasys1.ensta.fr [147.250.35.104]) by zomail.ensta.fr (Postfix) with ESMTP id 9F7DB346EB; Fri, 5 Jun 2009 15:11:13 +0200 (CEST) From: "Bruno Monsuez" To: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , Subject: VECoS 2009 - Call for Participation Date: Fri, 5 Jun 2009 15:09:31 +0200 Message-ID: <028901c9e5de$ddd9aae0$998d00a0$@monsuez@ensta.fr> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable X-Mailer: Microsoft Office Outlook 12.0 Thread-Index: Acnl3tyVFBycNwOCQF2gGHkOAlyUYg== Content-Language: fr X-Spam: no; 0.00; ensta:01 ensta:01 laas:01 orthogonal:01 model:01 assaf:01 kfoury:01 normalized:01 synthesis:01 model:01 observers:01 2009:98 morroco:98 2009:98 morroco:98 [Apologies if you receive multiple copies of this Call for = Participation] =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D CALL FOR PARTICIPATION 3rd International Workshop on Verification and Evaluation of Computer = and Communication Systems http://www.vecos-world.org Rabat, Morroco July, 2-3, 2009=20 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D IMPORTANT Registration Deadline: Friday, Juni 26th, 2009 Additional informations on=20 http://vecos.ensta.fr/2009/registration.html =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D The VECoS'2009 Workshop will be held in the city of Rabat in Morroco.=20 It will be hosted by the laboratory of mathematics, computer science &=20 Applications (MIA) at the Facult=E9 des sciences Mohammed V = University-Agdal.=20 The International Workshop on Verification and Evaluation of Computer=20 and Communication Systems (VECoS) was created by an Euro-Maghrebian=20 network of researchers in computer science. The first edition tooks=20 place in Algiers 5-6 May 2007 (VECoS'2007), the second edition in=20 Leeds 2-3 July 2008 ( VECoS'2008). The aim of VECoS workshop is=20 to bring together researchers and practitioners, in the areas of=20 Verification, Control, Performance, Quality of service, Dependability=20 evaluation and Assessment, to discuss the state of the art for solving=20 the challenges facing us today in various modern computer and=20 communication systems in which functional and extra functional = properties=20 are strongly interrelated. =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D SATELLITE EVENTS Wednesday, July 1rst, 2009 Tutorial on "Some Important Aspects of Real-Time Systems" =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D PROGRAMME Thursday, July 2nd, 2009 Invited speaker 1:=20 Guy Juanole LAAS Toulouse, France Talk: Networked Control Systems =20 Session 1: Wireless networks -. Optimal Sensors Placement for Failures Detection=20 and Isolation Sabrina ABID, Hafid HAFFAF -. Confidentiality in the UMTS Radio Access Network,=20 Simulation approach under OPNET Ghizlane ORHANOU, Said EL HAJJI -. Discrete Events Simulator for wireless sensor=20 networks Fouzi SEMCHEDINE, Louiza BOUALLOUCHE, Sofiane MOAD,=20 Rafik MAKHLOUFI, Djamil AISSANI -. Orthogonal and Non-orthogonal Cooperative protocols in WLANs=20 Jun CHEN, Karim DJOUANI, Kamel BARKAOUI=20 Invited speaker 2:=20 Joel Ouaknine Oxford University, United Kingdom Talk: Verifying Probabilistic Programs: Three Easy Pieces =20 Session 2: Timed Systems & Model Checking =09 -. Specification and Verification of Real-Time Systems using the=20 POLA tool Florent PERES, Pierre-Emmanuel HLADIK, Francois VERNADAT=20 -. Distributed CTL Model-Checking and counterexample search Cherif BOUKALA, Laure PETRUCCI=20 -. Timed SystemC Waiting-State Automata Harrath NESRINE, Bruno MONSUEZ=20 -. On combining the ready sets with the covering steps methods Hanifa BOUCHENEB, Kamel BARKAOUI =20 Friday, July 3rd, July 2009=20 Invited speaker 3: Assaf Kfoury, Boston University, USA Talk: Lightweight Formal Methods for the Development of High-Assurance=20 Networking Systems =20 =09 Session 3: Control & Dependability =09 -. Improving Testbench Evaluation using Normalized Formal Properties Martin OBERKOENIG, Martin SCHICKEL, Hans EVEKING=20 -. Dependability Evaluation of Complex Embedded Systems and Microsystems Olaf MALASSE, et al.=20 -. Controller Synthesis by Petri Nets Modelling Hassane ALLA, Abbas DIDEBAN =20 Invited speaker 4: Mario Bravetti, Universita di Bologna, Italy Talk: Foundational aspects of contract compliance and=20 choreography conformance =20 Session 4: Model & System Design =09 -. Validating time-constrained systems using UML Statecharts=20 Patterns and Timed Automata Observers Ahmed MEKKI, Mohamed GHAZEL, Armand TOGUYENI=20 -. A generic formal model for fission of modalities in output=20 multi-modal interactive systems Yamine AIT AMEUR, Linda MOHAND OUSSAID Mohamed AHMED NACER =20