Second International Conference on Ambient Intelligence Developments (AmI.d'07)
Venue: Agora Einstein
|Event Date/Time: Sep 17, 2007||End Date/Time: Sep 19, 2007|
|Paper Submission Date: Apr 22, 2007|
However, we are still facing important challenges that need further investments in research and industrialization.
Current software engineering techniques and tools are not prepared to deal with the development of applications for what we could call AmI ecosystems, lacking a fixed architecture, controlled limits and even owners. The comfortable boundaries of static architectures and well-defined limits and owners are not existent in these AmI ecosystems.
The combination of heterogeneity, mobility, dynamism, sheer number of devices, along with the growing demands in aspects such as security and dependability (S&D), make the development of software for these ecosystems vastly more complex and increasingly difficult. It will be impossible, even for the most experienced and knowledgeable developers, to foresee all possible situations and interactions which may arise in AmI environments, where some necessary pieces of software, communication infrastructures and hardware devices will not be under their control.
Furthermore, sooner or later most essential and critical ICT systems will be parts of AmI ecosystems. Therefore, among the aforementioned challenges, security and dependability appear as key issues because, together with important benefits and advantages, these scenarios introduce new risks and dangers. they are difficult to control and enable novel attack vectors
Therefore, the focus of the second edition of AmID will be on software engineering and security engineering practices especially adapted to the new challenges introduced by AmI ecosystems. Original papers dealing with AmI issues are solicited related (but not limited to) the following topics of interest:
- Software engineering
- Security and Dependability
- Integrated security and software engineering
- Distributed architectures for AmI
- Interaction mechanisms
- Communication protocols
- Experiences and case studies
- Automated configuration and monitoring
- Context awareness
- Models and tools for simulation and validation
- Attack models for AmI systems