St.Petersburg, Russia
November 14–15, 2019

For Speakers and Authors

Notifications regarding all proposals were sent to the authors on October 1st. If you did not receive it please check it in the system contact us on contact@secrus.org.

Main conference days: 14-15 of November (Thursday and Friday)
Additional workshops: 16th of November (Saturday).
Venue: St.Petersburg, Park Inn Pulkovskaya.

Procedure and main steps

Talks, workshops and scientific papers submissions are welcome. Papers are accepted only along with the talk which delivered in person.

  1. Submit your proposal by 20th of August 2019.
  2. Discuss your proposal with the curator from the program committee, correct the proposal if needed.
  3. The Program committee will review all proposals and send notification to the authors by October, 1st. You may be asked to correct your submission / article, undertake the talk audition before the final decision is made.
  4. If accepted, please confirm your participation by 8th of October prepare your talk / paper with the curator. The rehearsal is highly recommended if you deliver public talks rarely (1-2 times a year).
  5. The final versions of papers and presentation slides should be submitted to the submission system by November, 10.

Time allocated for the talk: 15 or 30 minutes (allocated by program committee with your curator), and for master-class: 1 – 8 hrs.

Language: English or Russian. The slides can be in English or in Russian. The preferred language for papers is English.

Speaker Slides

It is recommended to start preparing the slides after your talk is accepted to the conference program.

You can either use the conference slides template (pptx/odp) or add conference logo to your own template (4:3 aspect ration is preferrable).

Main logo

.jpg .png .eps

For dark background

.jpg .png .eps

Monochrome version

.jpg .png .eps

Scope

The submissions related to software development are welcome. Some of the topics are listed below.

  • Programming Technologies and Tools
  • DevOps
  • AI; Intelligent Apps and Analytics ; Intelligent Things

    Over the next few years every app, application and service will incorporate AI at some level. AI will run unobtrusively in the background of many familiar application categories while giving rise to entirely new ones. AI has become the next major battleground in a wide range of software and service markets, including aspects of ERP. “Challenge your packaged software and service providers to outline how they’ll be using AI to add business value in new versions in the form of advanced analytics, intelligent processes and advanced user experiences,” notes Cearley.

    Intelligent apps also create a new intelligent intermediary layer between people and systems and have the potential to transform the nature of work and the structure of the workplace, as seen in virtual customer assistants and enterprise advisors and assistants.)

    Intelligent things use AI and machine learning to interact in a more intelligent way with people and surroundings. Some intelligent things wouldn’t exist without AI, but others are existing things (i.e., a camera) that AI makes intelligent (i.e., a smart camera.) These things operate semiautonomously or autonomously in an unsupervised environment for a set amount of time to complete a particular task. Examples include a self-directing vacuum or autonomous farming vehicle. As the technology develops, AI and machine learning will increasingly appear in a variety of objects ranging from smart healthcare equipment to autonomous harvesting robots for farms. As intelligent things proliferate, expect a shift from stand-alone intelligent things to a swarm of collaborative intelligent things. In this model, multiple devices will work together, either independently or with human input. The leading edge of this area is being used by the military, which is studying the use of drone swarms to attack or defend military targets. It’s evident in the consumer world in the opening example showcased at CES, the consumer electronics event.

  • IoT; Digital Twins

    A digital twin is a digital representation of a real-world entity or system. In the context of IoT, digital twins are linked to real-world objects and offer information on the state of the counterparts, respond to changes, improve operations and add value. With an estimated 21 billion connected sensors and endpoints by 2020, digital twins will exist for billions of things in the near future. Potentially billions of dollars of savings in maintenance repair and operation (MRO) and optimized IoT asset performance are on the table, says Cearley. In the short term, digital twins offer help with asset management, but will eventually offer value in operational efficiency and insights into how products are used and how they can be improved. Outside of the IoT, there is a growing potential to link digital twins to entities that are not simply “things.” “Over time, digital representations of virtually every aspect of our world will be connected dynamically with their real-world counterparts and with one another and infused with AI-based capabilities to enable advanced simulation, operation and analysis,” says Cearley. “City planners, digital marketers, healthcare professionals and industrial planners will all benefit from this long-term shift to the integrated digital twin world.” For example, future models of humans could offer biometric and medical data, and digital twins for entire cities will allow for advanced simulations.

  • Data Science; Big Data
  • Blockchain ; Event-Driven

    Blockchain is a shared, distributed, decentralized and tokenized ledger that removes business friction by being independent of individual applications or participants. It allows untrusted parties to exchange commercial transactions. The technology holds the promise to change industries, and although the conversation often surrounds financial opportunities, blockchain has many potential applications in government, healthcare, content distribution, supply chain and more. However, many blockchain technologies are immature and unproven, and are largely unregulated.

    A practical approach to blockchain demands a clear understanding of the business opportunity, the capabilities and limitations of blockchain, a trust architecture and the necessary implementation skills. Before embarking on a distributed-ledger project, ensure your team has the cryptographic skills to understand what is and isn’t possible. Identify the integration points with existing infrastructures, and monitor the platform evolution and maturation. Use extreme caution when interacting with vendors, and ensure you are clearly identifying how the term “blockchain” is being used.

    Digital businesses rely on the ability to sense and be ready to exploit new digital business moments. Business events reflect the discovery of notable states or state changes, such as completion of a purchase order. Some business events or combinations of events constitute business moments — a detected situation that calls for some specific business action. The most consequential business moments are those that have implications for multiple parties, such as separate applications, lines of business or partners.

    With the advent of AI, the IoT, and other technologies, business events can be detected more quickly and analyzed in greater detail. Enterprises should embrace “event thinking” as part of a digital business strategy. By 2020, event-sourced, real-time situational awareness will be a required characteristic for 80% of digital business solutions, and 80% of new business ecosystems will require support for event processing.

  • Cloud; Cloud to the Edge

    Edge computing describes a computing topology in which information processing and content collection and delivery are placed closer to the sources of this information. Connectivity and latency challenges, bandwidth constraints and greater functionality embedded at the edge favors distributed models. Enterprises should begin using edge design patterns in their infrastructure architectures — particularly for those with significant IoT elements. A good starting point could be using colocation and edgespecific networking capabilities.

    While it’s common to assume that cloud and edge computing are competing approaches, it’s a fundamental misunderstanding of the concepts. Edge computing speaks to a computing topology that places content, computing and processing closer to the user/things or “edge” of the networking. Cloud is a system where technology services are delivered using internet technologies, but it does not dictate centralized or decentralized service delivering services. When implemented together, cloud is used to create the serviceoriented model and edge computing offers a delivery style that allows for executions of disconnected aspects of cloud service.)

  • High-Loaded Systems
  • Embedded Systems; Hardware and Low-level Programming.
  • Open Source Technologies & Community
  • Voice Interfaces; Natural Languages Text Processing; Conversational Platforms

    Conversational platforms will drive a paradigm shift in which the burden of translating intent shifts from user to computer. These systems are capable of simple answers (How’s the weather?) or more complicated interactions (book a reservation at the Italian restaurant on Parker Ave.) These platforms will continue to evolve to even more complex actions, such as collecting oral testimony from crime witnesses and acting on that information by creating a sketch of the suspect’s face based on the testimony. The challenge that conversational platforms face is that users must communicate in a very structured way, and this is often a frustrating experience. A primary differentiator among conversational platforms will be the robustness of their conversational models and the API and event models used to access, invoke and orchestrate third-party services to deliver complex outcomes).

  • Security; Continuous Adaptive Risk and Trust

    Digital business creates a complex, evolving security environment. The use of increasingly sophisticated tools increases the threat potential. Continuous adaptive risk and trust assessment (CARTA) allows for real-time, risk and trust-based decision making with adaptive responses to security-enable digital business. Traditional security techniques using ownership and control rather than trust will not work in the digital world. Infrastructure and perimeter protection won’t ensure accurate detection and can’t protect against behind-the-perimeter insider attacks. This requires embracing people-centric security and empowering developers to take responsibility for security measures. Integrating security into your DevOps efforts to deliver a continuous “DevSecOps” process and exploring deception technologies (e.g., adaptive honeypots) to catch bad guys that have penetrated your network are two of the new techniques that should be explored to make CARTA a reality.

  • VR, AR, Immersive Experience

    Augmented reality (AR), virtual reality (VR) and mixed reality are changing the way that people perceive and interact with the digital world. Combined with conversational platforms, a fundamental shift in the user experience to an invisible and immersive experience will emerge. Application vendors, system software vendors and development platform vendors will all compete to deliver this model.

    Over the next five years the focus will be on mixed reality, which is emerging as the immersive experience of choice, where the user interacts with digital and real-world objects while maintaining a presence in the physical world. Mixed reality exists along a spectrum and includes head-mounted displays (HMD) for AR or VR, as well as smartphone- and tablet-based AR. Given the ubiquity of mobile devices, Apple’s release of ARkit and iPhone X, Google’s Tango and ARCore, and the availability of cross-platform AR software development kits such as Wikitude, we expect the battles for smartphonebased AR and MR to heat up in 2018.)

  • Software Testing and Verification
  • System Analysis and Requirements Engineering
  • Project and Product Management (Classical & Agile)
  • Knowledge Management
  • Software Architecture
  • Continuous Professional Development: From Classical to Corporate University
  • Business and Entrepreneurship
  • Human Computer Interaction; User Experience, Usability

If you can’t find the topic in the list – submit it under Other.
The list of topics contains Gartner’s Top 10 Strategic Technology Trends.

How to fill in the submission form

  1. Topic and short description in English (and in Russian, if possible). During the review process the topic and short description will be published on the Proposals section of the conference website.The description must include 1-3 sentences covering the main point of the talk.

    Examples

    Example 1: “If participants have problems with designing interfaces, in my report they will be able to learn about some ways of using DSL for the modification of automatically generated forms. This approach is not covered in the current literature, but our successful implementation shows that it works.”

    Example 2: “I will share my experience in communication with difficult customers based on seven years of work and over 20 successful projects, which will be presented in the form of case studies with analysis/conclusion. I think that participants will be able to apply this knowledge in their daily work, since some of these situations have occurred more than once with different clients.”

  2. Extended abstract (1800 characters or more) in English or Russian. During the review process the publication of an abstract on the conference website is optional (at the author’s discretion).

    The content of the extended abstract should fully reflect the essence of the final report. It should clearly state not only the subject area of the report, but also the specific issues which will be covered, as well as the scientific, technological or innovative solutions offered by authors.

    Please do not send lists of slides, promotional materials, links to forums, or previously-published reports or articles in place of the extended abstract.Many authors describe a problem and its importance and promise to reveal the solution in their report. This is not enough: the solution itself should be stated and justified, whether it is an original idea, a new combination of ideas, or a successful practice. The relevance of the problem should be shown, with references to literature or other open sources (especially for articles).

    For workshop proposals please also state the following: the workshop duration, target audience, program. During the review process this information will not be published on the conference website.

  3. Submitting the paper
    If you wish to submit your research work as a scientific paper, please attach the full article (5-10 pages) formatted in accordance with the standard ACM requirements for scientific papers (View ACM templates). During the review process the article will not be published on the conference website.
  4. Author(s) photo and a short bio of 3-5 sentences. Authors are encouraged to share links to their published works, public presentations, and social-networking profiles. During the review process the publication of the bio and photo on the conference website is optional (at the author’s discretion).

In addition, please specify the following:

  1. The type of your talk: a presentation of scientific research results that can be used; a presentation of ideas for action by analogy; an informational overview; a technology presentation; new technology training; new tool training; a case study, including the experience of using technology.
  2. The subject of your talk: one or more areas from the conference Scope (above).

The following materials will not be accepted:

  • Promotional presentations and articles (designed to promote a company, product or service)
  • Presentations previously delivered at other conferences
  • Papers previously published or accepted by another conference or journal.

Conference organisers do not cover your travelling costs and hotel reservations, but there is a discount for staying at the hotel for all SECR speakers and participants.

Proceed to submission system

Why SECR is special

  • It is a multi-disciplinary event that allows participants to overview a wide range of software industry topics and trends, and deepen their understanding of the areas of interest, which may be adjacent to their core specialisation.
  • The proposals are reviewed and chosen by experienced program committee. The speakers and authors receive individual assistance in preparing their proposals, papers, slides and talks.
  • The conference audience consist of top specialists of IT industry and science, visionaries.
  • Status In-Cooperation with ACM. The research papers are planned to be published in ACM DL. The best papers are praised with Bertrand Meyer award.
  • SECR is one of the oldest software engineering conferences in Russia, recognised by the world community.

Proceed to submission system

Conference organisers do not cover your travelling costs and hotel reservations, but there is a discount for staying at the hotel for all SECR speakers and participants

If you have questions, please call +7 499 703 1655, +7 812 336 93 44 or send a message to contact@secrus.org.

Contacts

Nick Puntikov, Chair of SECR 2019
Julia Kryuchkova, Secretary of SECR 2019
Saint-Petersburg: +7 812 336 93 44
Moscow: +7 499 703 16 55

contact@secrus.org