Abbrevation
PATTERNS
City
Nice
Country
France
Deadline Paper
Start Date
End Date
Abstract

<p>All topics and submission formats are open to both research and industry contributions&#046;</p> <p><strong>Basics on patterns </strong><br>Design patterns<br>Static and dynamic patterns<br>Pattern identification and extraction<br>Validate patterns<br>Patterns’ accuracy<br>Incomplete patterns<br>Patterns and noise </p> <p><strong>Patterns at work</strong><br>Pattern logics and algebras<br>Pattern recognition<br>Pattern matching<br>Pattern languages<br>Patterns languages/models pitfalls<br>Pattern specification/modeling<br>Pattern validation<br>Pattern composition<br>Pattern reuse<br>Testing in pattern&#8211;based designed systems<br>Manageability and maintenance of pattern&#8211;based designed systems<br>Architecture, architectural design and the built environment</p> <p><strong>Ubiquity patterns</strong><br>User mobility patterns<br>Social networking patterns<br>Content dependency patterns<br>Content accessing patterns<br>Behavioral autonomy patterns<br>Prediction patterns /behavioral, structure, environment/<br>Patterns of discovery </p> <p><strong>Software patterns </strong><br>Software design patterns<br>Software reuse patterns<br>Software quality patterns<br>Software testing patterns<br>Software performance, security, and safety patterns<br>Software management patterns<br>Patterns for evolving software elements</p> <p><strong>Security patterns</strong><br>Security patterns<br>Patterns of trust<br>Attack patterns<br>Authorization patterns<br>Failed access patterns<br>Intrusion attempt patterns<br>Local malware patterns<br>Distributed malware patterns</p> <p><strong>System management patterns</strong><br>Management and control patterns<br>Monitoring patterns<br>Correlation patterns<br>Event patterns<br>Visualization patterns</p> <p><strong>Discovery and decision patterns</strong><br>Search patterns<br>Data mining for patterns<br>Query patterns<br>Knowledge patterns<br>Behavioral patterns<br>Reasoning patterns<br>Decision patterns<br>Patterns in WWW<br>Predictive patterns<br>Mobility patterns<br>Tracking patterns </p> <p><strong>Communications patterns</strong><br>Communication patterns<br>Propagation patterns<br>Traffic/routing patterns<br>P2P and P4P patterns<br>Configuration change patterns<br>System abnormal behavior patterns</p> <p><strong>Domain&#8211;oriented patterns </strong><br>Forensic patterns<br>Genomic patterns<br>Image patterns<br>Voice patterns<br>Speech patterns<br>Hand writing patterns<br>Text&#8211;embedded sentiment patterns<br>Emotion recognition patterns<br>Site access patterns<br>Service orchestration<br>Keyboard typing patterns<br>Financial/stock patterns<br>Shopping patterns<br>Dietary patterns<br>Global warming patterns<br>Job market patterns<br>Stock movement patterns<br>Investing patterns</p> <p><strong>Antipatterns and lessons learned </strong><br>Architectural<br>Design<br>Development<br>People and project management<br>Social</p>