Call For Speakers and Papers|Приглашение докладчиков

[lang_ru]

Приём заявок на доклады завершён

Посмотреть результаты рецензирования.

Если у вас возникли вопросы, звоните +7 499 703 1655, +7 812 336 9344 или пишите на contact@secrus.org.

О конференции

Mеждународная научно-практическая конференция «Разработка ПО/SECR» пройдёт в октябре 2018 в Москве. Конференция проводится 14-й год и является одним из важнейших событий в индустрии разработки программного обеспечения России.

Конференция объединяет исследователей и практиков программной инженерии. Многопрофильная программа позволяет специалистам, руководителям, представителям науки охватить широкий спектр происходящего в индустрии разработки ПО, уловить тенденции и углубить понимание, в том числе в смежных с основной специализацией областях.

Научные статьи, прошедшие рецензирование и конкурсный отбор, входят в сборник конференции и публикуется в ACM DL. Лучшие работы награждаются премией Бертрана Мейера.

Процедура приёма заявок

на доклады, мастер-классы, научные статьи (статьи принимаются только с докладом).

  1. Подаёте заявку не позднее 16 июля 2018.
  2. Обсуждаете детали с куратором из программного комитета, дополняете заявку.
  3. Программный комитет выбирает заявки путём голосования до 31 августа. Вас могут попросить доработать заявку, статью, пройти прослушивание для вынесения окончательного решения.
  4. Готовите с куратором доклад. Прослушивание доклада куратором настоятельно рекомендовано для тех, кто выступает впервые или 1-2 раза в год.

Время на доклад: от 15 или 30 минут, на мастер-класс: от 1 до 8 часов.
Язык выступления: русский или английский. Слайды и статьи могут быть как на русском, так и на английском. Для статей английский язык предпочтителен.

Выбор темы

Принимаются доклады на темы, относящиеся к разработке ПО. Вот некоторые из них:

  • Programming Technologies and Tools
  • DevOps
  • AI; Intelligent Apps and Analytics ; Intelligent Things

    Over the next few years every app, application and service will incorporate AI at some level. AI will run unobtrusively in the background of many familiar application categories while giving rise to entirely new ones. AI has become the next major battleground in a wide range of software and service markets, including aspects of ERP. “Challenge your packaged software and service providers to outline how they’ll be using AI to add business value in new versions in the form of advanced analytics, intelligent processes and advanced user experiences,” notes Cearley.

    Intelligent Apps also create a new intelligent intermediary layer between people and systems and have the potential to transform the nature of work and the structure of the workplace, as seen in virtual customer assistants and enterprise advisors and assistants.)

    Intelligent things use AI and machine learning to interact in a more intelligent way with people and surroundings. Some intelligent things wouldn’t exist without AI, but others are existing things (i.e., a camera) that AI makes intelligent (i.e., a smart camera.) These things operate semiautonomously or autonomously in an unsupervised environment for a set amount of time to complete a particular task. Examples include a self-directing vacuum or autonomous farming vehicle. As the technology develops, AI and machine learning will increasingly appear in a variety of objects ranging from smart healthcare equipment to autonomous harvesting robots for farms. As intelligent things proliferate, expect a shift from stand-alone intelligent things to a swarm of collaborative intelligent things. In this model, multiple devices will work together, either independently or with human input. The leading edge of this area is being used by the military, which is studying the use of drone swarms to attack or defend military targets. It’s evident in the consumer world in the opening example showcased at CES, the consumer electronics event.

  • IoT; Digital Twins

    A Digital Twin is a digital representation of a real-world entity or system. In the context of IoT, digital twins are linked to real-world objects and offer information on the state of the counterparts, respond to changes, improve operations and add value. With an estimated 21 billion connected sensors and endpoints by 2020, digital twins will exist for billions of things in the near future. Potentially billions of dollars of savings in maintenance repair and operation (MRO) and optimized IoT asset performance are on the table, says Cearley. In the short term, digital twins offer help with asset management, but will eventually offer value in operational efficiency and insights into how products are used and how they can be improved. Outside of the IoT, there is a growing potential to link digital twins to entities that are not simply “things.” “Over time, digital representations of virtually every aspect of our world will be connected dynamically with their real-world counterparts and with one another and infused with AI-based capabilities to enable advanced simulation, operation and analysis,” says Cearley. “City planners, digital marketers, healthcare professionals and industrial planners will all benefit from this long-term shift to the integrated digital twin world.” For example, future models of humans could offer biometric and medical data, and digital twins for entire cities will allow for advanced simulations.

  • Data Science; Big Data
  • Blockchain ; Event-Driven

    Blockchain is a shared, distributed, decentralized and tokenized ledger that removes business friction by being independent of individual applications or participants. It allows untrusted parties to exchange commercial transactions. The technology holds the promise to change industries, and although the conversation often surrounds financial opportunities, blockchain has many potential applications in government, healthcare, content distribution, supply chain and more. However, many blockchain technologies are immature and unproven, and are largely unregulated.

    A practical approach to blockchain demands a clear understanding of the business opportunity, the capabilities and limitations of blockchain, a trust architecture and the necessary implementation skills. Before embarking on a distributed-ledger project, ensure your team has the cryptographic skills to understand what is and isn’t possible. Identify the integration points with existing infrastructures, and monitor the platform evolution and maturation. Use extreme caution when interacting with vendors, and ensure you are clearly identifying how the term “blockchain” is being used.

    Digital businesses rely on the ability to sense and be ready to exploit new digital business moments. Business events reflect the discovery of notable states or state changes, such as completion of a purchase order. Some business events or combinations of events constitute business moments — a detected situation that calls for some specific business action. The most consequential business moments are those that have implications for multiple parties, such as separate applications, lines of business or partners.

    With the advent of AI, the IoT, and other technologies, business events can be detected more quickly and analyzed in greater detail. Enterprises should embrace “event thinking” as part of a digital business strategy. By 2020, event-sourced, real-time situational awareness will be a required characteristic for 80% of digital business solutions, and 80% of new business ecosystems will require support for event processing.

  • Cloud; Cloud to the Edge

    Edge computing describes a computing topology in which information processing and content collection and delivery are placed closer to the sources of this information. Connectivity and latency challenges, bandwidth constraints and greater functionality embedded at the edge favors distributed models. Enterprises should begin using edge design patterns in their infrastructure architectures — particularly for those with significant IoT elements. A good starting point could be using colocation and edgespecific networking capabilities.

    While it’s common to assume that cloud and edge computing are competing approaches, it’s a fundamental misunderstanding of the concepts. Edge computing speaks to a computing topology that places content, computing and processing closer to the user/things or “edge” of the networking. Cloud is a system where technology services are delivered using internet technologies, but it does not dictate centralized or decentralized service delivering services. When implemented together, cloud is used to create the serviceoriented model and edge computing offers a delivery style that allows for executions of disconnected aspects of cloud service.)

  • High-Loaded Systems
  • Embedded Systems; Hardware and Low-level Programming.
  • Open Source Technologies & Community
  • Voice Interfaces; Natural Languages Text Processing; Conversational Platforms

    Conversational platforms will drive a paradigm shift in which the burden of translating intent shifts from user to computer. These systems are capable of simple answers (How’s the weather?) or more complicated interactions (book a reservation at the Italian restaurant on Parker Ave.) These platforms will continue to evolve to even more complex actions, such as collecting oral testimony from crime witnesses and acting on that information by creating a sketch of the suspect’s face based on the testimony. The challenge that conversational platforms face is that users must communicate in a very structured way, and this is often a frustrating experience. A primary differentiator among conversational platforms will be the robustness of their conversational models and the API and event models used to access, invoke and orchestrate third-party services to deliver complex outcomes).

  • Security; Continuous Adaptive Risk and Trust

    Digital business creates a complex, evolving security environment. The use of increasingly sophisticated tools increases the threat potential. Continuous adaptive risk and trust assessment (CARTA) allows for real-time, risk and trust-based decision making with adaptive responses to security-enable digital business. Traditional security techniques using ownership and control rather than trust will not work in the digital world. Infrastructure and perimeter protection won’t ensure accurate detection and can’t protect against behind-the-perimeter insider attacks. This requires embracing people-centric security and empowering developers to take responsibility for security measures. Integrating security into your DevOps efforts to deliver a continuous “DevSecOps” process and exploring deception technologies (e.g., adaptive honeypots) to catch bad guys that have penetrated your network are two of the new techniques that should be explored to make CARTA a reality.

  • VR, AR, Immersive Experience

    Augmented reality (AR), virtual reality (VR) and mixed reality are changing the way that people perceive and interact with the digital world. Combined with conversational platforms, a fundamental shift in the user experience to an invisible and immersive experience will emerge. Application vendors, system software vendors and development platform vendors will all compete to deliver this model.

    Over the next five years the focus will be on mixed reality, which is emerging as the immersive experience of choice, where the user interacts with digital and real-world objects while maintaining a presence in the physical world. Mixed reality exists along a spectrum and includes head-mounted displays (HMD) for AR or VR, as well as smartphone- and tablet-based AR. Given the ubiquity of mobile devices, Apple’s release of ARkit and iPhone X, Google’s Tango and ARCore, and the availability of cross-platform AR software development kits such as Wikitude, we expect the battles for smartphonebased AR and MR to heat up in 2018.)

  • Software Testing and Verification
  • System Analysis and Requirements Engineering
  • Project and Product Management (Classical & Agile)
  • Software Architecture
  • Continuous Professional Development: From Classical to Corporate University
  • Business and Entrepreneurship
  • Human Computer Interaction; User Experience, Usability

Если в списке нет вашей темы, но она относится к разработке ПО и может быть интересна аудитории, добавьте её в графу “Other” („Другое“).
В список вошли тренды на 2018 г. по Гартнеру.

Как написать тезисы

Тема и краткое описание на русском и английском языках публикуются в разделе «Заявки» на сайте.
Краткое описание обычно укладывается в 1-3 предложение. Его цель раскрыть суть доклада: не стоит представлять вопросы, затронутые в ходе выступления, нужно обозначить ответы на них.

Примеры краткого описания

  1. Пример 1. «Если у слушателей проблемы с разработкой интерфейсов, они смогут почерпнуть в моем докладе идеи для использования DSL для модификации автоматически созданных форм. Этот подход не встречается в литературе и других открытых источниках, а успешная реализация у нас показывает его работоспособность.»
  2. Пример 2. «Я представлю свой опыт по организации взаимодействия со сложными заказчиками, основанный на 7-летней работе и более 20 успешных проектах в форме кейсов с обобщениями. Думаю, что слушатели смогут воспользоваться этим опытом в своей повседневной работе, так как многие кейсы возникали неоднократно и с разными заказчиками.»

Расширенный абстракт представляет собой текст на русском или английском языках объемом не менее 1800 знаков. Статья при её наличии заменяет собою расширенный абстракт. Публикация расширенно абстракте на публичном сайте остается на усмотрение автора.

  1. Содержание расширенного абстракта должно в полной мере отражать суть будущего доклада: необходимо представить не только предметную область доклада, но и какие конкретно вопросы будут раскрываться в выступлении, какие решения (научные, технологические, инновационные или другие) предлагаются авторами.
    Не следует в качестве расширенного абстракта присылать списки слайдов, планы докладов, рекламные материалы, ссылки на форумы или ранее написанные доклады или статьи.
  2. Многие авторы присылают развернутое описание проблемы и обоснование её важности, а в докладе обещают раскрыть решение. Этого не достаточно: само решение должно быть изложено и обосновано, будь то оригинальная идея, новая комбинация идей или успешная практика. Желательно, а для статей — обязательно, соотнести предлагаемое решение с аналогами, доступными в открытых источниках.
  3. Если автор позиционирует свою статью как научную работу, то вместо расширенного абстракта следует прислать полноценную статью объемом от 5 до 10-ти страниц в соответствии со стандартом оформления научных статей по шаблону ACM (используйте шаблон sigconf).
  4. В заявке на проведение мастер-класса необходимо указать также его примерную длительность.

Как написать статью

См. памятку авторам статей.

На конференцию не принимаются

  • Доклады рекламного характера
  • Доклады, ранее звучавшие на конференциях
  • Статьи, ранее опубликованные или находящиеся на рассмотрении программными / редакционными комитетами других конференций / рецензируемых журналов.

Преимущества для авторов

  • Авторам принятых докладов предоставляется право бесплатного участия в конференции (1 бесплатный участник на доклад)
  • За лучший исследовательский доклад в области программной инженерии выплачивается премия Бертрана Мейера в размере 40 000 рублей
  • Публикация научных статей в электронной библиотеке ACM (как правило, сборник индексируется Scopus и Web Of Science)
  • Видеозаписи, слайды, абстракты докладов, а также био автора публикуются на сайте конференции.

Организаторы конференции не выплачивают авторам докладов гонорары и не компенсируют транспортные расходы.

Контакты

Николай Пунтиков, председатель SECR 2018
Юлия Крючкова, секретарь SECR 2018
Email: contact@secrus.org
Москва: +7 499 703 16 55
Санкт-Петербург: +7 812 336 93 44

[/lang_ru][lang_en]

Proposal submission is over

Here you can find the results of the proposals’ review.

If you have questions, please call +7 499 703 1655, +7 812 336 93 44 or send a message to contact@secrus.org.

About the conference

Software Engineering Conference Russia (SECR) 2018 is the premier software engineering conference in Russia. In 2018 the conference will take place in Moscow.

The main conference dates are 12-13 of October (Friday and Saturday), and on 14th of October (Sunday) the master-classes day will take place.

The conference targets top specialists of IT industry and science, visionaries. It is a multi-disciplinary event that allows participants to overview a wide range of software industry topics and trends, and deepen their understanding of the areas of interest, which may be adjacent to their core specialisation.

Procedure

Talks, workshops and scientific papers submissions are welcome. Papers are accepted only along with the talk which delivered in person.

  1. Submit your proposal by 16th of July 2018.
  2. Discuss your proposal with the curator from the program committee, correct the proposal if needed.
  3. The Program committee will choose the proposals by voting until August, 31st. You may be asked to correct your submission / article, undertake the talk audition before the final decision is made.
  4. If accepted, prepare your talk / paper with the curator. The rehearsal is highly recommended if you deliver public talks rarely (1-2 times a year).

Time allocated for the talk: 15 or 30 minutes (allocated by program committee with your curator), and for master-class: 1 — 8 hrs.

Language: English or Russian. The slides can be in English or in Russian. The preferred language for papers is English.

Scope

The submissions related to software development are welcome. Some of the topics are listed below.

  • Programming Technologies and Tools
  • DevOps
  • AI; Intelligent Apps and Analytics ; Intelligent Things

    Over the next few years every app, application and service will incorporate AI at some level. AI will run unobtrusively in the background of many familiar application categories while giving rise to entirely new ones. AI has become the next major battleground in a wide range of software and service markets, including aspects of ERP. “Challenge your packaged software and service providers to outline how they’ll be using AI to add business value in new versions in the form of advanced analytics, intelligent processes and advanced user experiences,” notes Cearley.

    Intelligent apps also create a new intelligent intermediary layer between people and systems and have the potential to transform the nature of work and the structure of the workplace, as seen in virtual customer assistants and enterprise advisors and assistants.)

    Intelligent things use AI and machine learning to interact in a more intelligent way with people and surroundings. Some intelligent things wouldn’t exist without AI, but others are existing things (i.e., a camera) that AI makes intelligent (i.e., a smart camera.) These things operate semiautonomously or autonomously in an unsupervised environment for a set amount of time to complete a particular task. Examples include a self-directing vacuum or autonomous farming vehicle. As the technology develops, AI and machine learning will increasingly appear in a variety of objects ranging from smart healthcare equipment to autonomous harvesting robots for farms. As intelligent things proliferate, expect a shift from stand-alone intelligent things to a swarm of collaborative intelligent things. In this model, multiple devices will work together, either independently or with human input. The leading edge of this area is being used by the military, which is studying the use of drone swarms to attack or defend military targets. It’s evident in the consumer world in the opening example showcased at CES, the consumer electronics event.

  • IoT; Digital Twins

    A digital twin is a digital representation of a real-world entity or system. In the context of IoT, digital twins are linked to real-world objects and offer information on the state of the counterparts, respond to changes, improve operations and add value. With an estimated 21 billion connected sensors and endpoints by 2020, digital twins will exist for billions of things in the near future. Potentially billions of dollars of savings in maintenance repair and operation (MRO) and optimized IoT asset performance are on the table, says Cearley. In the short term, digital twins offer help with asset management, but will eventually offer value in operational efficiency and insights into how products are used and how they can be improved. Outside of the IoT, there is a growing potential to link digital twins to entities that are not simply “things.” “Over time, digital representations of virtually every aspect of our world will be connected dynamically with their real-world counterparts and with one another and infused with AI-based capabilities to enable advanced simulation, operation and analysis,” says Cearley. “City planners, digital marketers, healthcare professionals and industrial planners will all benefit from this long-term shift to the integrated digital twin world.” For example, future models of humans could offer biometric and medical data, and digital twins for entire cities will allow for advanced simulations.

  • Data Science; Big Data
  • Blockchain ; Event-Driven

    Blockchain is a shared, distributed, decentralized and tokenized ledger that removes business friction by being independent of individual applications or participants. It allows untrusted parties to exchange commercial transactions. The technology holds the promise to change industries, and although the conversation often surrounds financial opportunities, blockchain has many potential applications in government, healthcare, content distribution, supply chain and more. However, many blockchain technologies are immature and unproven, and are largely unregulated.

    A practical approach to blockchain demands a clear understanding of the business opportunity, the capabilities and limitations of blockchain, a trust architecture and the necessary implementation skills. Before embarking on a distributed-ledger project, ensure your team has the cryptographic skills to understand what is and isn’t possible. Identify the integration points with existing infrastructures, and monitor the platform evolution and maturation. Use extreme caution when interacting with vendors, and ensure you are clearly identifying how the term “blockchain” is being used.

    Digital businesses rely on the ability to sense and be ready to exploit new digital business moments. Business events reflect the discovery of notable states or state changes, such as completion of a purchase order. Some business events or combinations of events constitute business moments — a detected situation that calls for some specific business action. The most consequential business moments are those that have implications for multiple parties, such as separate applications, lines of business or partners.

    With the advent of AI, the IoT, and other technologies, business events can be detected more quickly and analyzed in greater detail. Enterprises should embrace “event thinking” as part of a digital business strategy. By 2020, event-sourced, real-time situational awareness will be a required characteristic for 80% of digital business solutions, and 80% of new business ecosystems will require support for event processing.

  • Cloud; Cloud to the Edge

    Edge computing describes a computing topology in which information processing and content collection and delivery are placed closer to the sources of this information. Connectivity and latency challenges, bandwidth constraints and greater functionality embedded at the edge favors distributed models. Enterprises should begin using edge design patterns in their infrastructure architectures — particularly for those with significant IoT elements. A good starting point could be using colocation and edgespecific networking capabilities.

    While it’s common to assume that cloud and edge computing are competing approaches, it’s a fundamental misunderstanding of the concepts. Edge computing speaks to a computing topology that places content, computing and processing closer to the user/things or “edge” of the networking. Cloud is a system where technology services are delivered using internet technologies, but it does not dictate centralized or decentralized service delivering services. When implemented together, cloud is used to create the serviceoriented model and edge computing offers a delivery style that allows for executions of disconnected aspects of cloud service.)

  • High-Loaded Systems
  • Embedded Systems; Hardware and Low-level Programming.
  • Open Source Technologies & Community
  • Voice Interfaces; Natural Languages Text Processing; Conversational Platforms

    Conversational platforms will drive a paradigm shift in which the burden of translating intent shifts from user to computer. These systems are capable of simple answers (How’s the weather?) or more complicated interactions (book a reservation at the Italian restaurant on Parker Ave.) These platforms will continue to evolve to even more complex actions, such as collecting oral testimony from crime witnesses and acting on that information by creating a sketch of the suspect’s face based on the testimony. The challenge that conversational platforms face is that users must communicate in a very structured way, and this is often a frustrating experience. A primary differentiator among conversational platforms will be the robustness of their conversational models and the API and event models used to access, invoke and orchestrate third-party services to deliver complex outcomes).

  • Security; Continuous Adaptive Risk and Trust

    Digital business creates a complex, evolving security environment. The use of increasingly sophisticated tools increases the threat potential. Continuous adaptive risk and trust assessment (CARTA) allows for real-time, risk and trust-based decision making with adaptive responses to security-enable digital business. Traditional security techniques using ownership and control rather than trust will not work in the digital world. Infrastructure and perimeter protection won’t ensure accurate detection and can’t protect against behind-the-perimeter insider attacks. This requires embracing people-centric security and empowering developers to take responsibility for security measures. Integrating security into your DevOps efforts to deliver a continuous “DevSecOps” process and exploring deception technologies (e.g., adaptive honeypots) to catch bad guys that have penetrated your network are two of the new techniques that should be explored to make CARTA a reality.

  • VR, AR, Immersive Experience

    Augmented reality (AR), virtual reality (VR) and mixed reality are changing the way that people perceive and interact with the digital world. Combined with conversational platforms, a fundamental shift in the user experience to an invisible and immersive experience will emerge. Application vendors, system software vendors and development platform vendors will all compete to deliver this model.

    Over the next five years the focus will be on mixed reality, which is emerging as the immersive experience of choice, where the user interacts with digital and real-world objects while maintaining a presence in the physical world. Mixed reality exists along a spectrum and includes head-mounted displays (HMD) for AR or VR, as well as smartphone- and tablet-based AR. Given the ubiquity of mobile devices, Apple’s release of ARkit and iPhone X, Google’s Tango and ARCore, and the availability of cross-platform AR software development kits such as Wikitude, we expect the battles for smartphonebased AR and MR to heat up in 2018.)

  • Software Testing and Verification
  • System Analysis and Requirements Engineering
  • Project and Product Management (Classical & Agile)
  • Software Architecture
  • Continuous Professional Development: From Classical to Corporate University
  • Business and Entrepreneurship
  • Human Computer Interaction; User Experience, Usability

If you can’t find the topic in the list — submit it under Other.
The list of topics contains Gartner’s Top 10 Strategic Technology Trends for 2018.

How to write the abstract and description

  1. Topic and short description in English (and in Russian, if possible). During the review process the topic and short description will be published on the Proposals section of the conference website.The description must include 1-3 sentences covering the main point of the talk.

    Examples

    Example 1: “If participants have problems with designing interfaces, in my report they will be able to learn about some ways of using DSL for the modification of automatically generated forms. This approach is not covered in the current literature, but our successful implementation shows that it works.”

    Example 2: “I will share my experience in communication with difficult customers based on seven years of work and over 20 successful projects, which will be presented in the form of case studies with analysis/conclusion. I think that participants will be able to apply this knowledge in their daily work, since some of these situations have occurred more than once with different clients.”

  2. Extended abstract (1800 characters or more) in English or Russian. During the review process the publication of an abstract on the conference website is optional (at the author’s discretion).

    The content of the extended abstract should fully reflect the essence of the final report. It should clearly state not only the subject area of the report, but also the specific issues which will be covered, as well as the scientific, technological or innovative solutions offered by authors.

    Please do not send lists of slides, promotional materials, links to forums, or previously-published reports or articles in place of the extended abstract.Many authors describe a problem and its importance and promise to reveal the solution in their report. This is not enough: the solution itself should be stated and justified, whether it is an original idea, a new combination of ideas, or a successful practice. The relevance of the problem should be shown, with references to literature or other open sources (especially for articles).

    If the author positions the report as a scientific work, he/she should replace the extended abstract with a full article (5-10 pages) formatted in accordance with the standard ACM requirements for scientific papers (View ACM templates, use the sigconf template). During the review process the article will not be published on the conference website.

    For workshop proposals please also state the following: the workshop duration, target audience, program. During the review process this information will not be published on the conference website.

  3. Author(s) photo and a short bio of 3-5 sentences. Authors are encouraged to share links to their published works, public presentations, and social-networking profiles. During the review process the publication of the bio and photo on the conference website is optional (at the author’s discretion).

In addition, please specify the following:

  1. The type of your talk: a presentation of scientific research results that can be used; a presentation of ideas for action by analogy; an informational overview; a technology presentation; new technology training; new tool training; a case study, including the experience of using technology.
  2. The subject of your talk: one or more areas from the conference Scope (above).

The following materials will not be accepted:

  • Promotional presentations and articles (designed to promote a company, product or service)
  • Presentations previously delivered at other conferences
  • Papers previously published or accepted by another conference or journal.

Conference organisers do not cover your travelling costs and hotel reservations.

Contacts

Nick Puntikov, Chair of SECR 2018
Julia Kryuchkova, Secretary of SECR 2018
Moscow: +7 499 703 16 55
Saint-Petersburg: +7 812 336 93 44
contact@secrus.org

[/lang_en]

Sponsors & Partners|Спонсоры и партнёры

Sponsors|Спонсоры

Gold

JetBrainsFirst Line Software

Sponsors

BellSoftPVS-Studio

Embedded|Embedded

Auriga|Аурига

Partners|Партнёры

Gold|Золотой

Digital October

Main partners|Генеральные партнёры

RUSSOFT|РУССОФТAP KIT|АП КИТ

In cooperation|При содействии

ACM Special Interest Group on Software EngineeringAssociation for Computing Machinery

Technical partners|Технические партнёры

CUSTIS0x1.tvMajordomo

Organizers|Организаторы

Software Russiai-Help