Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Home
  • Attend
    • Venue, Hotel, and Travel
    • Students and Grants
    • Co-Located Workshops
  • Program
    • At a Glance
    • Technical Sessions
    • Poster Session
  • Activities
    • Birds-of-a-Feather Sessions
    • Poster Session
    • WiPs
  • Participate
    • Call for Papers
      • Important Dates
      • Symposium Organizers
      • Symposium Topics
      • Refereed Papers
      • Shadow PC
      • Symposium Activities
      • Submitting Papers
    • Instructions for Participants
  • Sponsorship
  • About
    • Symposium Organizers
    • Services
    • Questions
    • Help Promote!
    • Past Symposia
  • Home
  • Attend
    • Venue, Hotel, and Travel
    • Students and Grants
    • Co-Located Workshops
  • Program
  • Activities
  • Participate
    • Call for Papers
      • Important Dates
      • Symposium Organizers
      • Symposium Topics
      • Refereed Papers
      • Shadow PC
      • Symposium Activities
      • Submitting Papers
    • Instructions for Participants
  • Sponsorship
  • About
    • Symposium Organizers
    • Services
    • Questions
    • Help Promote!
    • Past Symposia

sponsors

Platinum Sponsor
Gold Sponsor
Gold Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
General Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner
Industry Partner

help promote

USENIX Security '16 button

Get more
Help Promote graphics!

connect with usenix


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

twitter

Tweets by USENIXSecurity

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » Participate » Call for Papers » Shadow PC
Tweet

connect with us

Shadow PC

Continuing the success of the previous year, the USENIX Security '15 PC would like to make submitted papers available to shadow PCs. Shadow PCs allow students and others interested in future PC service to read submitted papers and go through the reviewing process, ultimately arriving at a shadow conference program. This is an opportunity for future PC members to learn about the peer-review process and gain experience as a reviewer.

Shadow PCs will not have any access to the real reviews, the names of the real reviewers, or any other data such as relative rankings. They will have to abide by the same rules and restrictions applicable to regular PC members. This includes, but is not limited to, rules against discussing the papers outside of the PC context, or using in any way results from reviewed papers before such papers have been published. Subreviews (i.e., external reviews) are not allowed for the shadow PC. If you are given a paper to review as a student/shadow PC member, you must review it yourself. Making a submitted paper available to shadow PCs is optional; authors will have the opportunity to opt-in during the paper submission process. Shadow reviews for papers that are reviewed by shadow PCs will be sent out after the actual USENIX Security ’15 notifications.

Authors that have participated in previous shadow PCs have found the additional reviews helpful. However, note that not all papers that volunteer for the shadow review process will receive shadow reviews; the shadow reviews may not be returned for several weeks after the notification deadline; and these reviews will have no direct bearing on acceptance to the technical program. If you would like to organize a shadow PC at your host institution, please contact Yoshi Kohno via sec15shadow@usenix.org.

Previous Page | Next Page

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Bronze Sponsors

General Sponsors

Media Sponsors & Industry Partners

Open Access Publishing Partner

© USENIX

  • Privacy Policy
  • Contact Us