All the dates are AoE
EICS Full Papers and Technical Notes are published as articles in the Journal Proceedings of the ACM on Human-Computer Interaction (PACM - EICS series). There are three submission deadlines per year, and authors can choose when to submit. Papers follow the traditional journal model of reviewing: papers may be accepted after submission and review, or may be recommended for revisions and re-submission to the next round to enable authors to refine papers based on reviewer recommendations.
Submissions for the journal of this venue should present original and mature research work within the scope of the conference. Note that accepted journal papers can be either regular research papers, or technical notes. Technical Notes are shorter, more focused contributions, that focus specifically on system contributions and technical work. Elucidating technical details of complex interactive systems, preferably ensuring the work can be reproduced or put to practice, is a primary objective of a Technical Note. Tech Notes require an illustrative example of the system, and they can, but do not need to, be validated by formal user evaluations or user studies. Validation can also be done through e.g. simulation, feasibility, or comparisons. Tech Notes will be judged on their technical merits and relevance to interactive systems concerns.
There are no length restrictions on Full Papers and Technical Notes, nor any limit to the number of references that may be included. We advise authors to ensure the length of their papers is in function of the contributions. Concise and clear is often to be preferred over lengthy and verbose.
Full Papers and Technical Notes should be written in the ACM format, see https://www.acm.org/publications/authors/submissions
Papers are submitted using https://new.precisionconference.comEICS 2025 is the sixteenth international ACM SIGCHI conference devoted to engineering interactive computing systems and their user interfaces, addressing one or more software quality factors, such as usability, user experience, reliability, security, etc. Work presented at EICS covers all stages of the engineering life-cycle of interactive systems - inception, requirements, design, specification, coding, data analytics, validation and verification, deployment and maintenance.
EICS has the the longest tradition of bringing together researchers who contribute to better ways of creating interactive computing systems, stemming from the conference on command languages in the seventies. The conference is best known for rigorously contributing and disseminating research results that hold the midst in between user interface design, software engineering and computational interaction.
EICS focuses on models, languages, notations, methods, techniques and tools that support designing, developing, validating and verifying interactive systems. The conference brings together people who study or practice the engineering of interactive systems, drawing from design, HCI, software engineering, requirements engineering, software development, modeling, and programming.
Submissions advance the state of the art of the engineering of interactive systems. Topics include, but are not limited to:
A newcomer’s guide to EICS is available in the paper by López Jaquero et al.
Authors are kindly requested to include references reporting the correct publication to facilitate the citation indexing, in particular for conferences publishing papers on journals such as PACM. For instance, a (fictional) full paper presented at EICS 2025 should be referenced as follows.
John Doe, Jane Smith. 2025. Enhancing User Experience in Interactive Systems. Proc. ACM Hum.-Comput. Interact. 7, EICS, Article 123 (jun 2025), 16 pages, https://doi.org/10.1145/123456
Please do not refer to the paper as follows:
John Doe, Jane Smith. 2025. Enhancing User Experience in Interactive Systems. In Proc. of the 15th Symposium on Engineering Interactive Computing Systems (EICS 2025), 16 pages, https://doi.org/10.1145/123456
Should you have any doubt about your Full Paper proposal please contact the chairs (papers2025@eics.acm.org)
The papers review process is based on reviewing where the identities of both the authors and reviewers are kept hidden (but ACs know these details). Authors are expected to remove author and institutional identities from the title and header areas of the paper, as noted in the submission instructions (Note: changing the text color of the author information is not sufficient). Also, please make sure that identifying information does not appear in the document’s meta-data (e.g., the ‘Authors’ field in your word processor’s ‘Save As’ dialog box). In addition, we require that the acknowledgments section be left blank as it could also easily identify the authors and/or their institution.
Further suppression of identity in the body of the paper is left to the authors’ discretion. We do expect that authors leave citations to their previous work unanonymized so that reviewers can ensure that all previous research has been taken into account by the authors. However, authors are required to cite their own work in the third person, e.g., avoid “As described in our previous work [10], ... ” and use instead “As described by [10], ...”
If you for some very specific reasons have challenges with writing the paper in an anonymous way, please contact the track chairs you are planning to submit to and ask for advice. In order to ensure the fairness of the reviewing process, we use a review process where external reviewers don’t know the identity of authors, and authors don’t know the identity of external reviewers. In the past few years, some authors have decided to publish their submissions in public archives prior to or during the review process. These public archives have surpassed in reach and publicity what used to happen with tech reports published in institutional repositories. The consequence is that well-informed external reviewers may know, without searching for it, the full identity and institutional affiliation of the authors of a submission they are reviewing. While reviewers should not actively seek information about author identity, complete anonymization is difficult and can be made more so by publication and promotion of work during the review process. While publication in public archives is becoming standard across many fields, authors should be aware that unconscious biases can affect the nature of reviews when identities are known. EICS does not discourage non-archival publication of work prior to or during the review process but recognizes that complete anonymization becomes more difficult in that context.