• Non ci sono risultati.

International Symposium on Information and Computer Science

N/A
N/A
Protected

Academic year: 2021

Condividi "International Symposium on Information and Computer Science"

Copied!
1
0
0

Testo completo

(1)

International Symposium on

Information

and

Computational Science

August 15-18, 2006, Dalian, China

General Co-Chairs

Ren-Hong Wang

Institute of Mathematical Science Dalian University of Technology China renhong@dlut.edu.cn Catterina Dagnino Department of Mathematics University of Turin Italy catterina.dagnino@unito.it

Scientific Committee

Zhong-Ci Shi (Chair)

CAS, China Wen Gao CAS, China Qun Lin CAS, China Elisabetta Santi University of L’Aquila, Italy Yurii Shokin

RAS, Russia Chi-Wang Shu Brown University, USA Ezio Venturino University of Turin, Italy Roderick Wong

City University, Hong Kong, China Luc Wuytack

University of Antwerp, Belgium

Secretariat

Chong-Jun Li

Institute of Mathematical Science Dalian University of Technology Dalian 116024, China

chongjun@dlut.edu.cn Chun-Gang Zhu

Institute of Mathematical Science Dalian University of Technology Dalian 116024, China

cgzhu@dlut.edu.cn

Phone: +86(0411)84708351-8407

Aims

The aim of ISICS'06 is to bring together the scientists and researchers of international community engaged in information and computational science, to attract original papers of high quality and to share the most up-to-date advances of information technology and computational science.

Topics

Numerical Analysis Computer Graphics

Scientific and Engineering Computing Computing Visualization

Computational Geometry Image Processing

Wavelets and Fractals Intelligence Computation CAD/CAM/CAE

3D Object Recognition Computer Network

Information Security

Call for Papers

Submitted papers have to be original, containing new results that were not previously published. All papers will be peer-reviewed; accepted papers MUST be presented at the conference and a delegate may present up to two papers. The abstract (MS Word, about 400 words, in English) and the full paper (PDF, in English) electronically to: chongjun@dlut.edu.cn or cgzhu@dlut.edu.cn before

April 15, 2006. All accepted papers will be recommended to the Journal of

Information and Computational Science (EI indexed). In order to guarantee the quality of the papers and save the editorial work, we strongly suggest that you prepare your papers in LaTeX. The Instructions to Authors and the template can be found in the website of ISICS’06.

Confirmed Keynote Speakers

Raymond Chan CUHK, Hong Kong, China Fuhua Cheng University of Kentacky, USA Wen Gao CAS, China

Chi-Wang Shu Brown University, USA Tao Tang HKBU, Hong Kong, China

Roderick Wong City University, Hong Kong, China

Sponsors

Dalian University of Technology, China University of Turin, Italy

National Natural Science Foundation of China

Others

Welcome to math.dlut.edu.cn/ISICS06/index.htm or isics06.dlut.edu.cn.

Authors without internet access should contact the secretary in advance of the paper submission deadline.

Riferimenti

Documenti correlati

In particular we want to transfer into π-calculus the notion of noninterference properties of SPA, such as secure contexts, and try to express them within a logical framework..

In this further development, the asymmetry consists in cherry picking, in the stickiness of sellers prices and in the idea that the buyer knows seller’s price and quality, but

• Length of segment between 15 and 60 seconds, normally used 30-second intervals As last point, we observe the power spectrum of the neural signals in these segments and we

MATH@TOV is offering a unique opportunity to improve substantially the Master Programme in Pure and Applied Mathematics and make it internationally competitive. 1) MATH@TOV will

We start with a simple example of a curve segment in two dimensions. For example, consider the control polygon in 9gure 8.2. The two endpoints of the polygon are tagged as

Keywords: May module, complete discrete valuation ring, endomorphism ring, Jacobson Radical, totally projective.. MSC 2000 classification: 20K30,

Assumed, an anti-virus program reads the MBR via BIOS Int 13h to scan for viruses, the virus can intercept this and ”redirect” the read call to the saved copy of the

This step is similar in many ways to the software engineering step of understanding the problem as well as gathering the user requirements. However, at this stage, the real