- From: CIS05 CIS05 <cis05@Comp.HKBU.Edu.HK>
- Date: Mon, 16 May 2005 12:53:57 +0800 (HKT)
- cc: CIS05 CIS05 <cis05@Comp.HKBU.Edu.HK>
Dear Sir/Madam, Could you help announce the following conference? Many thanks! Best regards, Secretariate of CIS05 ===================================================================================================== Call for Papers 2005 International Conference on Computational Intelligence and Security (CIS'2005) Co-organized by IEEE (Hong Kong) Computational Intelligence Chapter and Xidian University, China Co-sponsored by IEEE (Hong Kong) Computational Intelligence Chapter, Hong Kong Baptist University, Xidian University, and Guangdong University of Technology December 15-19, 2005, Xi'an, China URL: http://www.comp.hkbu.edu.hk/~cis05 (Paper Submission Due date: July 31, 2005) ===================================================================================================== International Conference on Computational Intelligence and Security (CIS) is an annual international conference to bring together researchers, engineers, developers and practitioners from academia and industry to share the experience, and exchange and cross-fertilize ideas on all areas of computational intelligence and information security. This conference serves as a forum for the dissemination of state-of-the-art research, development, and implementations of systems, technologies and applications in these two broad fields. CIS is co-sponsored by IEEE (Hong Kong) Computational Intelligence Chapter, Hong Kong Baptist University, Xidian University, and Guangdong University of Technology. The technical areas include, but are not limited to: Computational Intelligence -------------------------- - Artificial Immune Systems - Autonomy-Oriented Computing - Biological Computing - Coevolutionary Algorithms - Evolutionary Computation - Fuzzy Systems - Intelligent Agents and Systems - Machine Learning - Molecular Computing - Neural Computing - Probabilistic Reasoning - Reinforcement Learning - Swarm Intelligence - Support Vector Machine - Unsupervised Learning Information Security ---------------------- - Cryptography and Coding - Cryptographic Protocols - Detection of Abnormality - Electronic Commerce Security - Intrusion Detection - Information, Data and System Integrity - Information Hiding - Information Security Management - Information Storage and Retrieval System - Mobile Code & Agent Security - Media Data Authentication - Security Models and Architectures - Security Analysis Methodologies - Steganography and Watermarking - Web and Wireless Security Applications -------------------------- - Bioinformatics and Medical Diagnosis - Copyright Protection - Cryptography and Its Applications - Data Mining - Data Privacy - Detection of Hidden Communication Channels - Digital Signatures - Electronic Commerce Security - Identity Recognition - Image and Signal Processing - Intelligent Information Retrieval - Pattern Recognition - Web and Network Applications - Other Applications Important Dates ------------------- Submission of Papers: July 31, 2005 Notification of Acceptance: September 1, 2005 Final Camera-Ready Papers: September 25, 2005 Paper Submission and Publication --------------------------------- Prospective authors are invited to submit high-quality manuscripts written in English. The submission of a paper implies that the paper is original and has not been submitted to elsewhere for possible publication. All submissions will be peer-reviewed by experts in the field based on originality, significance, quality and clarity. Authors should use the Latex style files or MS-Word templates provided by the Spring Lecture Notes to format their papers. The length of a submitted paper should not exceed 10 pages in the Lecture Notes format. All accepted papers will be appeared in the conference proceedings, published by Springer as ** Lecture Notes in Artificial Intelligence **(http://www.springeronline.com/lncs) that are indexed by SCI-Expanded. Furthermore, selected papers will be considered for publication in an international journal, after expansion and/or revision. Authors should submit a soft copy of their manuscripts with the pdf format only to the conference via the online submission system. For more details, please visit the conference web site at: http://www.comp.hkbu.edu.hk/~cis05. General Co-Chairs: Yue Hao China Jiming Liu Hong Kong Program Committee Co-Chairs: Yiu-ming Cheung Hong Kong Licheng Jiao China Yuping Wang China Hujun Yin UK Organizing Committee: Jianfeng Ma Chair Yongchang Jiao Vice Co-Chair Hailin Liu Tutorial Chair Yibo Hu Treasurer Lixia Han Publicity Chair Liang Ming Registration Chair Yuanyuan Zuo Local Arrangement Chair Shuguang Zhao Publication Chair Kapluk Chan Asia Liaison Yan Wu Secretary Jingxuan Wei Secretary Rongzu Yu Secretary Further Information ----------------------- Any enquiry and comment please contact the Secretariat of CIS-05: Secretariat of CIS-05 Department of Computer Science, 7/F, Sir Run Run Shaw Building, Hong Kong Baptist University, Kowloon Tong, Hong Kong Email: cis05@comp.hkbu.edu.hk
Received on Tuesday, 17 May 2005 07:41:55 UTC