Loading ...
Sorry, an error occurred while loading the content.

Fwd: CFP --- 2005,C. on Computational Intelligence and Security...

Expand Messages
  • Gadomski laptop
    From: CIS Cc: To: Subject: Re: Call for Papers --- 2005 International Conference
    Message 1 of 1 , May 16, 2005

      From: "CIS" <cis05@...>
      Cc: <cis05@...>
      To: <Undisclosed-Recipient:;>
      Subject: Re: Call for Papers --- 2005 International Conference on Computational Intelligence and Security...
      Date: Sun, 15 May 2005 00:13:49 +0800
      X-Mailer: Microsoft Outlook Express 6.00.2900.2180

      **  We sincerely apologize if you receive the CFP more than once. **

      Call for Papers

      2005 International Conference on Computational Intelligence and Security (CIS'2005)

      Co-organized by IEEE (Hong Kong) Computational Intelligence Chapter and Xidian University, China

      Co-sponsored by IEEE (Hong Kong) Computational Intelligence Chapter, Hong Kong Baptist University, Xidian University, and Guangdong University of Technology

      December 15-19, 2005, Xi'an, China

      URL: http://www.comp.hkbu.edu.hk/~cis05

      (Paper Submission Due date: July 31, 2005)

      International Conference on Computational Intelligence and Security (CIS) is an annual international conference to bring together researchers, engineers, developers and practitioners from academia and industry to share the experience, and exchange and cross-fertilize ideas on all areas of computational intelligence and information security. This conference serves as a forum for the dissemination of state-of-the-art research, development, and implementations of systems, technologies and applications in these two broad fields. CIS is co-sponsored by IEEE (Hong Kong) Computational Intelligence Chapter, Hong Kong Baptist University, Xidian University, and Guangdong University of Technology.

      The technical areas include, but are not limited to:

      Computational Intelligence

      - Artificial Immune Systems
      - Autonomy-Oriented Computing
      - Biological Computing
      - Coevolutionary Algorithms
      - Evolutionary Computation
      - Fuzzy Systems
      - Intelligent Agents and Systems
      - Machine Learning
      - Molecular Computing
      - Neural Computing
      - Probabilistic Reasoning
      - Reinforcement Learning
      - Swarm Intelligence
      - Support Vector Machine
      - Unsupervised Learning

      Information Security

      - Cryptography and Coding
      - Cryptographic Protocols
      - Detection of Abnormality
      - Electronic Commerce Security
      - Intrusion Detection
      - Information, Data and System Integrity
      - Information Hiding
      - Information Security Management
      - Information Storage and Retrieval System
      - Mobile Code & Agent Security
      - Media Data Authentication
      - Security Models and Architectures
      - Security Analysis Methodologies
      - Steganography and Watermarking
      - Web and Wireless Security


      - Bioinformatics and Medical Diagnosis
      - Copyright Protection
      - Cryptography and Its Applications
      - Data Mining
      - Data Privacy
      - Detection of Hidden Communication Channels
      - Digital Signatures
      - Electronic Commerce Security
      - Identity Recognition
      - Image and Signal Processing
      - Intelligent Information Retrieval
      - Pattern Recognition
      - Web and Network Applications
      - Other Applications

      Important Dates

      Submission of Papers:         July 31, 2005
      Notification of Acceptance:   September 1, 2005
      Final Camera-Ready Papers:    September 25, 2005

      Paper Submission and Publication

      Prospective authors are invited to submit high-quality manuscripts written in English. The submission of a paper implies that the paper is original and has not been submitted to elsewhere for possible publication. All submissions will be peer-reviewed by experts in the field based on originality, significance, quality and clarity. Authors should use the Latex style files or MS-Word templates provided by the Spring Lecture Notes to format their papers. The length of a submitted paper should not exceed 10 pages in the Lecture Notes format. All accepted papers will be appeared in the conference proceedings, published by Springer as ** Lecture Notes in Artificial Intelligence **(http://www.springeronline.com/lncs) that are indexed by SCI-Expanded. Furthermore, selected papers will be considered for publication in an international journal, after expansion and/or revision.

      Authors should submit a soft copy of their manuscripts with the pdf format only to the conference via the online submission system. For more details, please visit the conference web site at: http://www.comp.hkbu.edu.hk/~cis05.

      General Co-Chairs:

      Yue Hao          China
      Jiming Liu       Hong Kong

      Program Committee Co-Chairs:

      Yiu-ming Cheung  Hong Kong
      Licheng Jiao     China
      Yuping Wang      China
      Hujun Yin        UK

      Organizing Committee:

      Jianfeng Ma      Chair
      Yongchang Jiao   Vice Co-Chair
      Hailin Liu       Tutorial Chair
      Yibo Hu          Treasurer
      Lixia Han        Publicity Chair
      Liang Ming       Registration Chair
      Yuanyuan Zuo     Local Arrangement Chair
      Shuguang Zhao    Publication Chair
      Kapluk Chan      Asia Liaison
      Yan Wu           Secretary
      Jingxuan Wei     Secretary
      Rongzu Yu        Secretary

      Further Information

      Any enquiry and comment please contact the Secretariat of CIS-05:

      Secretariat of CIS-05
      Department of Computer Science,
      7/F, Sir Run Run Shaw Building,
      Hong Kong Baptist University,
      Kowloon Tong,
      Hong Kong
      Email: cis05@...

    Your message has been successfully submitted and would be delivered to recipients shortly.