From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Original-To: caml-list@sympa.inria.fr Delivered-To: caml-list@sympa.inria.fr Received: from mail3-relais-sop.national.inria.fr (mail3-relais-sop.national.inria.fr [192.134.164.104]) by sympa.inria.fr (Postfix) with ESMTPS id 4791D81792 for ; Fri, 28 Jun 2013 22:21:10 +0200 (CEST) Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of grlmc@urv.cat) identity=pra; client-ip=193.144.16.78; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="grlmc@urv.cat"; x-sender="grlmc@urv.cat"; x-conformance=sidf_compatible Received-SPF: Pass (mail3-smtp-sop.national.inria.fr: domain of grlmc@urv.cat designates 193.144.16.78 as permitted sender) identity=mailfrom; client-ip=193.144.16.78; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="grlmc@urv.cat"; x-sender="grlmc@urv.cat"; x-conformance=sidf_compatible; x-record-type="v=spf1" Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of postmaster@mta01.urv.cat) identity=helo; client-ip=193.144.16.78; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="grlmc@urv.cat"; x-sender="postmaster@mta01.urv.cat"; x-conformance=sidf_compatible X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: Ar4BAJjuzVHBkBBOlGdsb2JhbABBGoM7v0+BChYOAQEBAQcNCQkUBSOCJQUIRh8BBBQBBBsPPgIEEgIWDwEEEwgDDgQEh3IIM5l6kX6OEQSOGoEHgzxjA4hqg0uBdmKJYYVqhQeIPoFmAh4G X-IPAS-Result: Ar4BAJjuzVHBkBBOlGdsb2JhbABBGoM7v0+BChYOAQEBAQcNCQkUBSOCJQUIRh8BBBQBBBsPPgIEEgIWDwEEEwgDDgQEh3IIM5l6kX6OEQSOGoEHgzxjA4hqg0uBdmKJYYVqhQeIPoFmAh4G X-IronPort-AV: E=Sophos;i="4.87,961,1363129200"; d="scan'208";a="19403534" Received: from mta01.urv.cat ([193.144.16.78]) by mail3-smtp-sop.national.inria.fr with ESMTP; 28 Jun 2013 22:21:09 +0200 X-IronPort-AV: E=Sophos;i="4.87,961,1363129200"; d="scan'208";a="38966177" Received: from pmbox1.urv.cat ([193.144.16.40]) by mta.urv.cat with ESMTP; 28 Jun 2013 22:21:09 +0200 Received: from Carlos1 (unknown [46.26.11.86]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by pmbox1.urv.cat (Postfix) with ESMTPSA id 3AC0818661; Fri, 28 Jun 2013 22:21:03 +0200 (CEST) From: "GRLMC" To: Date: Fri, 28 Jun 2013 22:21:13 +0200 Message-ID: <14FED08748E84882B3E60AF8924A0434@Carlos1> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable X-Mailer: Microsoft Office Outlook 11 Thread-index: Ac50PQjq3HGuztgQTl+WEw1kqmkd+A== X-MIMEOLE: Produced By Microsoft MimeOLE V6.0.6000.16669 X-Validation-by: grlmc@urv.cat Subject: [Caml-list] SSTiC 2013: last call *To be removed from our mailing list, please respond to this message with UNSUBSCRIBE in the subject line* ********************************************************************* 2013 INTERNATIONAL SUMMER SCHOOL ON TRENDS IN COMPUTING SSTiC 2013 Tarragona, Spain July 22-26, 2013 Organized by Rovira i Virgili University http://grammars.grlmc.com/SSTiC2013/ ********************************************************************* AIM: SSTiC 2013 will be an open forum for the convergence of top class well recognized computer scientists and people at the beginning of their research career (typically PhD students) as well as consolidated researchers. SSTiC 2013 will cover the whole spectrum of computer science by means of 54 six-hour courses dealing with hot topics at the frontiers of the field. By actively participating, lecturers and attendees will share the idea of scientific excellence as the main motto of their research work. ADDRESSED TO: Graduate students from around the world. There are no pre-requisites in terms of the academic degree the attendee must hold. However, since there will be several levels among the courses, in the description of some of them reference may be made to specific knowledge background. SSTiC 2013 is appropriate also for people more advanced in their career who want to keep themselves updated on developments in the field. Finally, senior researchers will find it fruitful to listen and discuss with people who are main references of the diverse branches of computing nowadays. REGIME: 6 parallel sessions will be held during the whole event. Participants will be able to freely choose the courses they will be willing to attend as well as to move from one to another. VENUE: Campus Catalunya Universitat Rovira i Virgili Av. Catalunya, 35 43002 Tarragona COURSES AND PROFESSORS: Shun-ichi Amari (Riken) [introductory] Information Geometry and Its Applications James Anderson (Chapel Hill) [intermediate] Scheduling and Synchronization in Real-Time Multicore Systems Pierre Baldi (Irvine) [intermediate] Big Data Informatics Challenges and Opportunities in the Life Sciences Yoshua Bengio (Montr=E9al) [introductory/intermediate] Deep Learning of Representations Stephen Brewster (Glasgow) [advanced] Multimodal Human-Computer Interaction Bruno Buchberger (Linz) [introductory] Groebner Bases: An Algorithmic Method for Multivariate Polynomial Systems. Foundations and Applications Rajkumar Buyya (Melbourne) [intermediate] Cloud Computing Jan Camenisch (IBM Zurich) [intermediate] Cryptography for Privacy Larry S. Davis (College Park) [intermediate] Video Analysis of Human Activities Paul De Bra (Eindhoven) [intermediate] Adaptive Systems Paul Dourish (Irvine) [introductory] Ubiquitous Computing in a Social Context Max J. Egenhofer (Maine) [introductory/intermediate] Qualitative Spatial Relations: Formalizations and Inferences Richard M. Fujimoto (Georgia Tech) [introductory] Parallel and Distributed Simulation David Garlan (Carnegie Mellon) [advanced] Software Architecture: Past, Present and Future Mario Gerla (Los Angeles) [intermediate] Vehicle Cloud Computing Ralph Grishman (New York) [intermediate] Information Extraction from Natural Language Francisco Herrera (Granada) [intermediate] Imbalanced Classification: Current Approaches and Open Problems Paul Hudak (Yale) [introductory] Euterpea: From Signals to Symphonies Using Haskell Niraj K. Jha (Princeton) [intermediate] FinFET Circuit Design George Karypis (Minnesota) [introductory] Introduction to Parallel Computing: Architectures, Algorithms, and Programming Aggelos K. Katsaggelos (Northwestern) [intermediate/advanced] Sparsity-based Advances in Image Processing Arie E. Kaufman (Stony Brook) [advanced] Advances in Visualization Hugo Krawczyk (IBM Research) [intermediate] An Introduction to the Design and Analysis of Authenticated Key Exchange Protocols Pierre L'Ecuyer (Montr=E9al) [intermediate] Quasi-Monte Carlo Methods in Simulation: Theory and Practice Laks Lakshmanan (British Columbia) [intermediate/advanced] Information and Influence Spread in Social Networks Wenke Lee (Georgia Tech) [introductory] DNS-based Monitoring of Malware Activities Maurizio Lenzerini (Roma La Sapienza) [intermediate] Ontology-based Data Integration Ming C. Lin (Chapel Hill) [introductory/intermediate] Physically-based Modeling and Simulation Jane W.S. Liu (Academia Sinica) [intermediate] Critical Information and Communication Technologies for Disaster Preparedness and Response Satoru Miyano (Tokyo) [intermediate] How to Hack Cancer Systems with Computational Methods Aloysius K. Mok (Austin) [intermediate] From Real-time Systems to Cyber-physical Systems Hermann Ney (Aachen) [intermediate/advanced] Probabilistic Modelling for Natural Language Processing - with Applications to Speech Recognition, Handwriting Recognition and Machine Translation Cathleen A. Norris (North Texas) & Elliot Soloway (Ann Arbor) [introductory] Primary & Secondary Educational Computing in the Age of Mobilism Jeff Offutt (George Mason) [intermediate] Cutting Edge Research in Engineering of Web Applications Bijan Parsia (Manchester) [introductory] The Semantic Web: Conceptual and Technical Foundations Charles E. Perkins (FutureWei) [intermediate/advanced] Beyond 4G Prabhakar Raghavan (Google) [introductory/intermediate] Web Search and Advertising Phillip Rogaway (Davis) [introductory/intermediate] Provably Secure Symmetric Encryption Gustavo Rossi (La Plata) [intermediate] Topics in Model Driven Web Engineering Kaushik Roy (Purdue) [introductory/intermediate] Low-energy Computing Robert Sargent (Syracuse) [introductory] Validating Models Douglas C. Schmidt (Vanderbilt) [intermediate] Patterns and Frameworks for Concurrent and Networked Software Bart Selman (Cornell) [intermediate] Fast Large-scale Probabilistic and Logical Inference Methods Mubarak Shah (Central Florida) [intermediate/advanced] Visual Crowd Surveillance Ron Shamir (Tel Aviv) [introductory] Revealing Structure in Disease Regulation and Networks Dawn Xiaodong Song (Berkeley) [introductory] Selected Topics in Computer Security Mike Thelwall (Wolverhampton) [introductory] Sentiment Strength Detection for the Social Web Julita Vassileva (Saskatchewan) [introductory/intermediate] Engaging Users in Social Computing Systems Philip Wadler (Edinburgh) [introductory] Topics in Lambda Calculus and Life Yao Wang (Polytechnic New York) [introductory/advanced] Video Compression: Fundamentals and Recent Development Gio Wiederhold (Stanford) [introductory] Software Economics: How Do the Results of the Intellectual Efforts Enter the Global Market Place Limsoon Wong (National Singapore) [introductory/intermediate] The Use of Context in Gene Expression and Proteomic Profile Analysis Michael Wooldridge (Oxford) [introductory] Autonomous Agents and Multi-Agent Systems Ronald R. Yager (Iona) [introductory/intermediate] Fuzzy Sets and Soft Computing Philip S. Yu (Illinois Chicago) [advanced] Mining Big Data REGISTRATION: It has to be done at http://grammars.grlmc.com/SSTiC2013/Registration.php=20 Since the capacity of the venue is limited, registration requests will be processed on a first come first served basis. The registration period will be closed when the capacity of the venue will be complete. It is highly convenient to register prior to the event. FEES: Fees may be for the whole week (full-time participant) or per blocks of days (part-time participant). They are a flat rate allowing one to attend all courses within the time window set: 5, 4, 3 or 2 days. Fees vary depending on the deadline. ACCOMMODATION: Information about accommodation is available on the website of the School. CERTIFICATE: Participants will be delivered a certificate of attendance. QUESTIONS AND FURTHER INFORMATION: Lilica Voicu: florentinalilica.voicu@urv.cat=20 POSTAL ADDRESS: SSTiC 2013 Research Group on Mathematical Linguistics (GRLMC) Rovira i Virgili University Av. Catalunya, 35 43002 Tarragona, Spain Phone: +34-977-559543 Fax: +34-977-558386 ACKNOWLEDGEMENTS: Departament d=92Economia i Coneixement, Generalitat de Catalunya Universitat Rovira i Virgili