|
|
Please select one of the following format (Revised on 13 December 2005):
^ top
|
|
|
|
|
|
December 16, 2005 (Friday) |
Time |
Sessions |
8:30 - 9:00 |
Opening Address |
8:00 - 10:00 |
Keynote 1 |
10:00 - 10:30 |
Tea / Coffee |
9:30 - 12:15 |
Fri-A1: Learning Systems
1756, 1192, 690, 1555, 1007, 1627, 1640 |
Fri-B1: Pattern Recognition
434, 1308, 2128, 1946, 2161, 1440, 400 |
Fri-C1: Intrusion Detection
1383, 1241, 1744, 159, 2157, 307, 1354 |
Fri-D1: Cryptographic Protoc.
1757, 234, 650, 1990, 123, 1609, 869 |
Fri-E1: Bioinformatics Computing
1175, 1988, 674, 1237, 2083, 171, 1326 |
12:15 - 13:30 |
Lunch |
13:30 - 15:15 |
Fri-A2: Learning Systems
1608, 962, 1188, 1317, 1021, 1979, 279 |
Fri-B2: Image/Video Proc.
1313, 1404, 1615, 1463, 480, 1402, 1996 |
Fri-C2: Intrusion Detection
1956, 1989, 209, 1967, 481, 1900, 1235 |
Fri-D2: Cryptography &Coding
1714, 285, 1544, 73, 1739, 2160, 152 |
Fri-E2: Applications (II)
1841, 75, 2148, 2067, 1820, 1081, 312 |
15:15 - 15:45 |
Tea / Coffee |
15:45 - 17:45 |
Fri-A3: Evolutionary Comp.
992, 1311, 1322, 660, 1845, 828, 2121, 838
|
Fri-B3: Pattern Recognition
1731, 477, 714, 800, 945,
1059, 1070, 1260 |
Fri-C3: Security Architecture
863, 1771, 1549, 873, 1195, 1240, 907 |
Fri-D3: Web&Net Applications
220, 953, 1108, 1159, 1168, 2102, 757, 490 |
Fri-E3: Bioinformatics Computing
1072, 2162, 612, 671, 760, 933, 1109, 661 |
18:00 - 20:00 |
Welcome Reception |
^ top
|
|
|
|
|
|
December 17, 2005 (Saturday) |
Time |
Sessions |
8:30 - 9:30 |
Keynote 2 |
9:30 - 10:30 |
Sat-A1: Learning Systems
1782, 366, 1112, 2118 |
Sat-B1: Info Retrieval
1592, 648, 1390, 667, 352 |
Sat-C1: Security Architecture
1187, 821, 381, 2093, |
Sat-D1: Cryptographic Protoc.
669, 1082, 831, 832 |
Sat-E1: Applications (I)
701, 2133, 2105, 506 |
10:30 - 10:50 |
Tea / Coffee |
13:50 - 12:05 |
Sat-A2: Evolutionary Comp.
629, 2150, 685, 694, 698
|
Sat-B2: Info Retrieval
1905, 941, 1540, 2059, 1834 |
Sat-C2: Security Management
999, 1014, 1552, 1338, 1846 |
Sat-D2: Web&Net Applications
850, 940, 1047, 1162, 1257 |
Sat-E2: Bioinformatics Computing
1076, 1107, 1848, 276 |
12:05 - 13:30 |
Lunch |
13:30 - 15:15 |
Sat-A3: SVMs
1515, 153, 1129, 1137, 1208,
1516, 846 |
Sat-B3: Image/Video Proc.
182, 91, 197, 108, 452,
109, 826 |
Sat-C3: Intrusion Detection
1372, 1982, 1155, 1198, 1675, 1776, 2066 |
Sat-D3: Watermarking & Info Hiding
103, 1929, 713, 731,
1918, 2064, 89 |
Sat-E3: Applications (II)
1575, 113, 2098, 2149, 1412, 2052, 1099 |
15:15 - 15:45 |
Tea / Coffee |
15:45 - 17:45 |
Sat-A4: SVMs
331, 1519, 896, 1221, 1178, 1233, 1259
|
Sat-B4: Image/Video Proc.
183, 265, 358, 437, 738,
739, 2080 |
Sat-C4: Security Architecture
724, 1087, 166, 1569, 706, 743, 844, |
Sat-D4: Agents
1487, 960, 1478, 2073, 1980, 119, 132, 330 |
Sat-E4: Applications (II)
1509, 1442, 2039, 1976, 2158, 154, 242 |
18:00 - 20:00 |
Conference Banquet |
^ top
|
|
|
|
|
|
December 18, 2005 (Sunday) |
Time |
Sessions |
8:30 - 9:30 |
Keynote 3 |
9:30 - 10:30 |
Sun-A1: SVMs
1328, 1467, 1655, 1788 |
Sun-B1: Data Mining
372, 788, 1712, 983, 1699 |
Sun-C1: Agents
357, 385, 893, 326 |
Sun-D1: Swarm intelligence
1190, 1269, 158, 345 |
Sun-E1: Applications (I)
1944, 336, 1906 |
10:30 - 10:50 |
Tea / Coffee |
13:50 - 12:05 |
Sun-A2: Evolutionary Comp.
1223, 1343, 1356, 2090, 2089
|
Sun-B2: Pattern Recognition
1719, 1738, 1766, 2062, 1770 |
Sun-C2: Security Management
487, 547, 818, 1284, 1506 |
Sun-D2: Cryptography &Coding
1355, 271, 301, 404, 2126 |
Sun-E2: Bioinformatics Computing
879, 1873, 1994, 1121, 1585 |
12:05 - 13:30 |
Lunch |
13:30 - 15:15 |
Sun-A3: Learning Systems
1474, 283, 769, 1541, 771, 468, 1611 |
Sun-B3: Image/Video Proc.
742, 894, 993, 1038, 1566, 1261, 1482 |
Sun-C3: Security Architecture
936, 1273, 1815, 1102 |
Sun-D3: Cryptographic Protoc.
857, 864, 892, 910, 1634
1639, 1950 |
Sun-E3: Applications (II)
1075, 2159, 2104, 789 |
15:15 - 15:45 |
Tea / Coffee |
15:45 - 17:45 |
Sun-A4: Data Mining
1604, 335, 417, 647, 825, 1011, 1501, 1935
|
Sun-B4: Image/Video Proc.
1959, 1687, 1741, 1812, 1857, 1880, 2048, 2056 |
Sun-C4: Agents
329, 1002, 1061, 1285, 1287, 1342, 1951, 1149 |
Sun-D4: Watermarking & Info Hiding
313, 1865, 583, 1535,
1512, 876, 682, 1915 |
Sun-E4: Swarm intelligence
323, 804, 523, 711, 1522,
1785 |
18:00 - |
Free Activities |
^ top
Remarks:
- By default overhead / LCD projectors are provided during the presentation.
- Each delegate has 15 minutes for paper presentation.
^ top
|
|
|
|
since June 15, 2005
|
© Copyright 2005. IEEE (HK) Computational Intelligence Chapter. All rights reserved.
Best viewer: IE 6.0 + or Firefox 1.0 +. Best resolution: 1024 × 768 pixels.
Contact: cis2005@xidian.edu.cn, cis05@comp.hkbu.edu.hk
|
|
|