Home
Important News
What's New
Call for Papers
Topics
Important Dates
Committee
Tutorial Registration
Tutorial
Submission
Reviewer
Program
Registraton
Camera-Ready Instruction
Copyright Form
Workshop
Workshop Camera-Ready Instruction
Sponsor
Venue
Hotel
About Xi'an
Related Links
Contact Us
Program

Please select one of the following format (Revised on 13 December 2005):

Conference Timetable

December 15 (Thu) December 16 (Fri) December 17 (Sat) December 18 (Sun) December 19 (Mon)

December 15, 2005 (Thursday)
2005 Workshop Program - A Glance
Time Sessions
8:30 - 10:15

Thur-A1: IS

762, 966, 1258, 1176, 167, 1490, 2069

Thur-B1: APP

1468, 2044, 1635, 1808, 2123, 900, 1018

Tutorials
10:15 - 10:30 Tea / Coffee
10:30 - 12:00

Thur-A2: IS

2096, 1327, 1270,1581, 1295, 1470

Thur-B2: APP

1165, 1449, 296, 990, 1033, 1373

12:05 - 13:30 Lunch
13:30 - 15:30

Thur-A3: CI

1694, 513, 765, 1779, 1804, 1957,1004, 1232

Thur-B3: APP

1553, 348, 768, 1666, 692, 1685, 461

Tutorials

15:30 - 15:45 Tea / Coffee
15:45 - 18:00

Thur-A4: CI

1613, 68, 2086, 1933, 70, 2082, 1293, 2045, 2100

Thur-B4: APP

552, 122, 1591, 1954, 1656, 2113, 2134

18:00 - Free Activities

^ top


December 16, 2005 (Friday)
Time Sessions
8:30 - 9:00

Opening Address

8:00 - 10:00 Keynote 1
10:00 - 10:30 Tea / Coffee
9:30 - 12:15

Fri-A1: Learning Systems

1756, 1192, 690, 1555, 1007, 1627, 1640

Fri-B1: Pattern Recognition

434, 1308, 2128, 1946, 2161, 1440, 400

Fri-C1: Intrusion Detection

1383, 1241, 1744, 159, 2157, 307, 1354

Fri-D1: Cryptographic Protoc.

1757, 234, 650, 1990, 123, 1609, 869

Fri-E1: Bioinformatics Computing

1175, 1988, 674, 1237, 2083, 171, 1326

12:15 - 13:30

Lunch

13:30 - 15:15

Fri-A2: Learning Systems

1608, 962, 1188, 1317, 1021, 1979, 279

Fri-B2: Image/Video Proc.

1313, 1404, 1615, 1463, 480, 1402, 1996

Fri-C2: Intrusion Detection

1956, 1989, 209, 1967, 481, 1900, 1235

Fri-D2: Cryptography &Coding

1714, 285, 1544, 73, 1739, 2160, 152

Fri-E2: Applications (II)

1841, 75, 2148, 2067, 1820, 1081, 312

15:15 - 15:45 Tea / Coffee
15:45 - 17:45

Fri-A3: Evolutionary Comp.

992, 1311, 1322, 660, 1845, 828, 2121, 838


Fri-B3: Pattern Recognition

1731, 477, 714, 800, 945,
1059, 1070, 1260

Fri-C3: Security Architecture

863, 1771, 1549, 873, 1195, 1240, 907

Fri-D3: Web&Net Applications

220, 953, 1108, 1159, 1168, 2102, 757, 490

Fri-E3: Bioinformatics Computing

1072, 2162, 612, 671, 760, 933, 1109, 661

18:00 - 20:00 Welcome Reception

^ top

 


December 17, 2005 (Saturday)
Time Sessions
8:30 - 9:30 Keynote 2
9:30 - 10:30

Sat-A1: Learning Systems

1782, 366, 1112, 2118

Sat-B1: Info Retrieval

1592, 648, 1390, 667, 352

Sat-C1: Security Architecture

1187, 821, 381, 2093,

Sat-D1: Cryptographic Protoc.

669, 1082, 831, 832

Sat-E1: Applications (I)

701, 2133, 2105, 506

10:30 - 10:50 Tea / Coffee
13:50 - 12:05

Sat-A2: Evolutionary Comp.

629, 2150, 685, 694, 698


Sat-B2: Info Retrieval

1905, 941, 1540, 2059, 1834

Sat-C2: Security Management

999, 1014, 1552, 1338, 1846

Sat-D2: Web&Net Applications

850, 940, 1047, 1162, 1257

Sat-E2: Bioinformatics Computing

1076, 1107, 1848, 276

12:05 - 13:30

Lunch

13:30 - 15:15

Sat-A3: SVMs

1515, 153, 1129, 1137, 1208,
1516, 846

Sat-B3: Image/Video Proc.

182, 91, 197, 108, 452,
109, 826

Sat-C3: Intrusion Detection

1372, 1982, 1155, 1198, 1675, 1776, 2066

Sat-D3: Watermarking & Info Hiding

103, 1929, 713, 731,
1918, 2064, 89

Sat-E3: Applications (II)

1575, 113, 2098, 2149, 1412, 2052, 1099

15:15 - 15:45 Tea / Coffee
15:45 - 17:45

Sat-A4: SVMs

331, 1519, 896, 1221, 1178, 1233, 1259


Sat-B4: Image/Video Proc.

183, 265, 358, 437, 738,
739, 2080

Sat-C4: Security Architecture

724, 1087, 166, 1569, 706, 743, 844,

Sat-D4: Agents

1487, 960, 1478, 2073, 1980, 119, 132, 330

Sat-E4: Applications (II)

1509, 1442, 2039, 1976, 2158, 154, 242

18:00 - 20:00 Conference Banquet

^ top


December 18, 2005 (Sunday)
Time Sessions
8:30 - 9:30 Keynote 3
9:30 - 10:30

Sun-A1: SVMs

1328, 1467, 1655, 1788

Sun-B1: Data Mining

372, 788, 1712, 983, 1699

Sun-C1: Agents

357, 385, 893, 326

Sun-D1: Swarm intelligence

1190, 1269, 158, 345

Sun-E1: Applications (I)

1944, 336, 1906

10:30 - 10:50 Tea / Coffee
13:50 - 12:05

Sun-A2: Evolutionary Comp.

1223, 1343, 1356, 2090, 2089


Sun-B2: Pattern Recognition

1719, 1738, 1766, 2062, 1770

Sun-C2: Security Management

487, 547, 818, 1284, 1506

Sun-D2: Cryptography &Coding

1355, 271, 301, 404, 2126

Sun-E2: Bioinformatics Computing

879, 1873, 1994, 1121, 1585

12:05 - 13:30

Lunch

13:30 - 15:15

Sun-A3: Learning Systems

1474, 283, 769, 1541, 771, 468, 1611

Sun-B3: Image/Video Proc.

742, 894, 993, 1038, 1566, 1261, 1482

Sun-C3: Security Architecture

936, 1273, 1815, 1102

Sun-D3: Cryptographic Protoc.

857, 864, 892, 910, 1634
1639, 1950

Sun-E3: Applications (II)

1075, 2159, 2104, 789

15:15 - 15:45 Tea / Coffee
15:45 - 17:45

Sun-A4: Data Mining

1604, 335, 417, 647, 825, 1011, 1501, 1935


Sun-B4: Image/Video Proc.

1959, 1687, 1741, 1812, 1857, 1880, 2048, 2056

Sun-C4: Agents

329, 1002, 1061, 1285, 1287, 1342, 1951, 1149

Sun-D4: Watermarking & Info Hiding

313, 1865, 583, 1535,
1512, 876, 682, 1915

Sun-E4: Swarm intelligence

323, 804, 523, 711, 1522,
1785

18:00 - Free Activities

^ top

Remarks:
  • By default overhead / LCD projectors are provided during the presentation.
  • Each delegate has 15 minutes for paper presentation.


^ top

Xidian University GuangDong University of Technology (GDUT) IEEE (Hong Kong) Computational Intelligence Chapter Hong Kong Baptist University (HKBU) CIS-05 Home Contact Us

since June 15, 2005
© Copyright 2005. IEEE (HK) Computational Intelligence Chapter. All rights reserved.
Best viewer: IE 6.0 + or Firefox 1.0 +. Best resolution: 1024 × 768 pixels.
Contact: cis2005@xidian.edu.cn, cis05@comp.hkbu.edu.hk