Betreff: | MACIS 2013: 1st Call for Papers |
---|---|
Datum: | Sun, 11 Aug 2013 11:06:26 +0800 |
Von: | Chenqi Mou <chenqi_mou@ss.buaa.edu.cn> |
An: | gustaf.neumann@wu-wien.ac.at |
[Apologies if you receive multiple copies]
MACIS 2013 - Fifth International Conference on
Mathematical Aspects of Computer and Information Sciences
Nanning, China, December 11-13, 2013
http://www.mpi-inf.mpg.de/conference/macis2013/
CALL FOR PAPERS
MACIS is a series of conferences where foundational research on
theoretical and
practical problems of mathematics for computing and information
processing may
be presented and discussed. MACIS also addresses experimental
and case studies,
scientific and engineering computation, design and
implementation of algorithms
and software systems, and applications of mathematical methods
and tools to
outstanding and emerging problems in applied computer and
information sciences.
Each conference focuses on two or three themes.
The topics for MACIS 2013 fall into the following tracks:
- Constraints and Combinations
- Cryptography and Information Security
- Data Modeling and Analysis
See the end of this call for a detailed list of topics.
SUBMISSION
Potential participants of MACIS 2013 are invited to submit
extended abstracts
(3-4 pages) or full papers describing their work to be presented
at the
conference. The submitted extended abstracts and full papers
will be reviewed by
members of the Program Committee (PC) for soundness and
relevance to the
conference. Submission of original research papers is
encouraged, while
published material and work in progress will also be considered
for presentation
at the conference. Electronic submissions are strongly preferred
using
EasyChair:
http://www.easychair.org/conferences/?conf=macis2013
Accepted extended abstracts and full papers will be printed for
distribution at
the conference. Authors of the extended abstracts and full
papers accepted for
presentation at the conference will be invited to submit their
full and/or
revised papers for publication in special issues of Mathematics
in Computer
Science (MCS - http://www.cc4cm.org/mcs)
by Birkhaeuser/Springer after the
meeting. The submitted papers will be formally reviewed by PC
members and
external referees according to the refereeing procedure of MCS.
IMPORTANT DATES
Submission of papers/extended abstracts: October 1, 2013
Notification of acceptance or rejection: November 1, 2013
Conference taking place: December 11-13, 2013
GENERAL CHAIRS
Dongming Wang (University Pierre and Marie Curie - CNRS, France)
Jinzhao Wu (Guangxi University for Nationalities, China)
PROGRAM COMMITTEE CHAIR
Thomas Sturm (Max Planck Institute for Informatics, Germany)
TRACK CHAIRS
Pascal Fontaine (Inria and University of Lorraine, France)
Dieter Hutter (DFKI Bremen, Germany)
Mikhail Moshkov (King Abdullah University of Science and
Technology, Saudi Arabia)
Uwe Waldmann (Max Planck Institute for Informatics, Germany)
Xiangliang Zhang (King Abdullah University of Science and
Technology, Saudi Arabia)
LOCAL COMMITTEE CHAIR
Yongquan Zhou (Guangxi University for Nationalities, China)
PUBLICITY CHAIRS
Marek Kosta (Max Planck Institute for Informatics, Germany)
Chenqi Mou (Beihang University, China)
TOPICS OF INTEREST INCLUDE
- Constraints and Combinations (Track Chairs: Pascal Fontaine, Uwe Waldmann)
quantifier elimination and decision procedures; (global)
optimization;
differential equations; numeric, symbolic, interval and hybrid
solution
techniques; satisfiability modulo theories; combinations of
logics and deductive
engines; applications, especially in systems analysis and formal
verification
- Data Modeling and Analysis (Track Chairs: Mikhail Moshkov, Xiangliang Zhang)
knowledge discovery; data mining; pattern recognition; complex
knowledge
representation and management; foundations and theories for data
analysis
systems; big data storage, transfer, and processing
- Information Security and Cryptography (Track Chair: Dieter Hutter)
security models; formal methods for security; cryptographic
protocols;
compositional security; information flow; language-based
security; access
control; database security; anonymity and privacy