2013 International Summer School on
Trends in Computing
Tarragona, Spain, July 22-26, 2013
Rovira i Virgili University
NEXT REGISTRATION DEADLINE: May 26
will be an open forum for the convergence of top class well recognized computer scientists and people at the beginning of their research career (typically PhD students) as well as consolidated researchers.
SSTiC 2013 will cover the whole spectrum of computer science by means of 63 six-hour courses dealing with diverse topics at the frontiers of the field.
By actively participating, lecturers and attendees will share the idea of scientific excellence as the main motto of their research work.
Graduate students from around the world. There are no pre-requisites in terms of the academic degree the attendee must hold. However,
since there will be several levels among the courses, in the description of some of them
reference may be made to specific background knowledge.
SSTiC 2013 is appropriate also for people more advanced in their career who want to keep themselves updated on developments in the field.
Finally, senior researchers will find it fruitful
to listen and discuss with people who are main references of the diverse branches
of computing nowadays.
7 parallel sessions will be held during the whole event. Participants will be able to freely choose the courses they will be willing to attend as well as to move from one to another.
Palau Firal i de Congressos de Tarragona
Arquitecte Rovira, 2
Professors and courses
- Divyakant Agrawal, Santa Barbara, [intermediate] Scalable Data Management in Enterprise and Cloud Computing Infrastructures
- Shun-ichi Amari, Riken, [introductory] Information Geometry and Its Applications
- James Anderson, Chapel Hill, [intermediate] Scheduling and Synchronization in Real-Time Multicore Systems
- Pierre Baldi, Irvine, [intermediate] Big Data Informatics Challenges and Opportunities in the Life Sciences
- Yoshua Bengio, Montréal, [introductory/intermediate] Deep Learning of Representations
- Stephen Brewster, Glasgow, [advanced] Multimodal Human-Computer Interaction
- Bruno Buchberger, Linz, [introductory] Groebner Bases: An Algorithmic Method for Multivariate Polynomial Systems. Foundations and Applications
- Rajkumar Buyya, Melbourne, [intermediate] Cloud Computing
- Jan Camenisch, IBM Zurich, [intermediate] Cryptography for Privacy
- Jeffrey S. Chase, Duke, [intermediate] Trust Logic as an Enabler for Secure Federated Systems
- Larry S. Davis, College Park, [intermediate] Video Analysis of Human Activities
- Paul De Bra, Eindhoven, [intermediate] Adaptive Systems
- Marco Dorigo, Brussels, [introductory] An Introduction to Swarm Intelligence and Swarm Robotics
- Paul Dourish, Irvine, [introductory] Ubiquitous Computing in a Social Context
- Max J. Egenhofer, Maine, [introductory/intermediate] Qualitative Spatial Relations: Formalizations and Inferences
- Richard M. Fujimoto, Georgia Tech, [introductory] Parallel and Distributed Simulation
- David Garlan, Carnegie Mellon, [advanced] Software Architecture: Past, Present and Future
- Mario Gerla, Los Angeles, [intermediate] Vehicle Cloud Computing
- Georgios B. Giannakis, Minnesota, [advanced] Sparsity and Low Rank for Robust Data Analytics and Networking
- Ralph Grishman, New York, [intermediate] Information Extraction from Natural Language
- Francisco Herrera, Granada, [intermediate] Imbalanced Classification: Current Approaches and Open Problems
- Paul Hudak, Yale, [introductory] Euterpea: From Signals to Symphonies Using Haskell
- Niraj K. Jha, Princeton, [intermediate] FinFET Circuit Design
- George Karypis, Minnesota, [introductory] Introduction to Parallel Computing: Architectures, Algorithms, and Programming
- Aggelos K. Katsaggelos, Northwestern, [intermediate/advanced] Sparsity-based Advances in Image Processing
- Arie E. Kaufman, Stony Brook, [advanced] Advances in Visualization
- Carl Kesselman, Southern California, [intermediate] Biomedical Informatics and Big Data
- Hugo Krawczyk, IBM Research, [intermediate] An Introduction to the Design and Analysis of Authenticated Key Exchange Protocols
- Pierre L'Ecuyer, Montréal, [intermediate] Quasi-Monte Carlo Methods in Simulation: Theory and Practice
- Laks V. S. Lakshmanan, British Columbia, [intermediate/advanced] Information and Influence Spread in Social Networks
- Wenke Lee, Georgia Tech, [introductory] DNS-based Monitoring of Malware Activities
- Maurizio Lenzerini, Roma La Sapienza, [intermediate] Ontology-based Data Integration
- Ming C. Lin, Chapel Hill, [introductory/intermediate] Physically-based Modeling and Simulation
- Jane W.S. Liu, Academia Sinica, [intermediate] Critical Information and Communication Technologies for Disaster Preparedness and Response
- Satoru Miyano, Tokyo, [intermediate] How to Hack Cancer Systems with Computational Methods
- Aloysius K. Mok, Austin, [introductory/advanced] From Real-time Systems to Cyber-physical Systems
- Hermann Ney, Aachen, [intermediate/advanced] Probabilistic Modelling for Natural Language Processing - with Applications to Speech Recognition, Handwriting Recognition and Machine Translation
- Cathleen A. Norris, North Texas and Elliot Soloway, Ann Arbor, [introductory] Primary & Secondary Educational Computing in the Age of Mobilism
- Jeff Offutt, George Mason, [intermediate] Cutting Edge Research in Engineering of Web Applications
- David Padua, Urbana, [intermediate] Parallel Programming with Abstractions
- Bijan Parsia, Manchester, [introductory] The Semantic Web: Conceptual and Technical Foundations
- Massoud Pedram, Southern California, [intermediate] Energy Efficient Architectures and Information Processing Systems
- Charles E. Perkins, FutureWei, [intermediate/advanced] Beyond 4G
- Prabhakar Raghavan, Google, [introductory/intermediate] Web Search and Advertising
- Sudhakar M. Reddy, Iowa, [introductory] Design for Test and Test of Digital VLSI Circuits
- Phillip Rogaway, Davis, [introductory/intermediate] Provably Secure Symmetric Encryption
- Gustavo Rossi, La Plata, [intermediate] Topics in Model Driven Web Engineering
- Kaushik Roy, Purdue, [introductory/intermediate] Low-energy Computing
- Robert Sargent, Syracuse, [introductory] Validating Models
- Douglas C. Schmidt, Vanderbilt, [intermediate] Patterns and Frameworks for Concurrent and Networked Software
- Bart Selman, Cornell, [intermediate] Fast Large-scale Probabilistic and Logical Inference Methods
- Mubarak Shah, Central Florida, [intermediate/advanced] Visual Crowd Surveillance
- Ron Shamir, Tel Aviv, [introductory] Revealing Structure in Disease Regulation and Networks
- Satinder Singh, Ann Arbor, [introductory/advanced] Reinforcement Learning: On Machines Learning to Act from Experience
- Dawn Xiaodong Song, Berkeley, [introductory] Selected Topics in Computer Security
- Mike Thelwall, Wolverhampton, [introductory] Sentiment Strength Detection for the Social Web
- Julita Vassileva, Saskatchewan, [introductory/intermediate] Engaging Users in Social Computing Systems
- Philip Wadler, Edinburgh, [introductory] Topics in Lambda Calculus and Life
- Gio Wiederhold, Stanford, [introductory] Software Economics: How Do the Results of the Intellectual Efforts Enter the Global Market Place
- Limsoon Wong, National Singapore, [introductory/intermediate] The Use of Context in Gene Expression and Proteomic Profile Analysis
- Michael Wooldridge, Oxford, [introductory] Autonomous Agents and Multi-Agent Systems
- Ronald R. Yager, Iona, [introductory/intermediate] Fuzzy Sets and Soft Computing
- Philip S. Yu, Illinois Chicago, [advanced] Mining Big Data
The registration form can be found here.
Since the capacity of the venue is limited, registration requests will be processed on a first come first served basis. The registration period will be closed when the capacity of the venue will be complete.
Information about accommodation will be available on the website of the School.
Participants will be delivered a certificate of attendance.
Announcement of the programme: January 26, 2013
Six registration deadlines: February 26, March 26, April 26, May 26, June 26, July 26, 2013
Questions and further information
See contact information on the right-hand side of the page.
A list with other events on Training in Computer Science, Information Theory, and Foundations of Computer Science is available here. (COMS)