1 INSTYTUT PODSTAW INFORMATYKI PAN OR INSTITUTE OF COMPUTER SCIENCE, POLISH ACAD. SCI. (56 scientists, including 49 Ph.D.’s) IN THE FOLLOWING AREAS: OFFER.

Slides:



Advertisements
Similar presentations
Research conducted by the Chair of Information Systems PJIIT Leader: Prof. Kazimierz Subieta Staff: 11 research and didactic workers (1 Prof, 4 PhD, 6.
Advertisements

Chapter 1 Business Driven Technology
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
TECHNOLOGY GUIDE 4: Intelligent Systems
PhD education at Swedish Universities Jonas Neander.
Department of Mathematics and Computer Science
1. Abstract 2 Introduction Related Work Conclusion References.
Department of Electronic Engineering City University of Hong Kong BEng (Hons) in Information Engineering 資訊工程學榮譽工學士 BEng (Hons) in Information Engineering.
Chapter 3 Database Management
1 SWE Introduction to Software Engineering Lecture 22 – Architectural Design (Chapter 13)
Breadth-Last Technical Electives: Integrating the CS Core via Computer Games and Mobile Robotics William W. White Southern Illinois University Edwardsville.
Intelligent Agent Systems. Artificial Intelligence Systems that think like humans Systems that think rationally Systems that act like humans Systems that.
Welcome to Computer Science Open House, November 3, 2002 Presentation by Dr. Boleslaw Mikolajczak Chairperson Computer.
Society of Hispanic Professional Engineers. College of Engineering.
PRESENTATION START.
9/30/2004TCSS588A Isabelle Bichindaritz1 Introduction to Bioinformatics.
Data Mining. 2 Models Created by Data Mining Linear Equations Rules Clusters Graphs Tree Structures Recurrent Patterns.
Introduction to Computer and Programming CS-101 Lecture 6 By : Lecturer : Omer Salih Dawood Department of Computer Science College of Arts and Science.
Formal Empirical Applied Mathematical and technical methods and theories Cognitive, behavioral, and organizational techniques and theories ImagingBioInformaticsClinical.
Research in Computing Discipline Prabhas Chongstitvatana.
C OMPUTER S CIENCE, C OMPUTER E NGINEERING, I NFORMATION T ECHNOLOGY AND S YSTEMS, F LOW OF C ONTROL, B ATCH AND I NTERACTIVE P ROCESSING Week 5 Mr. Mohammed.
Research at Department of Computer and Systems Sciences – DSV.
How Can Engineering Take Data Sciences from Ideas to Action
GENERAL BANK MANAGEMENT Technology Management
Research and Projects Name: Aloysius. A. EDOH Name: Alo Address: Ext 3344.
If you are using an Apple device, such as an iPad or iPhone, and you want to follow the instructions you will need a ‘Flash’ compatible browser. If you.
HCIMA Unit 3 The Internet Revolution and Electronic Tools Next slide.
College of Business Administration California State University, Long Beach Preview Day Saturday, May 4, 2013 Information Systems Presented by C. Sophie.
Structure of Study Programmes
Information Systems Basic Core Specialization Clinical Imaging BioInformatics Public Health Computer Science Methods (formal models) Biomedical Decision.
Software Engineering ‘The establishment and use of sound engineering principles (methods) in order to obtain economically software that is reliable and.
Succeeding with Technology – 3 rd Edition What is a Computer? Part 1 The Power of Connections What Can Computers Do? Part 2 Information Systems Using Digital.
Web-based E-commerce Architecture
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
Structure of Study Programmes Bachelor of Computer Science Bachelor of Information Technology Master of Computer Science Master of Information Technology.
Cyber Security & Fraud – The impact on small businesses.
Framework for the Development and Testing of Dependable and Safety-Critical Systems IKTA 065/ Supported by the Information and Communication.
 Day 59 Computer Science and Industry Exploring The Intersection Between CS and Other Fields.
An Introduction to Software Engineering. Communication Systems.
Cryptography and Network Security (CS435) Part One (Introduction)
Summary of Distributed Computing Security Yifeng Zou Georgia State University
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
ABSTRACT The JDBC (Java Database Connectivity) API is the industry standard for database- independent connectivity between the Java programming language.
Fueloil Information Systems Standards and and Evaluation methods Prof. Dr. Mohamed Elazab
WEB MINING. In recent years the growth of the World Wide Web exceeded all expectations. Today there are several billions of HTML documents, pictures and.
CSE 102 Introduction to Computer Engineering What is Computer Engineering?
Master’s Degree in Computer Science. Why? Acquire Credentials Learn Skills –Existing software: Unix, languages,... –General software development techniques.
Computer Science in Context Evangelos E. Milios Professor and Graduate Coordinator Faculty of Computer Science Dalhousie University.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Internet of Things in Industries
New Curricula Proposal at FSMN by Miroslav Ćirić & Predrag Krtolica.
A New Generation of Artificial Neural Networks.  Support Vector Machines (SVM) appeared in the early nineties in the COLT92 ACM Conference.  SVM have.
Chapter 9 : Application Areas. 2 Some Advance Application Areas of Computers  Software Development  Artificial Intelligence  Robotics  Industrial.
Electronic Banking & Security Electronic Banking & Security.
Project Outline I A New CRM database must accomplish the following:  Deliver support resources for internal IT  Integrate all data from existing CRM.
Network traffic based computer system user identification Dr Zsolt Illési associate professor College of Dunaújváros Open Source Intelligence.
1.Computer Fundamentals Parallel and distributed computing, from algorithms, languages, compilers, architectures to systems. 2.Information Systems Software.
Sub-fields of computer science. Sub-fields of computer science.
Analysis of Computing Options at ISU
Computer Science Courses
Should we have specialisations at all?
What contribution can automated reasoning make to e-Science?
Future Technologies FTC 2016 Future Technologies Conference December 2016 San Francisco, United States.
New Simulation Specializations for AS and BS Degrees
کتابهای تازه خریداری شده دروس عمومی 1397
Welcome! Knowledge Discovery and Data Mining
Computer Science Courses in the Major
The Curriculum of the Department of Informatics TEI-A
Presentation transcript:

1 INSTYTUT PODSTAW INFORMATYKI PAN OR INSTITUTE OF COMPUTER SCIENCE, POLISH ACAD. SCI. (56 scientists, including 49 Ph.D.’s) IN THE FOLLOWING AREAS: OFFER OF PARTNERSHIP FROM Presenting: J. Koronacki,

2  IMPORTANT FOR: Recommender systems, automated knowledge generation from large databases for health, service and industrial sectors, e-commerce, e-banking, CRM, knowledge engineering, fraud detection, credit risk assessment.  NOVEL SOLUTIONS: New technologies for large Bayesian networks, artificial immune systems and statistical data analysis, with proprietary softwares implemented.  Contact person: Slawomir Wierzchon, IPI PAN, AREA :INTELLIGENT NAVIGATION, DATA/TEXT MINING

3  IMPORTANT FOR: Security and performance issues in mobile and computer network environment, private and public key cryptography and safety of banking operations via Internet, fraud detection in mobile communication.  NOVEL SOLUTIONS: New implementations of evolutionary algorithms and neural networks, cellular automata and artificial immune systems.  Contact person: Franciszek Seredynski, IPI PAN, AREA :INTRUSION DETECTION, SECURITY

4  IMPORTANT FOR: Distributed databases and their communication protocols via user friendly interfaces to existing databases facilitating their integration, data transfer and uniform querying.  NOVEL SOLUTIONS: Stack-based approach to query language and programming language integration within object-oriented environment.  Contact person: Kazimierz Subieta, IPI PAN, AREA : DATA BASES APPLICATIONS

5  IMPORTANT FOR: E-commerce and e-banking, WEB secure applications, safe data trasfer and communication protocols, remote systems user identification, safe access to distributed databases.  NOVEL SOLUTIONS: Efficient model checking of specifications. In particular, given in: TCTL, CTL, CTL+K via translation to SAT-solvers.  Contact person: Wojciech Penczek, IPI PAN, AREA : CORRECTNESS OF SAFETY-CRITICAL SYSTEMS

6  WEB SERVICES, RECONFIGURABLE MULTIAGENT SYSTEMS z SOFTWARE DEVELOPMENT z COMMUNICATION, COMPUTING AND SOFTWARE TECHNOLOGIES z SOFTWARE SPECIFICATION AND VALIDATION z LANGUAGE TECHNOLOGY z DECISION PROCESSES, MATHEMATICAL AND GAME- THEORETIC TECHNIQUES INSTITUTE’S WEBSITE: AND IN THE FOLLOWING AREAS (for more info please see our booklet):