This is the second call for participation for the TCS 2012 conference in Amsterdam. You can register for the event at:
http://tcs.project.cwi.nl/Registration ===== General Info ===== The 7th IFIP Conference on Theoretical Computer Science 2012 September 26 - 28, Amsterdam, The Netherlands The conference Theoretical Computer Science, which is held every two years, either in conjunction with or in the framework of the IFIP World Computing Congress, is the meeting place of the TC1 community where new results of computation theory are presented and more broadly experts in theoretical computer science meet to share insights and ask questions about the future directions of the field. TCS Website: http://tcs.project.cwi.nl TCS 2012 is associated with The Alan Turing Year 2012 (http://www.mathcomp.leeds.ac.uk/turing2012). Previous conferences of this series were held in Sendai (2000), Montreal (2002), Toulouse (2004), Santiago (2006), Milano (2008), Brisbane (2010). ===== Venue ===== TCS 2012 will be held at the Centrum Wiskunde & Informatica (CWI), Amsterdam (http://www.cwi.nl), The Netherlands. ===== Invited Speakers ===== Rajeev Alur Yuri Gurevich Jiri Wiedermann ===== Program ===== A detailed program may be found at: http://tcs.project.cwi.nl/Program ===== Organisation ===== General chair: Jos Baeten (http://www.cwi.nl/people/630) PC co-chairs: Tom Ball (http://research.microsoft.com/en-us/people/tball/) and Frank de Boer (http://homepages.cwi.nl/~frb/) PC committee: Ahmed Bouajjani Ana Cavalcanti Peter Grünwald Joseph Kiniry Peter Mueller David Naumann Susanne Graf Juraj Hromkovic Martin Kutrib Aart Middeldorp Jan Juerjens Ugo Montanari Catuscia Palamidessi Jeff Shallit Jan Rutten Davide Sangiorgi Igor Walukiewicz Jim Woodcock Leen Torenvliet Local Organization: Susanne van Dam Michiel Helvensteijn Hans Hidskes Joost Winter -- Michiel Helvensteijn ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ hol-info mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/hol-info
