Öйú¼ÆËã»úѧ»áÇàÄê¼ÆËã»ú¿Æ¼¼ÂÛ̳
CCF Young Computer Scientists&Engineers Forum
CCF YOCSEFÉîÛÚ
ʱ¼ä£º2017Äê5ÔÂ19ÈÕ£¨ÐÇÆÚÎ壩ÏÂÎç 14:20-17:00
µØµã£ºÌÚѶ´óÏà ¶à¹¦Äܱ¨¸æÌü£¨ÉîÛÚÊÐÄÏÉ½ÇøÉîÄÏ´óµÀ10000ºÅ£©
Ö÷Ìâ
IEEEº£Íâר¼ÒѧÊõ±¨¸æ»á
Ö÷°ìµ¥Î»
CCFYOCSEFÉîÛÚ·ÖÂÛ̳
ÌÚѶ¿Æ¼¼£¨ÉîÛÚ£©ÓÐÏÞ¹«Ë¾
Ö´ÐÐÖ÷ϯ
ÕÅ ÁúCCF YOCSEFÉîÛÚACίԱ
À× ¿ CCF YOCSEFÉîÛÚºòÈÎÖ÷ϯ
Áõ Á¢CCF YOCSEFÉîÛÚºòÈÎѧÊõÃØÊé
µçÆøºÍµç×Ó¹¤³Ìʦлá( IEEE£¬È«³ÆÊÇInstitute of Electrical and Electronics Engineers)ÊÇÒ»¸ö¹ú¼ÊÐԵĵç×Ó¼¼ÊõÓëÐÅÏ¢¿ÆÑ§¹¤³ÌʦµÄлᣬÊÇĿǰȫÇò×î´óµÄ·ÇÓªÀûÐÔרҵ¼¼Êõѧ»á£¬Æä»áÔ±ÈËÊý³¬¹ý40ÍòÈË£¬±é²¼160¶à¸ö¹ú¼Ò¡£IEEEÖÂÁ¦ÓÚµçÆø¡¢µç×Ó¡¢¼ÆËã»ú¹¤³ÌºÍÓë¿ÆÑ§ÓйصÄÁìÓòµÄ¿ª·¢ºÍÑо¿£¬ÔÚÌ«¿Õ¡¢¼ÆËã»ú¡¢µçÐÅ¡¢ÉúÎïҽѧ¡¢µçÁ¦¼°Ïû·ÑÐÔµç×Ó²úÆ·µÈÁìÓòÒÑÖÆ¶¨ÁË900¶à¸öÐÐÒµ±ê×¼£¬ÏÖÒÑ·¢Õ¹³ÉΪ¾ßÓнϴóÓ°ÏìÁ¦µÄ¹ú¼ÊѧÊõ×éÖ¯¡£
±¾ÆÚѧÊõ±¨¸æ¾Ù°ì“IEEEº£Íâר¼ÒѧÊõ±¨¸æ»á”ר³¡£¬ÓÉCCF YOCSEFÉîÛÚÓëÌÚѶ¹²Í¬¾Ù°ì£¬ÌرðÑûÇëµ½IEEEÊ×ϯִÐй٠E. James Prendergast²©Ê¿¡¢IEEE Fellow Jen-Yao Chung ²©Ê¿¡¢ÃÀ¹úÂíÀïÀ¼´óѧV.S. Subrahmanian½ÌÊÚΪ´ó¼Ò´øÀ´¾«²Ê±¨¸æ¡£ÎÒÃdzÏÑûÄúµÄ²ÎÓ룬½ü¾àÀëÓëÖªÃûѧÕß½»Á÷»¥¶¯¡£
³ÌÐò
14:20 Ç©µ½
14:30-15:00 IEEE Overview
ÌØÑû¼Î±ö£ºE. James (Jim) Prendergast ²©Ê¿IEEEÊ×ϯִÐйÙ
15:00-16:00 ±¨¸æÌâÄ¿£ºLinking Technology to Services: Process to Identify Innovation and Cloud Services
ÌØÑû¼Î±ö£ºJen-Yao Chung ²©Ê¿ IEEE Fellow
16:00-17:00 ±¨¸æÌâÄ¿£º Identifying Malicious Actors in Online Platforms
ÌØÑû¼Î±ö£ºV.S. Subrahmanian ½ÌÊÚÃÀ¹úÂíÀïÀ¼´óѧ½ÌÊÚ
17:00 »î¶¯½áÊø
¡¾¼Î±öÓë½²×ùÐÅÏ¢¡¿
Ñݽ²ÌâÄ¿£ºIEEE Overview
E. James (Jim) Prendergast ²©Ê¿
IEEEÊ×ϯִÐйÙ,ÔÚ¼ÓÈëIEEE֮ǰ£¬JimÈÎÖ°ÓÚÓµÓÐ40ÒÚÃÀÔª×ʲúµÄÈ«ÇòÐÔÆóÒµ¶Å°îµç×ÓºÍͨѶ¼¼ÊõÓÐÏÞ¹«Ë¾£¬²¢µ£Èι«Ë¾¸±×ܲúÍÊ×ϯ¼¼Êõ¹Ù¡£Ëû¹ã²©µÄ¼¼Êõ±³¾°¼ÓËÙÁ˶ŰîÇ¿´óµÄÎïÁ¦ºÍ¼¼ÊõʵÁ¦ÔÚµç×ÓºÍͨѶÁìÓòµÈ¸ß¿Æ¼¼Êг¡µÄ·¢Õ¹¡£ÔÚÕâÒ»·½Ã棬Ëûµ£Èι«Ë¾Ñз¢Ö°ÄܵÄÁìµ¼Õߣ¬Ðµ÷³¤ÆÚÓ¦ÓÃÑо¿³É¹ûÔÚ¹«Ë¾Ñз¢ÖÐÐŤ×÷ÖеÄ×÷Ó㬲¢Ò»Ö±Îª·¢Õ¹Ñ°ÕÒÐÂµÄÆõ»ú¡£°éËæ×ÅÑз¢¹¤×÷µÄ½øÐУ¬ÐµÄÒµÎñÁìÓò²»¶Ï²úÉú£¬Æ½°åÏÔʾÆ÷¡¢PV¡¢È¼ÁÏµç³ØºÍ¹âµç×ÓµÈвúÆ·µÄÑз¢¶¼ÔÚJimµÄÖ¸µ¼ÏÂÓÐÌõ²»ÎɵĽøÐС£2003Äê2Ô£¬Ëûµ±Ñ¡Îª¶Å°îDPMI¶Ê»á³ÉÔ±£¬²¢Í¨¹ý2005Äê4ÔÂDPMI±»Toppan³É¹¦ÊÕ¹º¶øµÃµ½Á¬ÈΡ£
´Ëǰ£¬Jim»¹ÔøÈÎĦÍÐÂÞÀÎïÀí¿ÆÑ§Ñо¿ÊµÑéÊÒ¸±Ö÷ϯºÍÖ÷¹Ü¡£ÈÎÖ°ÆÚ¼ä£¬ËûÖ÷ÒªÕë¶ÔδÀ´¼¯³Éϵͳ£¨ÄÚ´æ¡¢°ëµ¼Ìå²ÄÁÏ¡¢ÄÉÃ׽ṹºÍÁ¿×ÓÆ÷¼þµÈ£©£¬ÄÜÔ´£¨Èȵ硢ȼÁÏµç³ØµÈ£©£¬ÊµÑéÊÒоƬ(΢Á÷Ìå¼¼Êõ¡¢DNA·ÖÎöµÈ)£¬ÒÔ¼°¸÷ÖÖ´´ÐÂÑÜÉúÁìÓò½øÐг¤ÆÚÑо¿¡£Í¬Ê±£¬»¹É漰ĦÍÐÂÞÀ°ëµ¼Ìå²úÆ·²¿£¨ÏÖ¸üÃûΪ·É˼¿¨¶û°ëµ¼Ì岿£©µÄһЩÆäËûÁìÓò£¬°üÀ¨Ö¸µ¼ÎÞÏßÑз¢ÊµÑéÊÒ£¬Á쵼΢¿ØÖÆÆ÷ºÍ»ìºÏģʽ¼¼ÊõÖÐÐÄ£¬²¢µ£ÈÎÊ×ϯ¼¼Êõר¼ÒºÍÕ½ÂÔÖ÷¹Ü¡£ÔÚJim»ñµÃ²©Ê¿Ñ§Î»ºó£¬Ëû´ÓʵĵÚÒ»·Ý¹¤×÷ÊÇÔÚAT&T ±´¶ûʵÑéÊÒÖ÷³Ö188ÌåÓýͶע£º¹èºÍÉé»¯ïØ¼¼Êõ´¦ÀíºÍÆ÷¼þ½¨Ä£¹¤¾ßµÄ¿ª·¢¡¢ÊäÈë¡¢°²×°ÒÔ¼°Ö§³Ö¡£³ÉΪIEEE¸ß¼¶»áÔ±µÄJim´Ó°Ä´óÀûÑÇϤÄá´óѧ»ñµÃÁËÀíѧѧʿºÍµçÆø¹¤³Ìѧʿ˫ѧλ¡£ºóÓÖ»ñµÃÁ˽£ÇÅ´óѧµÄµçÆø¹¤³Ì²©Ê¿Ñ§Î»¡£
Ñݽ²ÌâÄ¿£ºLinking Technology to Services: Process to Identify Innovation and Cloud Services
ʲôÊÇ´´Ð£¿´´Ð²¢²»µ¥Ö¸·¢Ã÷È«ÐµĶ«Î÷¡£´´Ð³£·¢ÉúÔÚ¶´²ìÓë·¢ÏֵĽ»²æµã£¬ÈÚºÏÁ˽â¾öÎÊÌâµÄз½·¨¡¢ÐÂ˼·¡£ÎÒÃÇÕýÔÚÃæÁÙÈí¼þÓëϵͳ·¢Õ¹Ð·¶Ê½µÄʱ´ú¡£´´ÐÂÐԵĽâ¾ö·½°¸²»½ö½öÊǽâ¾öÿ¸öÓû§ÐµÄÐèÇóÓëÎÊÌ⣬¸üÖØÒªµÄÊÇÈçºÎͨ¹ý¿É¸´Óá¢Ä£¿é»¯µÄ·½Ê½´î½¨ÐµÄÉÌÒµ·þÎñ¡£ÔÚ´ó¶àÊý·¢´ï¹ú¼Ò£¬·þÎñÒµÕ¼ÀͶ¯Á¦µÄ50£¥ÒÔÉÏ£¬Ö÷Òª¹¤Òµ»¯¹ú¼ÒÕ¼75£¥×óÓÒ¡£Í¨¹ý½«ITÓ벻ͬµÄÁìÓò֪ʶÈںϣ¬ÈçºÎ´ÓÏÖÓÐÒµÎñ·þÎñÖÐÈ¥´´ÔìеļÛÖµ£¬¶ÔÍÆ¶¯¾¼Ã·¢Õ¹Æðµ½¹Ø¼üÐÔ×÷Óá£ÌرðÊÇͨ¹ýÔÆ¼ÆËãµÄ·½Ê½£¬ÔÚ¹«¹²ºÍ˽ÓеĹ²ÏíÍøÂçÖд«µÝ·þÎñ£¬Óû§Ö»ÐèÒª¹ØÐÄ·þÎñ±¾Éí£¬¶ø²»±Øµ£ÐľßÌåʵʩºÍ»ù´¡¼Ü¹¹µÄ´î½¨¡£²»¶Ï±ä»¯µÄÉÌÒµ»·¾³ÐèÒª¿ìËÙµü´úеÄÉÌҵģʽºÍеĽâ¾ö·½°¸¡£±¾´Î·ÖÏíÖн«»á·ÖÏí¶ÔÓÚ´´ÐÂÒòËØµÄһЩ¶´²ì£¬ÒÔ¼°ÆäÖеľÑé½Ìѵ¡£Í¬Ê±½éÉÜÈçºÎ½«·þÎñ´ÓÌØÊâ×ö·¨×ª±äΪ¸ü¾ß´´ÐÂÐÔºÍϵͳÐÔµÄѧ¿Æ£¬½éÉÜ»ùÓÚÔÆµÄ·þÎñ¹¹½¨¡£»¹½«¶ÔÔÆ¼ÆËãÒµÎñµÄδÀ´Ç÷ÊÆ£¬Ñо¿·½ÏòºÍÑо¿¿ÎÌâ·ÖÏíһЩչÍû¡£
ÖÓ½¡Ò¢²©Ê¿
IEEEԺʿ£¬ACM½Ü³ö¹¤³Ìʦ¡£Quanta Cloud Technology Associate VP¡¢×ÊѶ¹¤Òµ²ß½ø»áÔÆ¶ËϵͳÈíÌåÑо¿Ëù×ÊÉîÑз¢×ܼࡢIBMÃÀ¹úWatsonÑо¿ÖÐÐĸ߼¶Ñо¿Ô±£¬Öйúµç×ÓÉÌÎñлá¸ß¼¶×¨¼Ò£¬Õã½´óѧµç×Ó·þÎñÑо¿ÖÐÐÄ¿Í×ù¸ß¼¶Ñо¿Ô±¡£ÃÀ‡øÒÁÀûÖZ´óŒW¶ò±¾ÄÇÏ㙉·ÖУ¼ÆËã»ú¿ÆÑ§²©Ê¿¡£ IEEE¼ÆËã»úѧ»áµç×ÓÉÌÎñ¼¼ÊõίԱ»áµÄ¹²Í¬´´Ê¼È˺ÍÁªºÏÖ÷ϯ¡£ÃæÏò·þÎñµÄ¼ÆËã¼°Ó¦ÓÃ(SOCA)¹ú¼ÊÔÓÖ¾µÄ¹²Í¬´´Ê¼È˺ÍÁªºÏÖ÷±à£¬ÓÉSpringer³ö°æEI&ESCI¼ìË÷¡£Ôøµ£Èιý10¶à¸ö¹ú¼ÊѧÊõÆÚ¿¯µÄ±à¼Î¯Ô±»á³ÉÔ±¡£ÔÚ¹ú¼Ê»áÒéºÍѧÊõ¿¯ÎïÉÏ·¢±íÁË180ÓàÆªÑ§ÊõÂÛÎÄ¡£´´Á¢IEEE¹ú¼Êµç×ÓÉÌÎñ¼¼Êõ£¨CEC£©Ñ§Êõ»áÒé¡¢IEEE¹ú¼Êµç×ÓÉÌÎñ¹¤³Ì£¨ICEBE£©Ñ§Êõ»áÒé£¬Ôøµ£Èγ¬¹ý30¸ö¹ú¼Ê»áÒéÖ÷ϯ£¬ºÍ³¬¹ý120¸ö¹ú¼Ê»áÒéµÄÆÀί¡£ÔøÈÎÕã½´óѧ¡¢Ïã¸Û´óŒW¡¢ÃÀ¹úÑÇÀûÉ£ÄÇÖÝÁ¢´óѧ¡¢¸´µ©´óѧ¡¢°ÄÖÞÐÂÄÏÍþ¶ûÊ¿´óѧ¡¢Í¬¼Ã´óѧ¡¢Ó¢¹ú¿¼ÎÄ´¹´óѧ¡¢Î÷°²½»Í¨´óѧ¡¢½Î÷²Æ¾´óѧµÈУ¿Í×ù½ÌÊÚ¡£Ñо¿ÐËȤ°üÀ¨ÔƼÆËã¡¢µç×ÓÉÌÎñÓëµç×ÓÕþÎñ¡¢·þÎñ¿ÆÑ§Óë·þÎñ¼ÆËã¡¢Öǻ۳ÇÊС¢ÂÌÉ«¼ÆËã¡¢ÂÌÉ«ÉÌÒµµÄÐÂÐ˽â¾ö·½°¸µÈµÈ¡£
Ñݽ²ÌâÄ¿£ºIdentifying Malicious Actors in Online Platforms
»¥ÁªÍøÉÏÊýÒÔǧ¼ÆµÄÔÚÏßÉç½»ºÍÉÌҵƽ̨¡£È»¶ø£¬Öî¶àƽ̨¶¼ÃæÁÙ×ŶñÒâ¹¥»÷µÄÍþв£¬ÀýÈç Slashdot¡¢TwitterÉϵöÓãÍøÕ¾£¬Twitter»úÆ÷ÈË£¬¶ÔWikipediaµÄ¹¥»÷ÓëÆÆ»µ£¬ÍøÂçÌÖÂÛÂÛ̳µÄÂí¼×£¬ÒÔ¼°µç×ÓÉÌÎñÍøÕ¾ÉϵÄÐé¼ÙÆÀÂÛ¡£ÔÚ±¾´Î·ÖÏíÖУ¬ÎÒ½«ÌṩһЩ°¸Àý£¬ÒÔ˵Ã÷ÕâЩ¶ñÒâÐÐΪÕßËù´øÀ´µÄÌôÕ½£¬È»ºóÖØµã·ÖÎöÁ½¸ö¾ßÌåµÄ°¸Àý¡£µÚÒ»¸ö°¸ÀýÑо¿ÈçºÎʹÓüලºÍÎ޼ලµÄ·½·¨À´Ê¶±ðµç×ÓÉÌÎñÍøÕ¾ÉϵÄÐé¼ÙÆÀÂÛÐÐΪ£¬ÔÚÑÇÂíÑ·ºÍFlipkartµÄÊý¾ÝÉÏÎÒÃÇ¿ÉÒÔ׼ȷʶ±ð³öÐé¼ÙÆÀÂÛ£»µÚ¶þ¸ö°¸ÀýÑо¿ÈçºÎʶ±ðÍøÕ¾ÂÛ̳ÉϵÄÂí¼×ID¡£Í¬Ê±¶ÔÆäËû¶ñÒâÐÐΪ½øÐмòÒªµÄ·ÖÎöÓëÌÖÂÛ¡£
V.S. Subrahmanian½ÌÊÚ
V.S. Subrahmanian½ÌÊÚÊÇÃÀ¹úÂíÀïÀ¼´óѧ¼ÆËã»ú¿ÆÑ§Ïµ½ÌÊÚ£¬Computational Cultural DynamicsʵÑéÊÒÖ÷ÈΣ¬Êý×ÖÕþ¸®Ñо¿ÖÐÐÄÖ÷ÈΡ£ËûµÄÑо¿ÐËȤΪ°²È«¡¢Õþ²ß¡¢ÉÌÒµµÈÁìÓòµÄ´óÊý¾Ý·ÖÎö¡£Subrahmanian½ÌÊÚ³¤ÆÚ´ÓÊ´óÐÍÒì¹¹Êý¾Ý¿â¡¢¶àýÌåÊý¾Ý¿âµÄ·ÖÎöÓëÍÚ¾ò¡£½üÄêÀ´£¬Ëû¿ª´´ÐԵĽ«¸ÅÂÊÂ߼ģÐÍÓ¦ÓÃÓÚÉç»áÎÊÌâµÄÑо¿£¬ÀýÈçͨ¹ýÉç½»ÍøÂçÊý¾ÝÍÚ¾òÀ´·ÖÎö¿Ö²ÀÖ÷ÒåÍÅÌåµÄÐÐΪ£¬²¢½«ÆäÓ¦ÓÃÓÚ¿Ö²ÀÐÐΪԤ²â¡¢·´¿ÖÕþ²ßÖÆ¶¨ÖУ¬²¢ÍƹãÖÁ¹ú¼ÒÎȶ¨ÐÔµÄÔ¤²âÓëÆÀ¹ÀÖС£½áºÏÉç»áÍøÂç·ÖÎö£¬Ê¶±ðÉ罻ýÌåÉϵIJ»Á¼ÐÐΪÕߣ¬ÀýÈç¶ñÒâÈí¼þÔÚ¸÷¹úÂûÑÓ¡£Ñо¿Éç»áýÌåÖеÄÐÅÏ¢´«²¥¹æÂÉ£¬²¢Ìá³öÓ°ÏìÉç½»ÍøÂç´«²¥µÄ·½·¨¡£ÔÚÍøÂ簲ȫ·½Ã棬Subrahmanian½ÌÊÚ¿ª·¢ÁËÁìÏÈÐԵݲȫ²éѯ´¦ÀíËã·¨£¬¿É¶ÔÍþвÐÔÐÐΪ½øÐмì²â¡£Í¨¹ýÑо¿È«Çò44¸ö¹ú¼Ò³¬¹ý2ÄêµÄ¶þÊ®ÒڴζñÒâÈí¼þ±¨¸æ£¬ËûÓÚ 2016Äê·¢²¼Á˓ȫÇòÍøÂç´àÈõÐÔ±¨¸æ”×ۺϷÖÎöÁË44¸ö¹ú¼ÒµÄÍøÂç·çÏÕ¡£
»î¶¯ÁªÏµÈË£º
ÁõÀÏʦ£¬ÄÏ·½¿Æ¼¼´óѧ£¬15911088618£¬liul@sustc.edu.cn
ÕÅÁú£º ÌÚѶ¹«Ë¾13928460705£¬gluckzhang@tencent.com
²Î»á»ØÖ´£º
ÐÕÃû
|
|
µ¥Î»
|
|
µç»°
|
|
Email
|
|