From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail1-relais-roc.national.inria.fr (mail1-relais-roc.national.inria.fr [192.134.164.82]) by sympa.inria.fr (Postfix) with ESMTPS id DC01A7ED88 for ; Sat, 8 Sep 2012 22:38:26 +0200 (CEST) Received-SPF: None (mail1-smtp-roc.national.inria.fr: no sender authenticity information available from domain of grlmc@urv.cat) identity=pra; client-ip=193.144.16.78; receiver=mail1-smtp-roc.national.inria.fr; envelope-from="grlmc@urv.cat"; x-sender="grlmc@urv.cat"; x-conformance=sidf_compatible Received-SPF: Pass (mail1-smtp-roc.national.inria.fr: domain of grlmc@urv.cat designates 193.144.16.78 as permitted sender) identity=mailfrom; client-ip=193.144.16.78; receiver=mail1-smtp-roc.national.inria.fr; envelope-from="grlmc@urv.cat"; x-sender="grlmc@urv.cat"; x-conformance=sidf_compatible; x-record-type="v=spf1" Received-SPF: None (mail1-smtp-roc.national.inria.fr: no sender authenticity information available from domain of postmaster@mta01.urv.cat) identity=helo; client-ip=193.144.16.78; receiver=mail1-smtp-roc.national.inria.fr; envelope-from="grlmc@urv.cat"; x-sender="postmaster@mta01.urv.cat"; x-conformance=sidf_compatible X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgUBAI6rS1DBkBBOkWdsb2JhbABFgkuvfokKIgEBAQEJCwsHFAUigiIFCBUQIRoFARgFKhcBJgYSAiUBBBsDEgEDh3MHmVWSeo1QixMbhTtgA4gegxmBZlyIeIU3jDo X-IronPort-AV: E=Sophos;i="4.80,392,1344204000"; d="scan'208,217";a="172382213" Received: from mta01.urv.cat ([193.144.16.78]) by mail1-smtp-roc.national.inria.fr with ESMTP; 08 Sep 2012 22:38:25 +0200 X-IronPort-AV: E=Sophos;i="4.80,392,1344204000"; d="scan'208,217";a="30376019" Received: from pmbox2.urv.cat ([193.144.16.41]) by mta.urv.cat with ESMTP; 08 Sep 2012 22:38:25 +0200 Received: from Carlos1 (17.Red-79-153-74.dynamicIP.rima-tde.net [79.153.74.17]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by pmbox2.urv.cat (Postfix) with ESMTPSA id 50843E2B9; Sat, 8 Sep 2012 22:38:11 +0200 (CEST) From: "GRLMC" To: Date: Sat, 8 Sep 2012 22:38:34 +0200 Message-ID: <265AA931784A4299886DB8D5ED0B0549@Carlos1> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_02E8_01CD8E12.B6A7FAF0" X-Mailer: Microsoft Office Outlook 11 Thread-index: Ac2OAeqOtNg668ZTTdmSHuSn0sjKUw== X-MIMEOLE: Produced By Microsoft MimeOLE V6.0.6000.16669 X-Validation-by: grlmc@urv.cat Subject: [Caml-list] TPNC 2012: call for participation This is a multi-part message in MIME format. ------=_NextPart_000_02E8_01CD8E12.B6A7FAF0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable *To be removed from our mailing list, please respond to this message with UNSUBSCRIBE in the subject* =20 ---------------------------------------------------------------------------- ------------------------------- =20 1st INTERNATIONAL CONFERENCE ON THE THEORY AND PRACTICE OF NATURAL COMPUTING =20 TPNC 2012 =20 Tarragona, Spain =20 October 2-4, 2012 =20 http://grammars.grlmc.com/tpnc2012/ =20 ---------------------------------------------------------------------------- ------------------------------ =20 PROGRAMME =20 Tuesday, October 2 =20 8:30 - 9:00 Registration =20 9:00 - 9:15 Opening =20 9:15 - 10:15 Ponnuthurai N. Suganthan: Differential Evolution: Recent Advances - Invited Talk =20 10:15 - 10:45 Coffee Break =20 10:45 - 11:45 =20 Michelangelo Cianciulli, Rocco Zaccagnino, Rosalba Zizza: An Easy Automata Based Algorithm for Testing Coding Properties of Infinite Sets of (DNA) Words =20 Daniela Genova, Kalpana Mahalingam: Generating DNA Code Words Using Forbidding and Enforcing Systems =20 11:45 - 12:00 Break =20 12:00 - 13:00 Max H. Garzon: Theory and Applications of DNA Codeword Design - Invited Talk =20 13:00 - 14:45 Lunch =20 14:45 - 15:45 =20 Poster session =20 Fatiha Djahafi: Matching XML Documents by the Similarity Measure Based WordNet =20 Shin Watanabe, Atsuko Takamatsu, Yasuhiro Hayashi: Design of Electric Power Distribution Networks Using a Biologically Inspired Algorithm =20 Vladimir Shpilrain, Dima Grigoriev: Nature-Based Cryptography =20 Alexander Spirov, David Holloway: Using Evolutionary Computations to Understand the Evolutionary Design of Gene Regulatory Networks =20 Ilja Kucevalovs, Ojars Krasts, Rusins Freivalds, Thomas Zeugmann: Influence of Technology on Learning Processes =20 Kaspars Balodis, Karlis Jerins, Rusins Freivalds, Agnis Skuskovniks, Ilja Kucevalovs: Weak Computation by Frequency Finite-State Transducers =20 15:45 - 16:00 Break =20 16:00 - 17:10 =20 Poster session =20 Chu Qin, Xiao Hua Ma, Zhe Shi, Yu Zong Chen: Evaluation of the Hit and Target Selectivity Performance of Machine Learning Multi-Target Virtual Screening Models =20 Lin Tao, Feng Zhu, Yuzong Chen: Genome-Wide Protein-Protein Interactions Prediction from Amino Acid Sequence Using Support Vector Machines =20 Mauricio Guevara-Souza, Edgar Vallejo: Accelerating Simulations of Population Replacement Using Multicore Technologies =20 Adam Kozan=FD: Influence of Forbidding a Rule Type on the Development of PM Colony =20 David Iclanzan, Camelia Chira: Evolving Complex Cellular Automata Rules =20 David Iclanzan, D. Dumitrescu: Multiobjective Evolution of Mixed Nash Equilibria =20 Alina Vasilieva, Elena Shishova: Quantum Query Algorithms for Computing Multivalued Functions =20 17:10 - 17:25 Break =20 17:25 - 18:25 Faustino G=F3mez: Scalable Neuroevolution for Reinforcement Learning - Invited Talk =20 Wednesday, October 3 =20 9:00 - 11:00 Christian Blum: Hybrid Metaheuristics - Invited Tutorial =20 11:00 - 11:30 Coffee Break =20 11:30 - 13:00 =20 Petr Sosik, Ludek Cienciala: Tissue P Systems with Cell Separation: Upper Bound by PSPACE =20 Tibor Kmet, Maria Kmetova: Neural Netwoks Solving Free Final Time Optimal =20 Darko Stefanovic: Maze Exploration with Molecular-Scale Walkers =20 13:00 - 14:45 Lunch =20 14:45 - 16:45 =20 Sergio Santander-Jim=E9nez, Miguel A. Vega-Rodr=EDguez, Juan A. G=F3mez-Pul= ido, Juan M. S=E1nchez-P=E9rez: Comparing Different Operators and Models to Impr= ove a Multiobjective Artificial Bee Colony Algorithm for Inferring Phylogenies =20 V=EDctor Berrocal-Plaza, Miguel A. Vega-Rodr=EDguez, Juan M. S=E1nchez-P=E9= rez, Juan A. G=F3mez-Pulido: A Multi-Objective Approach to Solve the Location Areas Problem =20 Ran Gelles, Tal Mor: On the Security of Interferometric Quantum Key Distribution =20 Michel Boyer, Ran Gelles, Tal Mor: Attacks on QKD with Fixed Apparatus =20 16:45 - 17:00 Break =20 17:00 - 18:00 Barbara M. Terhal: Fragility of Quantum Information and Quantum Error Correction - Invited Talk =20 Thursday, October 4 =20 9:00 - 10:00 Peter Ti=F1o: Computational Intelligence in Astronomy - Win-= Win Situation - Invited Talk =20 10:00 - 10:30 Coffee Break =20 10:30 - 12:00 =20 Mauricio Guevara and Edgar Vallejo: Wolbachia Infection Improves Genetic Algorithms as Optimization Procedure =20 Salimur Choudhury, Kai Salomaa, Selim G. Akl: Cellular Automaton Based Motion Planning Algorithms for Mobile Sensor Networks =20 Mar=EDa Bot=F3n-Fern=E1ndez, Francisco Prieto, Miguel A. Vega-Rodr=EDguez: Nature-inspired Algorithms Applied to an Efficient and Self-adaptive Resources Selection Model for Grid Applications =20 12:00 - 12:15 Break =20 12:15 - 13:15 Andrew Childs: Universal Computation by Multi-particle Quantum Walk - Invited Talk =20 13:15 Closing =20 ------=_NextPart_000_02E8_01CD8E12.B6A7FAF0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable

*To be = removed from our mailing list, please respond to this message with UNSUBSCRIBE in t= he subject*

&n= bsp;

-------= ---------------------------------------------------------------------------= -------------------------

&n= bsp;

1st INTERNATIONAL CONFERENCE ON THE

THEORY AND PRACTICE OF NATURAL COMPUTING=

&n= bsp;

TPNC 20= 12

&n= bsp;

Tarrago= na, Spain

&n= bsp;

October= 2-4, 2012

&n= bsp;

http://= grammars.grlmc.com/tpnc2012/

 

-------= ---------------------------------------------------------------------------= ------------------------

 

PROGRAM= ME

 

Tuesday, October 2<= /font>

 

8:30 - 9:00=A0=A0=A0=A0 Registration

 

9:00 - 9:15=A0=A0=A0=A0 Opening

 

9:15 - 10:15=A0=A0 Ponnuthurai N. Suganthan: Different= ial Evolution: Recent Advances - Invited T= alk

 

10:15 - 10:45=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 Coffee Break

 

10:45 - 11:45

 

Michelangelo Cianciulli, Rocco Zaccagnino, Rosalba Ziz= za: An Easy Automata Based Algorithm for Testing Coding Properties of Infinite = Sets of (DNA) Words

 

Daniela Genova, Kalpana Mahalingam: Generating DNA Code Words Using Forbidding and Enforcing Systems

 

11:45 - 12:00=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 Break

 

12:00 - 13:00=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 Max H.= Garzon: Theory and Applications of DNA Codeword Design - = Invited Talk

 

13:00 - 14:45=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 Lunch

 

14:45 - 15:45

 

Poster session

 

Fatiha Djahafi: Matching XML Documents by the Similari= ty Measure Based WordNet

 

Shin Watanabe, Atsuko Takamatsu, Yasuhiro Hayashi: Des= ign of Electric Power Distribution Networks Using a Biologically Inspired Algor= ithm

 

Vladimir Shpilrain, Dima Grigoriev: Nature-Based Cryptography

 

Alexander Spirov, David Holloway: Using Evolutionary Computations to Understand the Evolutionary Design of Gene Regulatory Netwo= rks

 

Ilja Kucevalovs, Ojars Krasts, Rusins Freivalds, Thomas Zeugmann: Influence of Technology on Learning Processes

 

Kaspars Balodis, Karlis Jerins, Rusins Freivalds, Agnis Skuskovniks, Ilja Kucevalovs: Weak Computation by Frequency Finite-State Transducers

 

15:45 - 16:00=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 Break

 

16:00 - 17:10

 

Poster session

 

Chu Qin, Xiao Hua Ma, Zhe Shi, Yu Zong Chen: Evaluatio= n of the Hit and Target Selectivity Performance of Machine Learning Multi-Target= Virtual Screening Models

 

Lin Tao, Feng Zhu, Yuzong Chen: Genome-Wide Protein-Protein Interactions Prediction from Amino Acid Sequence Using Supp= ort Vector Machines

 

Mauricio Guevara-Souza, Edgar Vallejo: Accelerating Simulations of Population Replacement Using Multicore Technologies

 

Adam Kozan=FD: Influence of Forbidding a Rule Type on = the Development of PM Colony

 

David Iclanzan, Camelia Chira: Evolving Complex Cellul= ar Automata Rules

 

David Iclanzan, D. Dumitrescu: Multiobjective Evolutio= n of Mixed Nash Equilibria

 

Alina Vasilieva, Elena Shishova: Quantum Query Algorit= hms for Computing Multivalued Functions

 

17:10 - 17:25=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 Break

 

17:25 - 18:25=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 Fausti= no G=F3mez: Scalable Neuroevolution for Reinforcement Learning - Invited Talk

 

Wednesday, October 3

 

9:00 - 11:00=A0=A0 Christian Blum: Hybrid Metaheuristi= cs - Invited Tutorial

 

11:00 - 11:30=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 Coffee Break

 

11:30 - 13:00

 

Petr Sosik, Ludek Cienciala: Tissue P Systems with Cell Separation: Upper Bound by PSPACE

 

Tibor Kmet, Maria Kmetova: Neural Netwoks Solving Free Final Time Optimal

 

Darko Stefanovic: Maze Exploration with Molecular-Scale Walkers

 

13:00 - 14:45=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 Lunch

 

14:45 - 16:45

 

Sergio Santander-Jim=E9nez, Miguel A. Vega-Rodr=EDguez= , Juan A. G=F3mez-Pulido, Juan M. S=E1nchez-P=E9rez: Comparing Different Operators= and Models to Improve a Multiobjective Artificial Bee Colony Algorithm for Inferring Phylogenies

 

V=EDctor Berrocal-Plaza, Miguel A. Vega-Rodr=EDguez, J= uan M. S=E1nchez-P=E9rez, Juan A. G=F3mez-Pulido: A Multi-Objective Approach to So= lve the Location Areas Problem

 

Ran Gelles, Tal Mor: On the Security of Interferometric Quantum Key Distribution

 

Michel Boyer, Ran Gelles, Tal Mor: Attacks on QKD with Fixed Apparatus

 

16:45 - 17:00=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 Break

 

17:00 - 18:00=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 Barbar= a M. Terhal: Fragility of Quantum Information and Quantum Error Correction - Invited Talk

 

Thursday, October 4=

 

9:00 - 10:00=A0=A0 Peter Ti=F1o: Computational Intell= igence in Astronomy - Win-Win Situation - Invite= d Talk

 

10:00 - 10:30=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 Coffee Break

 

10:30 - 12:00

 

Mauricio Guevara and Edgar Vallejo: Wolbachia Infection Improves Genetic Algorithms as Optimization Procedure

 

Salimur Choudhury, Kai Salomaa, Selim G. Akl: Cellular Automaton Based Motion Planning Algorithms for Mobile Sensor Networks<= /o:p>

 

Mar=EDa Bot=F3n-Fern=E1ndez, Francisco Prieto, Miguel = A. Vega-Rodr=EDguez: Nature-inspired Algorithms Applied to an Efficient and Self-adaptive Resources Selection Model for Grid Applications

 

12:00 - 12:15=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 Break

 

12:15 - 13:15=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 Andrew= Childs: Universal Computation by Multi-particle Quantum Walk - Invited Talk

 

13:15=A0 Closing<= /span>

 

------=_NextPart_000_02E8_01CD8E12.B6A7FAF0--