Gira Up To Secure. Informática 64

Gira Up To Secure. Informática 64

La semana que viene, en Calatayud. Delegación de Estudiantes: Conferencia: “Familia 2.0”

El catedrático de Microbiología de la Universidad de Zaragoza, Carlos Martín Montañés, impartirá esta tarde  a las 18.30 la conferencia Desactivando el bacilo de la tuberculosis: en el camino hacia una vacuna más eficaz”. Con este acto de entrada libre, que tendrá lugar en el salón de actos del Instituto de Ciencias de la Educación (ICE) del Campus San Francisco, se iniciará el Programa de Formación de Apoyo a la Investigación de la Universidad de Zaragoza, con el que se pretende asesorar e incentivar a los profesores y jóvenes investigadores del campus público en su carrera científica.


Conferencia “Challenges for Sustainable Asian Urbanism”

  Noticias
Stephen Lau, profesor de la Hong Kong University, impartirá el próximo viernes, 16 de noviembre, la conferencia “Challenges for Sustainable AsianUrbanism”. Tendrá lugar a las 12:15h en la Sala de Grados del Edificio Torres Quevedo.

Conferencia “Challenges for Sustainable Asian Urbanism”

  Noticias

Stephen Lau, profesor de la Hong Kong University, impartirá el próximo viernes, 16 de noviembre, la conferencia “Challenges for Sustainable Asian
Urbanism”. Tendrá lugar a las 12:15h en la Sala de Grados del Edificio Torres Quevedo.

ECSS 2012 is the 8th Summit of deans, department chairs and senior faculty of leading European Computer Science and Informatics faculties, departments, research institutes and laboratories.  Informatics Europe - ECSS 2012)

ECSS 2012 is the 8th Summit of deans, department chairs and senior faculty of leading European Computer Science and Informatics faculties, departments, research institutes and laboratories.  Informatics Europe - ECSS 2012)

 Rafael Moneo. El arquitecto entre la espada y la pared. En la EINA, Zaragoza. Noticias

 Rafael Moneo. El arquitecto entre la espada y la pared. En la EINA, Zaragoza. Noticias

Fórum AZAFT | AZAFT

EvoRISK. Computational Intelligence for Risk Management, Security and Defence Applications
Recent events involving both natural disasters and human-made attacks have emphasised the importance of solving challenging problems in risk management, security and defence. Traditional methods have proven insufficient to address these problems and hence Computational Intelligence techniques present themselves as a more appealing alternative.
  www.evostar.org

EvoRISK Logo

EvoRISK. Computational Intelligence for Risk Management, Security and Defence Applications

Recent events involving both natural disasters and human-made attacks have emphasised the importance of solving challenging problems in risk management, security and defence. Traditional methods have proven insufficient to address these problems and hence Computational Intelligence techniques present themselves as a more appealing alternative.

  www.evostar.org

Toward A More Inclusive Backchannel: An Unusual Call To Action » Cyborgology
Vía @javifields Google EMEA travel and conference grants for female computer scientists - Google Students - Google)

As part of Google’s ongoing commitment to encourage women to excel in computing and technology, we are pleased to offer Google EMEA Travel and Conference Grants

Vía @javifields Google EMEA travel and conference grants for female computer scientists - Google Students - Google)

As part of Google’s ongoing commitment to encourage women to excel in computing and technology, we are pleased to offer Google EMEA Travel and Conference Grants