电计中职计算机教学计划的m十是什么意思

姚期智_百度百科
姚期智(Andrew Chi-Chih Yao),祖籍湖北省孝感市孝昌县,世界著名计算机学家,2000年得主,,美国科学与艺术学院院士,外籍院士,高等研究中心教授,博文讲座教授。1967年获得物理学士学位,1972年获得美国大学物理博士学位,1975年获得美国计算机科学博士学位。1975年至1986年曾先后在数学系、计算机系、计算机系任助理教授、教授。2004年起在清华大学任全职教授。2005年出任博文讲座教授。[1]
现任院长、教授。
姚期智人物经历
姚期智学习经历
1946年12月生于上海。
1967年获得物理学士学位;
1972年获得美国物理博士学位;
1975年获得美国计算机科学博士学位;
姚期智在美任教
1975年至1986年先后在数学系、计算机系、计算机系,等著名学府担任教授;
1986年至2004年在计算机科学系担任Wiliam and Edna Macaleer工程与应用科学教授。
1998年被选为;
2000年被选为美国科学与艺术学院院士;
2004年当选为外籍院士。[2]
姚期智全职回国
2004年,姚期智决定将57岁以后的人生回归中国大陆,开创科学研究的新舞台。他毅然辞去了普林斯顿大学终身教职,卖掉了在美国的房子,正式加盟高等研究中心任全职教授。
日,获得北京的“绿卡”。[3]
2005年,由姚期智主导并与共同合作的“软件科学实验班”(后
更名为“计算机科学实验班”,也被称为“姚班”)在清华成立,并先后招收大一、大二两班学生。次年3月,姚期智在致清华全校同学的一封信中掷地有声地写到:“我们的目标并不是培养优秀的计算机软件程序员,我们要培养的是具有国际水平的一流计算机人才。”[4]
在清华大学先后创办计算机科学实验班(姚班)、理论计算机科学研究中心(ITCS)、交叉信息研究院(IIIS)和量子信息中心(CQI)。他从清华开始,逐步建立中国的计算机理论科学的研究队伍,试图在国际上造成影响。
日,教育部部长周济、科技部部长共同到清华看望姚期智。强调,姚期智全职归来并带动一批人才回国发展,堪称一面“旗帜”。徐冠华也谈到,像姚期智这样的旗帜性人物回国必然会产生“放大效应”。[5]
姚期智人物成就
姚期智学术成就
研究方向包括计算理论及其在密码学和量子计算中的应用。
在三大方面具有突出贡献:
(1)创建理论计算机科学的重要次领域:通讯复杂性
和伪随机数生成计算理论;
(2)奠定现代密码学基础,在基于复杂性的密码学和安全形式化方法方面有根本性贡献;
(3)解决线路复杂性、计算几何、数据结构及量子计算等领域的开放性问题并建立全新典范。
他是研究网络通讯复杂性理论的国际前驱,于1993年最先提出量子通信复杂性,基本上完成了量子计算机的理论基础。1995年姚期智教授提出分布式量子计算模式,后来成为分布式量子算法和量子通讯协议安全性的基础。
他是美国国家科学院院士、美国人文及科学院院士、中国科学院外籍院士及台湾中央研究院院士。他曾获得美国工业与应用数学学会乔治·波利亚奖,及以算法设计大师克努特命名的首届克努特奖。
因为对计算理论包括伪随机数生成、密码学与通信复杂度的突出贡献,美国计算
机协会(ACM)也把2000年度的图灵奖授予他。姚期智是图灵奖创立以来首位获奖的亚裔学者,也是迄今为止获此殊荣的唯一华裔计算机科学家。
姚期智还获得了诸多荣誉和奖项,其中包括1987年的波里亚奖(George Polya Prize)和1996年的高德纳奖(Donald E. Knuth Prize)等。年,姚教授先后获香港城市大学和香港科技大学荣誉博士学位,2006年获香港中文大学荣誉理学博士学位,2009年获滑铁卢大学荣誉博士学位,2010年2月姚期智先生当选&2009首都十大教育新闻人物&。[1]
姚期智个人荣誉
1987年 波里亚奖(George Polya Prize)
1991 古根海姆基金会研究学者奖(Guggenheim Fellowship)
1995 会士(Fellow,Association for Computing Machinery)
1996 (Donald E. Knuth Prize)
1998 美国国家科学院院士(Member,US National Academy of Sciences)
2000 美国人文科学院院士 (Fellow,American Academy of Arts and Sciences)
2000 (A.M. Turing Award)
2000 台湾院士(Member,Academia Sinica)
2003 研究考察奖 (Pan Wen-Yuan Research Award)
2003 理学荣誉博士(Doctor of Science,Honoris Causa,City University of Hong Kong)
2003 美国科学发展促进会会士(Fellow,American Association for the Advancement of Science)
2004 工学荣誉博士(Doctor of Engineering,Honoris Causa,Hong Kong University of Science and Technology)
2004 外籍院士(Foreign Member,Chinese Academy of Sciences)
2004 工程学院特殊贡献校友奖(Alumni Award for Distinguished Service,College of Engineering,University of Illinois)
2006 理学荣誉博士(Doctor of Science,Honoris Causa,the Chinese University of Hong Kong)
2009 Doctor of Mathematics,Honoris Causa,University of Waterloo
2010 IACR Fellow
2012 理学荣誉博士
姚期智回归清华
姚期智的全职回国,填补了国内计算机学科的空白:这不只是因为他无可争议的学术地位,更因为在他所从事的算法和复杂性领域,当时几乎还看不到中国国内学者的身影。而这一领域既是美国理论计算机科学的主流方向,又是计算机界最高奖项——“”获奖人数最多的一个方向。[5]
由此,清华的计算机学科第一次集齐了理论、应用、系统结构和软件四大领域的优秀学者,这在国际上也是不多见的。[5]
姚期智带来了一个从6人增至10人的讲席教授组,他们都是国际上算法和复杂性领域最出色的华人学者。
随着姚期智的归来,清华计算机学科国际交流的频率和层次都达到了一个新的高度。以姚期智创建的理论计算机科学研究中心(ITCS)为例,2007年国外学者的访问日程已经安排到了12月31日。美国两院院士、1985年“图灵奖”得主RichardKarp,2002年“图灵奖”得主、著名密码学家AdiShamir……都曾出现在ITCS的访问学者名单上。[5]
2006年,清华计算机系有3篇论文入选理论计算机科学领域与STOC并列的最顶级学术会议FOCS,不仅实现了国内学者在该会议上“零的突破”,而且入选篇数超过了美国计算机科学领域的“超一流”大学UCBerke-ley。更令人振奋的是,当年24岁的博士生与来自香港城市大学的讲席教授合作,出色地解决了理论计算机科学的著名难题——二人博弈中的复杂性问题,并因此获得2006年度FOCS最佳论文奖。[5]
这一年,姚期智的团队还为国内计算机学者填补了在《美国科学院院刊》上发文的空白。
日—19日,理论计算机科学研究中心成功主办了第十届国际公钥会议,来自世界15个国家的学者参会,姚期智担任大会主席。这是国际密码学研究领域和理论计算机研究方向的一次世界级盛会,首次在中国召开,又恰逢该会议的十周年庆典,可谓意义深远。[5]
姚期智人物著作
&Divergences of Massive Yang-Mills Theories: Higher Groups&,(with S. L. Glashow and J. Illiopoulos),Physical Review,D4 (1971),.
2 &Standing Pion Waves in Superdense Matter&,(with R. F. Sawyer),Physical Review,D7 (1973),.
3 &An O (|E| log log |V|) Algorithm for Finding Minimum Spanning Trees&,Information Processing Letters,4 (1975),21-23.
4 &Analysis of the Subtractive Algorithms for Greatest Common Divisors&,(with D. E. Knuth),Proceedings of the National Academy of Sciences USA,72 (1975),.
5 &On Computing the Minima of Quadratic Forms&,Proceedings of Seventh ACM Symposium on Theory of Computing,Albuquerque,New Mexico,May .
6 &The Complexity of Non-uniform Random Number Generation&,(with D. E. Knuth),in Algorithms and Complexity: New Directions and Recent Results,edited by J. F. Traub,Academic Press,1976,pp.357-428.
7 &On the Evaluation of Powers&,SIAM J. on Computing,5 (1976),100-103.
8 &Resource Constrained Scheduling as Generalized Bin Packing&,(with M. R. Garey,R. L. Graham and D. S. Johnson),J. of Combinatorial Theory,A21 (1976),257-298.
9 &Bounds on Merging Networks&,(with F. F. Yao),Journal of ACM,23 (1976),566-571.
10 &Tiling with Incomparable Rectangles&,(with E. M. Reingold and W. Sanders),Journal of Recreational Mathematics,8 (1976),112-119.
11 &A Combinatorial Optimization Problem Related to Data Set Allocation&,(with C. K. Wong),Revue Francaise D'Automatique,Informatique,Recherche Operationnelle,Suppl. No. 5 (1976),83-96.
12 &On a Problem of Katona on Minimal Separation Systems&,Discrete Mathematics,15 (1976),193-199.
13 &An Almost Optimal Algorithm for Unbounded Searching&,(with J. Bentley),Information Processing Letters,5 (1976),82-87.
14 &On the Average Behavior of Set Merging Algorithms&,Proceedings of Eighth ACM Symposium on Theory of Computing,Hershey,Pennsylvania,May .
15 &The Complexity of Searching an Ordered Random Table&,(with F. F. Yao),Proceedings of Seventeenth IEEE Symposium on Foundations of Computer Science,Houston,Texas,October .
16 &Probabilistic Computations: Toward a Unified Measure of Complexity&,Proceedings of Eighteenth IEEE Symposium on Foundations of Computer Science,Providence,Rhode Island,October .
17 &On the Loop Switching Addressing Problem&,SIAM J. on Computing,7 (1978),82-87.
18 &On Random 2-3 Trees&,Acta Informatica,9 (1978),159-170.
19 &K + 1 Heads are Better than K&,(with R. L. Rivest),Journal of ACM,25 (1978),337-340.
20 &Addition Chains with Multiplicative Cost&,(with R. L. Graham and F. F. Yao),Discrete Mathematics,23 (1978),115-119.
21 &The Complexity of Pattern Matching for a Random String&,SIAM J. on Computing,8 (1979),368-387.
22 &A Note on a Conjecture of Kam and Ullman Concerning Statistical Databases &,Information Processing Letters,9 (1979),48-50.
23 &Storing a Sparse Table&,(with R. E. Tarjan),Communications of ACM,22 (1979),606-611.
24 &On Some Complexity Questions in Distributive Computing&,Proceedings of Eleventh ACM Symposium on Theory of Computing,Atlanta,Georgia,May .
25 &External Hashing Schemes for Collections of Data Structures&,(with R. J. Lipton and A. L. Rosenberg),Journal of ACM,27 (1980),81-95.
26 &New Algorithms for Bin Packing&,Journal of ACM,27 (1980),207-227.
27 &Information Bounds are Weak for the Shortest Distance Problem&,(with R. L. Graham and F. F. Yao),Journal of ACM,27,(1980),428-444.
28 &A Stochastic Model of Bin Packing&,(with E. G. Coffman,Jr.,M. Hofri and K. So),Information and Control,44 (1980),105-115.
29 &An Analysis of Shellsort&,Journal of Algorithms,1 (1980),14-50.
30 &On the Polyhedral Decision Problem&,(with R. L. Rivest),SIAM J. on Computing,9 (1980),343-347.
31 &Bounds on Selection Networks&,SIAM J. on Computing,9 (1980),566-582.
32 &Some Monotonicity Properties of Partial Orders&,(with R. L. Graham and F. F. Yao),SIAM J. on Algebraic and Discrete Methods,1 (1980),251-258.
33 &A Note on the Analysis of Extendible Hashing&,Information Processing Letters,11 (1980),84-86.
34 &Optimal Expected-Time Algorithm for Closest-point Problems&,(with J. L. Bentley and B. W. Weide),ACM Trans. on Math. Software,6 (1980),561-580.
35 &Efficient Searching via Partial Ordering&,(with A. Borodin,L. J. Guibas and N. A. Lynch),Information Processing Letters,12 (1981),71-75.
36 &An Analysis of a Memory Allocation Scheme for Implementing Stacks&,SIAM J. on Computing,10 (1981),398-403.
37 &Should Tables be Sorted?&,Journal of ACM,28 (1981),615-628.
38 &A Lower Bound for Finding Convex Hulls&,Journal of ACM,28 (1981),780-787.
39 &The Entropic Limitations on VLSI Computations&,Proceedings of Thirteenth ACM Symposium on Theory of Computing,Milwaukee,Wisconsin,May .
40 &Average-case Complexity of Selecting the k-th Best&,(with F. F. Yao),SIAM J. on Computing,11 (1982),428-447.
41 &The Complexity of Finding Cycles in Periodic Functions&,(with R. Sedgewick and T. G. Szymanski),SIAM J. on Computing,11 (1982),376-390.
42 &On the Time-Space Tradeoff for Sorting with Linear Queries&,Theoretical Computer Science,19 (1982),203-218.
43 &Lower Bounds to Algebraic Decision Trees&,(with J. M. Steele,Jr.),Journal of Algorithms,3 (1982),1-8.
44 &On Parallel Computation for the Knapsack Problem&,Journal of ACM,29 (1982),898-903.
45 &On Constructing Minimum Spanning Trees in k-dimensional Spaces and Related Problems&,SIAM J. on Computing,11 (1982),721-736.
46 &Equal Justice for Unequal Shares of the Cake&,(with M. Klawe),Congressus Numerantium,36 (1982),247-260.
47 &Rearrangeable Networks with Limited Depth&,(with N. Pippenger),SIAM J. on Algebraic and Discrete Methods,3 (1982),411-417.
48 &Space-Time Tradeoff for Answering Range Queries&,Proceedings of Fourteenth ACM Symposium on Theory of Computing,San Francisco,California,May .
49 &Theory and Applications of Trapdoor Functions&,Proceedings of Twenty-third IEEE Symposium on Foundations of Computer Science,Chicago,Illinois,November .
50 &Protocols for Secure Computations&,Proceedings of Twenty-third IEEE Symposium on Foundations of Computer Science,Chicago,Illinois,November .
51 &On the Security of Public Key Protocols&,(with D. Dolev),IEEE Trans. on Information Theory,29 (1983),198-208.
52 &Strong Signature Schemes&,(with S. Goldwasser and S. Micali),Proceedings of Fifteenth ACM Symposium on Theory of Computing,Boston,Massachusetts,April
53 &Lower Bounds by Probabilistic Arguments&,Proceedings of Twenty-fourth IEEE Symposium on Foundations of Computer Science,Tucson,Arizona,November .
54 &Context-free Grammars and Random Number Generation&,Proceedings of NATO Workshop on Combinatorial Algorithms on Words,Maratea,Italy,July 1984,edited by A. Apostolico and Z. Galil,Academic Press,357-361.
55 &Fault-tolerant Networks for Sorting&,(with F. F. Yao),SIAM J. on Computing,14 (1985),120-128.
56 &On the Expected Performance of Path Compression&,SIAM J. on Computing,14 (1985),129-133.
57 &On Optimal Arrangements of Keys with Double Hashing&,Journal of Algorithms,6 (1985),253-264.
58 &Uniform Hashing is Optimal&,Journal of the ACM,32 (1985),687-693.
59 &On the Complexity of Maintaining Partial Sums&,SIAM J. on Computing,14 (1985),253-264.
60 &A General Approach to d-dimensional Geometric Queries&,(with F. F. Yao),Proceedings of Seventeenth ACM Symposium on Theory of Computing,Providence,Rhode Island,May .
61 &Separating the Polynomial-time Hierarchy by Oracles&,Proceedings of Twenty-sixth IEEE Symposium on Foundations of Computer Science,Eugene,Oregon,October .
62 &How to Generate and Exchange Secrets&,Proceedings of Twenty-seventh IEEE Symposium on Foundations of Computer Science,Toronto,Canada,October .
63 &Monotone Bipartite Graph Properties are Evasive&,SIAM J. on Computing,17 (1988),517-520.
64 &Computational Information Theory&,in Complexity in Information Theory,edited by Y. Abu-Mostafa,,.
65 &Selecting the k Largest with Median Tests&,Algorithmica,4 (1989),293-300.
66 &On the Complexity of Partial Order Productions&,SIAM J. on Computing,18 (1989),679-689.
67 &On the Improbability of Reaching Byzantine Agreement&,(with R. L. Graham) Proceedings of Twenty-First ACM Symposium on Theory of Computing,Seattle,Washington,May .
68 &Circuits and Local Computations&,Proceedings of Twenty First ACM Symposium on Theory of Computing,Seattle,Washington,May .
69 &Computing Boolean Functions with Unreliable Tests&,(with C. Kenyon-Mathieu) International Journal of Foundations of Computer Science,1 (1990),1-10.
70 &Coherent Functions and Program Checkers&,Proceedings of Twenty-second ACM Symposium on Theory of Computing,Baltimore,Maryland,May .
71 &On ACC and Threshold Circuits&,Proceedings of Thirty-first IEEE Symposium on Foundations of Computer Science,October .
72 &Lower Bounds to Randomized Algorithms for Graph Properties&,Journal of Computer and System Sciences,42 (1991),267-287.
73 &Lower Bounds for Algebraic Computation Trees with Integer Inputs&,SIAM J. On Computing,20 (1991),655-668.
74 &Program Checkers for Probability Generation&,(with S. Kannan) Proceedings of Eighteenth International Colloquium on Automata,Languages and Programming,Madrid,Spain,July .
75 &Linear Decision Trees: Volume Estimates and Topological Bounds&,(with A. Bj&Orner and L. Lovász) Proceedings of Twenty-fourth ACM Symposium on Theory of Computing,May .
76 &A Circuit-Based Proof of Toda's Theorem&,(with R. Kannan,H. Venkateswaran and V. Vinay) Information and Computation,104 (1993),271-276.
77 &Towards Uncheatable Benchmarks&,(with J. Cai,R. Lipton,and R. Sedgewick) Proceedings of Eighth IEEE Annual Structure in Complexity Conference,San Diego,California,May .
78 &Quantum Circuit Complexity&,Proceedings of Thirty-fourth IEEE Symposium on Foundations of Computer Science,Palo Alto,California,November .
79 &A Randomized Algorithm for Maximum Finding with Parity Tests&,(with H. F. Ting),Information Processing Letters,49 (1994),39-43.
80 &Near-Optimal Time-Space Tradeoff for Element Distinctness&,SIAM J. On Computing,23 (1994),966-975.
81 &A Lower Bound for the Monotone Depth of Connectivity&,Proceedings of Thirty-fifth IEEE Symposium on Foundations of Computer Science,Santa Fe,New Mexico,November .
82 &On Computing Algebraic Functions Using Logarithms and Exponentials&,(with D. Grigoriev and M. Singer) SIAM J. on Computing,24 (1995),242-246.
83 &Algebraic Decision Trees and Euler Characteristics&,Theoretical Computer Science,141 (1995),133-150.
84 &On the Shrinkage Exponent for Read-Once Formulae&,(with J. Hastad and A. Razborov),Theoretical Computer Science,141 (1995),269-282.
85 &Minimean Optimal Key Arrangements in Hash Tables&,Algorithmica,14 (1995),409-428.
86 &Security of Quantum Protocols Against Coherent Measurements&,Proceedings of Twenty-seventh ACM Symposium on Theory of Computing,Las Vegas,Nevada,May .
87 &Decision Tree Complexity and Betti Numbers&,Journal of Computer and Systems Sciences,55 (1997),36-43.
88 &Dictionary Look-Up with One Error&,(with F. F. Yao),Journal of Algorithms,25 (1997),194-202.
89 &Read-Once Branching Programs,Rectangular Proofs of the Pigeonhole Principle and the Transversal Calculus&,(with A. Razborov and A. Wigderson),Proceedings of Twenty-ninth ACM Symposium on Theory of Computing,May .
90 &RAPID: Randomized Pharmacophore Identification for Drug Design&,(with L. Kavraki,J. Latombe,R. Motwani,C. Shelton,and S. Venkatasubramanian),Proceedings of 1997 ACM Symposium on Applied Computational Geometry,Nice,France,.
91 &A Lower Bound on the Size of Algebraic Decision Trees for the MAX Problem&,(with D. Grigoriev and M. Karpinski),Computational Complexity,7 (1998),193-203.
92 &Quantum Cryptography with Imperfect Apparatus&,(with D. Mayers),Proceedings of Thirty-ninth IEEE Symposium on Foundations of Computer Science,October .
93 &NQP C = co - C = P&,(with T. Yamakami),Information Processing Letters,71 (1999),63-69.
94 &Quantum Bit Escrow&,(with A. Aharonov,A. Ta-Shma and U. Vazirani),Proceedings of Thirty-second ACM Symposium on Theory of Computing,May .
95 &Informational Complexity and the Direct Sum Problem for Simultaneous Message Complexity&,(with A. Chakrabarti,Y. Shi and A. Wirth),Proceedings of Forty-second IEEE Symposium on Foundations of Computer Science,October .
96 &Classical Physics and the Church-Turing Thesis&,Journal of ACM,50 (2003),100-105.
97 &On the Power of Quantum Fingerprinting&,Proceedings of Thirty-fifth ACM Symposium on Theory of Computing,June .
98 &Graph Properties and Circular Functions: How Low Can Quantum Query Complexity Go?& (with X. Sun and S. Zhang),Proceedings of 19th IEEE Conference on Computational Complexity,Amherst,Massachusetts,June .
99 &Graph Entropy and Quantum Sorting Problems&,Proceedings of Thirty-sixth ACM Symposium on Theory of Computing,June .
100 &Incentive Compatible Price Sequence in Dynamic Auctions&,(with N. Chen,X. Deng and X. Sun),Proceedings of Thirty-first International Colloquium on Automata,Languages and Programming,Turku,Finland,July 2004 (Lecture Notes in Computer Science # 3142,Springer),320-331.
101 &Fisher Equilibrium Price with a Class of Concave Utility Functions& (with N. Chen,X. Deng and X. Sun),Proceedings of Twelfth Annual European Symposium on Algorithms,Bergen,Norway,September 2004 (Lecture Notes in Computer Science # 3221,Springer),169-179.
102 &Discrete and Continuous Min-energy Schedules for Variable Voltage Processors&,(with M. Li and F. Yao),Proceedings of the National Academy of Sciences USA,103 (2006),.
103 &On the Quantum Query Complexity of Local Search in Two and Three Dimensions&,(With Xiaoming Sun),Proceedings of 47th Annual IEEE Symposium on Foundations of Computer Science,Berkeley,CA,October .
104 &A Note on Universal Composable Zero Knowledge in Common Reference String Model &,(With Frances F. Yao and Yunlei Zhao),The 4th Annual Conference on Theory and Applications of Models of Computation,Shanghai,China,May 2007
105 &A Note on the Feasibility of Generalized Universal Composability &,(With Frances F. Yao and Yunlei Zhao),The 4th Annual Conference on Theory and Applications of Models of Computation,Shanghai,China,May 2007
106 Graph Design for Secure Multiparty Computation over Non-Abelian Groups
107 Generalized Tsirelson Inequalities,Commuting-Operator Provers,and Multi-Prover Interactive Proof Systems
108 Tsuyoshi Ito,Hirotada Kobayashi,Daniel Preda,Xiaoming Sun,and Andrew Chi-Chih Yao Generalized Tsirelson Inequalities,Commuting-Operator Provers,and Multi-Prover Interactive Proof Systems CCC
109 Xiaoming Sun,Andrew Chi-Chih Yao and Christophe Tartary Graph Design for Secure Multiparty Computation over Non-Abelian Groups Asiacrypt 2008
110 Xiaoming Sun,Andrew Chi-Chih Yao. On the Quantum Query Complexity of Local Search in Two and Three Dimensions in the following paginated issue of Algorithmica: Volume 55,Issue3 (2009),Page 576.
111 Andrew C.C. Yao,Frances F. Yao,Yunlei Zhao A Note on Universal Composable Zero Knowledge in Common Reference String Model Theoretical Computer Science 2009
112 Andrew C.C. Yao,Frances F. Yao,Yunlei Zhao A Note on the Feasibility of Generalized Universal Composability Mathematical Structure in Computer Science 2009
113 Andrew C. Yao,Moti Yung,and Yunlei Zhao,Concurrent Knowledge Extraction in the Public-Key Model,ICALP 2010
114 Andrew C. Yao and Yunlei Zhao. Deniable Internet Key Exchange,ACNS2010
姚期智家庭生活
姚期智的夫人储枫教授早在2003年从美国去香港城市大学担任计算机科学系系主任。
姚期智人物轶事
姚期智中国情结
姚期智人生头20年生活在中国,20岁以后生活在美国,57岁以后又将人生归宿在中国大陆的姚期智的人生轨迹宛如一个圆。[6]
生在上海,长在台湾,却在美国接受了36年熏陶的姚期智自己也没有料到,在中国所接受的教育是如此根深蒂固,尤其是随着年龄的增长,也许是人生经验多了的缘故,姚期智对中国文化的感受更加深刻了。[6]
姚期智是怀有中国情结的。姚期智说他在清华教育年轻一代,有一种满足感,是在美国教美国学生时所没有的。在这里,他教育的是中国年轻人![6]
姚期智表示“中国是我的祖国,我受中国传统文化的教育和影响是非常深厚的,我对整个中国的感情非常深厚。目前国内有一个很好的目标,要建设出几个世界一流的研究型大学来,我觉得我现在能在清华参与这件工作也算是一点小小的贡献。希望能尽点儿微薄之力。”[6]
姚期智总理嘱托
日,总理专程在教师节前来看望姚期智教授。在交谈中,温总理说,国家对人才的
温总理看望姚期智
需求如饥似渴,高层次的人才是国家最稀缺、最宝贵的资源;我们在抓好基础教育的同时,也要下大力气抓好高等教育,为国家广泛培养高层次优秀人才;在重点科研机构和重要科研领域,要实行杰出人才的全球招聘制度;要为杰出人才的脱颖而出和充分发挥作用创造良好的条件。[3]
作为在国际一流大学长期任教的教授以及在计算机理论领域享有世界声誉的学者,姚期智教授出任清华大学(筹)学术委员会主任和首席科学家,立即承担起建设世界一流的清华大学信息科学的重任,组织筹建国家实验室。日,教育部部长、副部长等领导来到考察信息科学与技术国家实验室的筹建工作,专门与姚期智教授会面并听取了他的汇报和建议。[3]
.清华大学[引用日期]
.盛威网[引用日期]
.清华大学新闻网[引用日期]
.清华大学[引用日期]
.清华大学新闻网[引用日期]
.清华大学新闻网[引用日期]
企业信用信息

我要回帖

更多关于 计算机室工作计划 的文章

 

随机推荐