当前位置:首页 » 股票资讯 » 姚期智
扩展阅读
2019国庆 2025-07-05 13:11:42
买黄金股票在哪里买 2025-07-05 12:21:06
达安股份的股票行情 2025-07-05 12:00:08

姚期智

发布时间: 2022-01-19 04:46:03

Ⅰ 如何看待杨振宁,姚期智转为中国国籍并加入中科院

中国科学院外籍院士杨振宁和姚期智两位教授已依照《中国科学院章程》和《中国科学院外籍院士转为中国科学院院士暂行办法》正式转为中国科学院院士。
两位都是世界顶级的科学家,都是全人类的骄傲。就算抛开学术成果不谈,两人在清华的十余年,在学生培养,学科建设,海外联系等等诸多方面贡献极大,更是吸引了一批高水平的年轻教授一同回国。学科之外,终身教职的制度改革,清华高等研究院的建设都来自杨振宁的提议;而姚期智在姚班的本科生培养上的心血投入和亲力亲为。两人归国可以说是全球华人学术精英回流中国和中国高等教育崛起的一个标志。
然而这件事最长远的意义应该是在为了此事通过的《中国科学院外籍院士转为中国科学院院士暂行办法》。根据《中国科学院院士章程》第十三条规定,外籍院士在取得中国国籍后,可直接转为院士或资深院士,并享有同等义务、权利及有关待遇。因此,杨振宁与姚期智之所以能加入中科院,是因为两位取得了中国国籍,因此从外籍院士直接转为院士,并不是从天而降就加入了。长久以来加入/恢复中国国籍一直是一件十分困难的事情。这一办法的通过标志着吸引学术精英回国的规格进一步提高,也是国籍政策松口的一个开端。
在如今各国的人才争夺战中,中国本来就处于弱势地位。现在两位世界级的学者放弃外国国籍加入中国,不管是为了叶落归根也好,为了身后名声也好,这都为国际顶尖人才加入中国开创了先例,正面典型一旦树立,效仿者必定纷至沓来,这就是“风向标”的作用。

Ⅱ 姚期智的介绍

姚期智(Andrew Chi-Chih Yao),祖籍湖北省孝感市孝昌县,世界著名计算机学家,2000年图灵奖得主,美国科学院院士,美国科学与艺术学院院士,中国科学院外籍院士,清华大学高等研究中心教授,香港中文大学博文讲座教授。1967年获得台湾大学物理学士学位,1972年获得美国哈佛大学物理博士学位,1975年获得美国伊利诺依大学计算机科学博士学位。1975年至1986年曾先后在美国麻省理工学院数学系、斯坦福大学计算机系、加利福尼亚大学伯克利分校计算机系任助理教授、教授。2004年起在清华大学任全职教授。2005年出任香港中文大学博文讲座教授。1现任清华大学交叉信息研究院院长、教授。

Ⅲ 姚期智是谁啊

姚期智(Andrew Chi-Chih Yao),世界著名计算机学家,2000年图灵奖得主,美国科学院院士,美国科学与艺术学院院士,中国科学院外籍院士,清华大学高等研究中心教授。1967年获得台湾大学物理学士学位,1972年获得美国哈佛大学物理博士学位,1975年获得美国伊利诺依大学计算机科学博士学位。1975年至1986年曾先后在美国麻省理工学院数学系、斯坦福大学计算机系、加利福尼亚大学伯克利分校计算机系任助教授、教授。1986年至2004年在普林斯顿大学计算机科学系担任Wiliam and Edna Macaleer工程与应用科学教授。2004年起在清华大学任全职教授。

Ⅳ 科学家杨振宁和姚期智加入中国国籍证明什么

刚刚那个人回答太不负责任,可以说很“义和团”。杨振宁2015年就加入中国籍了,2017年才被曝光,说明人家不为名。而姚期智是杨振宁从国外邀请回中国工作的7个外籍院士之一。加入中国籍,说明他们对中国有感情。

杨振宁为清华大学等拉巨额科研经费,其中清华大学数亿美金。私人推荐多名学者出国培训。“无偿协助建设实验室几十座”(葛墨林院士语),以清华名义发表SCI论文几十篇,“将清华三个物理研究领域提高到世界一流”(清华大学校长王大中语)”,还个人捐献600万美金给清华大学。

杨振宁是清华大学高等研究院创始人,还是南开大学理论物理研究室创办人,已经在国际上占有一席之地,培养出数名院士和大学副校长。

他是1971年中美关系松动后回国探访的第一位华裔科学家,在积极推动中美文化交流和人民的互相了解、促进中美建交、人才交流和科技合作等方面,做出了重大贡献。

杨振宁1977年创建全美华人协会,1980年创建“与中国学术交流委员会”,在中国香港和美国筹措资金,策划和资助了CEEC计划(中国学者访问项目),帮助大批中国高端学者到美国著名大学进行深造,归国者有多位当选两院院士,其中就包括后来的北京大学校长的陈佳洱,担任过复旦大学校长的杨福家以及担任过中国科技大学校长的谷超豪等。(注:南开理论物理研究室的早期毕业生,包括现任吉林省政协副主席、东北师范大学副校长薛康、中国科学院院士孙昌璞、中国科学院研究生院副院长苏刚,都曾受杨振宁的资助到他任教的纽约州立大学石溪分校访问一年。陈省身透露,杨振宁为了筹钱送他们出国培训,曾发着高烧去纽约唐人街演讲。)

周光召院士:杨振宁为中国至少培养了10个以上的中科院院士和5个大学校长。

清华大学校长王大中高度赞誉了杨振宁对清华的贡献:没有杨振宁,就没有清华物理系的今天。

清华大学校长顾秉林说,“杨先生是我国科学工作者的一面旗帜”。顾秉林透露,他任校长时杨振宁推荐了著名计算机专家姚期智来清华任教,为后来清华引进大量高端人才起到了十分重要的作用。“他还把在清华的工资都捐了出来,用于引进人才和培养学生。”

1971年上半年,杨振宁参与保钓运动,被认为是运动的精神领袖。此外,他还直接参加1971-1991年对台统战。

1983年,杨振宁创建香港中山大学高等学术研究中心基金会,促成了广州中山大学高等学术研究中心的成立,资助国内纯学术基础研究项目,获得国家部省级奖励几十项。

Ⅳ 姚期智的人物著作

Divergences of Massive Yang-Mills Theories: Higher Groups,(with S. L. Glashow and J. Illiopoulos),Physical Review,D4 (1971),1918-1919.
2 Standing Pion Waves in Superdense Matter,(with R. F. Sawyer),Physical Review,D7 (1973),1579-1586.
3 An O (|E| log log |V|) Algorithm for Finding Minimum Spanning Trees,Information Processing Letters,4 (1975),21-23.
4 Analysis of the Subtractive Algorithms for Greatest Common Divisors,(with D. E. Knuth),Proceedings of the National Academy of Sciences USA,72 (1975),4720-4722.
5 On Computing the Minima of Quadratic Forms,Proceedings of Seventh ACM Symposium on Theory of Computing,Albuquerque,New Mexico,May 1975,23-26.
6 The Complexity of Non-uniform Random Number Generation,(with D. E. Knuth),in Algorithms and Complexity: New Directions and Recent Results,edited by J. F. Traub,Academic Press,1976,pp.357-428.
7 On the Evaluation of Powers,SIAM J. on Computing,5 (1976),100-103.
8 Resource Constrained Scheling as Generalized Bin Packing,(with M. R. Garey,R. L. Graham and D. S. Johnson),J. of Combinatorial Theory,A21 (1976),257-298.
9 Bounds on Merging Networks,(with F. F. Yao),Journal of ACM,23 (1976),566-571.
10 Tiling with Incomparable Rectangles,(with E. M. Reingold and W. Sanders),Journal of Recreational Mathematics,8 (1976),112-119.
11 A Combinatorial Optimization Problem Related to Data Set Allocation,(with C. K. Wong),Revue Francaise D'Automatique,Informatique,Recherche Operationnelle,Suppl. No. 5 (1976),83-96.
12 On a Problem of Katona on Minimal Separation Systems,Discrete Mathematics,15 (1976),193-199.
13 An Almost Optimal Algorithm for Unbounded Searching,(with J. Bentley),Information Processing Letters,5 (1976),82-87.
14 On the Average Behavior of Set Merging Algorithms,Proceedings of Eighth ACM Symposium on Theory of Computing,Hershey,Pennsylvania,May 1976,192-195.
15 The Complexity of Searching an Ordered Random Table,(with F. F. Yao),Proceedings of Seventeenth IEEE Symposium on Foundations of Computer Science,Houston,Texas,October 1976,222-227.
16 Probabilistic Computations: Toward a Unified Measure of Complexity,Proceedings of Eighteenth IEEE Symposium on Foundations of Computer Science,Providence,Rhode Island,October 1977,222-227.
17 On the Loop Switching Addressing Problem,SIAM J. on Computing,7 (1978),82-87.
18 On Random 2-3 Trees,Acta Informatica,9 (1978),159-170.
19 K + 1 Heads are Better than K,(with R. L. Rivest),Journal of ACM,25 (1978),337-340.
20 Addition Chains with Multiplicative Cost,(with R. L. Graham and F. F. Yao),Discrete Mathematics,23 (1978),115-119.
21 The Complexity of Pattern Matching for a Random String,SIAM J. on Computing,8 (1979),368-387.
22 A Note on a Conjecture of Kam and Ullman Concerning Statistical Databases ,Information Processing Letters,9 (1979),48-50.
23 Storing a Sparse Table,(with R. E. Tarjan),Communications of ACM,22 (1979),606-611.
24 On Some Complexity Questions in Distributive Computing,Proceedings of Eleventh ACM Symposium on Theory of Computing,Atlanta,Georgia,May 1979,209-213.
25 External Hashing Schemes for Collections of Data Structures,(with R. J. Lipton and A. L. Rosenberg),Journal of ACM,27 (1980),81-95.
26 New Algorithms for Bin Packing,Journal of ACM,27 (1980),207-227.
27 Information Bounds are Weak for the Shortest Distance Problem,(with R. L. Graham and F. F. Yao),Journal of ACM,27,(1980),428-444.
28 A Stochastic Model of Bin Packing,(with E. G. Coffman,Jr.,M. Hofri and K. So),Information and Control,44 (1980),105-115.
29 An Analysis of Shellsort,Journal of Algorithms,1 (1980),14-50.
30 On the Polyhedral Decision Problem,(with R. L. Rivest),SIAM J. on Computing,9 (1980),343-347.
31 Bounds on Selection Networks,SIAM J. on Computing,9 (1980),566-582.
32 Some Monotonicity Properties of Partial Orders,(with R. L. Graham and F. F. Yao),SIAM J. on Algebraic and Discrete Methods,1 (1980),251-258.
33 A Note on the Analysis of Extendible Hashing,Information Processing Letters,11 (1980),84-86.
34 Optimal Expected-Time Algorithm for Closest-point Problems,(with J. L. Bentley and B. W. Weide),ACM Trans. on Math. Software,6 (1980),561-580.
35 Efficient Searching via Partial Ordering,(with A. Borodin,L. J. Guibas and N. A. Lynch),Information Processing Letters,12 (1981),71-75.
36 An Analysis of a Memory Allocation Scheme for Implementing Stacks,SIAM J. on Computing,10 (1981),398-403.
37 Should Tables be Sorted?,Journal of ACM,28 (1981),615-628.
38 A Lower Bound for Finding Convex Hulls,Journal of ACM,28 (1981),780-787.
39 The Entropic Limitations on VLSI Computations,Proceedings of Thirteenth ACM Symposium on Theory of Computing,Milwaukee,Wisconsin,May 1981,308-311.
40 Average-case Complexity of Selecting the k-th Best,(with F. F. Yao),SIAM J. on Computing,11 (1982),428-447.
41 The Complexity of Finding Cycles in Periodic Functions,(with R. Sedgewick and T. G. Szymanski),SIAM J. on Computing,11 (1982),376-390.
42 On the Time-Space Tradeoff for Sorting with Linear Queries,Theoretical Computer Science,19 (1982),203-218.
43 Lower Bounds to Algebraic Decision Trees,(with J. M. Steele,Jr.),Journal of Algorithms,3 (1982),1-8.
44 On Parallel Computation for the Knapsack Problem,Journal of ACM,29 (1982),898-903.
45 On Constructing Minimum Spanning Trees in k-dimensional Spaces and Related Problems,SIAM J. on Computing,11 (1982),721-736.
46 Equal Justice for Unequal Shares of the Cake,(with M. Klawe),Congressus Numerantium,36 (1982),247-260.
47 Rearrangeable Networks with Limited Depth,(with N. Pippenger),SIAM J. on Algebraic and Discrete Methods,3 (1982),411-417.
48 Space-Time Tradeoff for Answering Range Queries,Proceedings of Fourteenth ACM Symposium on Theory of Computing,San Francisco,California,May 1982,128-136.
49 Theory and Applications of Trapdoor Functions,Proceedings of Twenty-third IEEE Symposium on Foundations of Computer Science,Chicago,Illinois,November 1982,80-91.
50 Protocols for Secure Computations,Proceedings of Twenty-third IEEE Symposium on Foundations of Computer Science,Chicago,Illinois,November 1982,160-164.
51 On the Security of Public Key Protocols,(with D. Dolev),IEEE Trans. on Information Theory,29 (1983),198-208.
52 Strong Signature Schemes,(with S. Goldwasser and S. Micali),Proceedings of Fifteenth ACM Symposium on Theory of Computing,Boston,Massachusetts,April 1983,431-439
53 Lower Bounds by Probabilistic Arguments,Proceedings of Twenty-fourth IEEE Symposium on Foundations of Computer Science,Tucson,Arizona,November 1983,420-428.
54 Context-free Grammars and Random Number Generation,Proceedings of NATO Workshop on Combinatorial Algorithms on Words,Maratea,Italy,July 1984,edited by A. Apostolico and Z. Galil,Academic Press,357-361.
55 Fault-tolerant Networks for Sorting,(with F. F. Yao),SIAM J. on Computing,14 (1985),120-128.
56 On the Expected Performance of Path Compression,SIAM J. on Computing,14 (1985),129-133.
57 On Optimal Arrangements of Keys with Double Hashing,Journal of Algorithms,6 (1985),253-264.
58 Uniform Hashing is Optimal,Journal of the ACM,32 (1985),687-693.
59 On the Complexity of Maintaining Partial Sums,SIAM J. on Computing,14 (1985),253-264.
60 A General Approach to d-dimensional Geometric Queries,(with F. F. Yao),Proceedings of Seventeenth ACM Symposium on Theory of Computing,Providence,Rhode Island,May 1985,163-168.
61 Separating the Polynomial-time Hierarchy by Oracles,Proceedings of Twenty-sixth IEEE Symposium on Foundations of Computer Science,Eugene,Oregon,October 1985,1-10.
62 How to Generate and Exchange Secrets,Proceedings of Twenty-seventh IEEE Symposium on Foundations of Computer Science,Toronto,Canada,October 1986,162-167.
63 Monotone Bipartite Graph Properties are Evasive,SIAM J. on Computing,17 (1988),517-520.
64 Computational Information Theory,in Complexity in Information Theory,edited by Y. Abu-Mostafa,Springer-Verlag,1988,1-15.
65 Selecting the k Largest with Median Tests,Algorithmica,4 (1989),293-300.
66 On the Complexity of Partial Order Proctions,SIAM J. on Computing,18 (1989),679-689.
67 On the Improbability of Reaching Byzantine Agreement,(with R. L. Graham) Proceedings of Twenty-First ACM Symposium on Theory of Computing,Seattle,Washington,May 1989,467-478.
68 Circuits and Local Computations,Proceedings of Twenty First ACM Symposium on Theory of Computing,Seattle,Washington,May 1989,186-196.
69 Computing Boolean Functions with Unreliable Tests,(with C. Kenyon-Mathieu) International Journal of Foundations of Computer Science,1 (1990),1-10.
70 Coherent Functions and Program Checkers,Proceedings of Twenty-second ACM Symposium on Theory of Computing,Baltimore,Maryland,May 1990,84-94.
71 On ACC and Threshold Circuits,Proceedings of Thirty-first IEEE Symposium on Foundations of Computer Science,October 1990,619-627.
72 Lower Bounds to Randomized Algorithms for Graph Properties,Journal of Computer and System Sciences,42 (1991),267-287.
73 Lower Bounds for Algebraic Computation Trees with Integer Inputs,SIAM J. On Computing,20 (1991),655-668.
74 Program Checkers for Probability Generation,(with S. Kannan) Proceedings of Eighteenth International Colloquium on Automata,Languages and Programming,Madrid,Spain,July 1991,163-173.
75 Linear Decision Trees: Volume Estimates and Topological Bounds,(with A. BjÖrner and L. Lovász) Proceedings of Twenty-fourth ACM Symposium on Theory of Computing,May 1992,170-177.
76 A Circuit-Based Proof of Toda's Theorem,(with R. Kannan,H. Venkateswaran and V. Vinay) Information and Computation,104 (1993),271-276.
77 Towards Uncheatable Benchmarks,(with J. Cai,R. Lipton,and R. Sedgewick) Proceedings of Eighth IEEE Annual Structure in Complexity Conference,San Diego,California,May 1993,2-11.
78 Quantum Circuit Complexity,Proceedings of Thirty-fourth IEEE Symposium on Foundations of Computer Science,Palo Alto,California,November 1993,352-361.
79 A Randomized Algorithm for Maximum Finding with Parity Tests,(with H. F. Ting),Information Processing Letters,49 (1994),39-43.
80 Near-Optimal Time-Space Tradeoff for Element Distinctness,SIAM J. On Computing,23 (1994),966-975.
81 A Lower Bound for the Monotone Depth of Connectivity,Proceedings of Thirty-fifth IEEE Symposium on Foundations of Computer Science,Santa Fe,New Mexico,November 1994,302-308.
82 On Computing Algebraic Functions Using Logarithms and Exponentials,(with D. Grigoriev and M. Singer) SIAM J. on Computing,24 (1995),242-246.
83 Algebraic Decision Trees and Euler Characteristics,Theoretical Computer Science,141 (1995),133-150.
84 On the Shrinkage Exponent for Read-Once Formulae,(with J. Hastad and A. Razborov),Theoretical Computer Science,141 (1995),269-282.
85 Minimean Optimal Key Arrangements in Hash Tables,Algorithmica,14 (1995),409-428.
86 Security of Quantum Protocols Against Coherent Measurements,Proceedings of Twenty-seventh ACM Symposium on Theory of Computing,Las Vegas,Nevada,May 1995,67-75.
87 Decision Tree Complexity and Betti Numbers,Journal of Computer and Systems Sciences,55 (1997),36-43.
88 Dictionary Look-Up with One Error,(with F. F. Yao),Journal of Algorithms,25 (1997),194-202.
89 Read-Once Branching Programs,Rectangular Proofs of the Pigeonhole Principle and the Transversal Calculus,(with A. Razborov and A. Wigderson),Proceedings of Twenty-ninth ACM Symposium on Theory of Computing,May 1997,739-784.
90 RAPID: Randomized Pharmacophore Identification for Drug Design,(with L. Kavraki,J. Latombe,R. Motwani,C. Shelton,and S. Venkatasubramanian),Proceedings of 1997 ACM Symposium on Applied Computational Geometry,Nice,France,1997,324-333.
91 A Lower Bound on the Size of Algebraic Decision Trees for the MAX Problem,(with D. Grigoriev and M. Karpinski),Computational Complexity,7 (1998),193-203.
92 Quantum Cryptography with Imperfect Apparatus,(with D. Mayers),Proceedings of Thirty-ninth IEEE Symposium on Foundations of Computer Science,October 1998,503-509.
93 NQP C = co - C = P,(with T. Yamakami),Information Processing Letters,71 (1999),63-69.
94 Quantum Bit Escrow,(with A. Aharonov,A. Ta-Shma and U. Vazirani),Proceedings of Thirty-second ACM Symposium on Theory of Computing,May 2000,715-724.
95 Informational Complexity and the Direct Sum Problem for Simultaneous Message Complexity,(with A. Chakrabarti,Y. Shi and A. Wirth),Proceedings of Forty-second IEEE Symposium on Foundations of Computer Science,October 2001,270-278.
96 Classical Physics and the Church-Turing Thesis,Journal of ACM,50 (2003),100-105.
97 On the Power of Quantum Fingerprinting,Proceedings of Thirty-fifth ACM Symposium on Theory of Computing,June 2003,77-81.
98 Graph Properties and Circular Functions: How Low Can Quantum Query Complexity Go? (with X. Sun and S. Zhang),Proceedings of 19th IEEE Conference on Computational Complexity,Amherst,Massachusetts,June 2004,286-293.
99 Graph Entropy and Quantum Sorting Problems,Proceedings of Thirty-sixth ACM Symposium on Theory of Computing,June 2004,112-117.
100 Incentive Compatible Price Sequence in Dynamic Auctions,(with N. Chen,X. Deng and X. Sun),Proceedings of Thirty-first International Colloquium on Automata,Languages and Programming,Turku,Finland,July 2004 (Lecture Notes in Computer Science # 3142,Springer),320-331.
101 Fisher Equilibrium Price with a Class of Concave Utility Functions (with N. Chen,X. Deng and X. Sun),Proceedings of Twelfth Annual European Symposium on Algorithms,Bergen,Norway,September 2004 (Lecture Notes in Computer Science # 3221,Springer),169-179.
102 Discrete and Continuous Min-energy Scheles for Variable Voltage Processors,(with M. Li and F. Yao),Proceedings of the National Academy of Sciences USA,103 (2006),3983-3987.
103 On the Quantum Query Complexity of Local Search in Two and Three Dimensions,(With Xiaoming Sun),Proceedings of 47th Annual IEEE Symposium on Foundations of Computer Science,Berkeley,CA,October 2006,429-438.
104 A Note on Universal Composable Zero Knowledge in Common Reference String Model ,(With Frances F. Yao and Yunlei Zhao),The 4th Annual Conference on Theory and Applications of Models of Computation,Shanghai,China,May 2007
105 A Note on the Feasibility of Generalized Universal Composability ,(With Frances F. Yao and Yunlei Zhao),The 4th Annual Conference on Theory and Applications of Models of Computation,Shanghai,China,May 2007
106 Graph Design for Secure Multiparty Computation over Non-Abelian Groups
107 Generalized Tsirelson Inequalities,Commuting-Operator Provers,and Multi-Prover Interactive Proof Systems
108 Tsuyoshi Ito,Hirotada Kobayashi,Daniel Preda,Xiaoming Sun,and Andrew Chi-Chih Yao Generalized Tsirelson Inequalities,Commuting-Operator Provers,and Multi-Prover Interactive Proof Systems CCC 2008 2008
109 Xiaoming Sun,Andrew Chi-Chih Yao and Christophe Tartary Graph Design for Secure Multiparty Computation over Non-Abelian Groups Asiacrypt 2008
110 Xiaoming Sun,Andrew Chi-Chih Yao. On the Quantum Query Complexity of Local Search in Two and Three Dimensions in the following paginated issue of Algorithmica: Volume 55,Issue3 (2009),Page 576.
111 Andrew C.C. Yao,Frances F. Yao,Yunlei Zhao A Note on Universal Composable Zero Knowledge in Common Reference String Model Theoretical Computer Science 2009
112 Andrew C.C. Yao,Frances F. Yao,Yunlei Zhao A Note on the Feasibility of Generalized Universal Composability Mathematical Structure in Computer Science 2009
113 Andrew C. Yao,Moti Yung,and Yunlei Zhao,Concurrent Knowledge Extraction in the Public-Key Model,ICALP 2010
114 Andrew C. Yao and Yunlei Zhao. Deniable Internet Key Exchange,ACNS2010

Ⅵ 放弃美国一切,71岁世界顶级科学家姚期智,为何如今在清华培养人才

浊酒一杯家万里,燕然未勒归无计。——《渔家傲·秋思》

身为一个中国人,身体里流淌的血液,骨子里的气质,都有着对中国这片土地难以言喻的依恋与不舍。无论我们长大成人后奔向何方,都会有对家乡的思念,对祖国的思念。这便是乡愁,也是家乡留在我们心里的一份牵挂。

尤其是回到祖国的行为影响了大批留学生,他们也以姚期智为榜样,立志学有所成回国建设祖国。近几年我们对留学生的非议很多,认为他们有的学有所成后为他国建设出力是对祖国的不忠。但是我们也不得不究其根本原因,这种人才的流失不仅是学生个人原因,还有我国对科研人才支持与福利。只有当我们足够强大,也有能力留住人才的时候便不需要也不会有这种想法,所以打铁还需自身硬。

参考文献:《诗经·小雅·车辖》

Ⅶ 杨振宁和姚期智是世界顶尖的科学家吗

貌似大家对杨的评价不好啊!
大家对杨的评价无非以下几条:
1.不忠:杨振宁在中美战争和对抗年代,毅然选择为美国服务,后来更是加入美国国籍,这是对国家不忠。要知道他上学可是花的国家经费,国立西南联大。
2.不孝:杨振宁加入美国国籍时,他的父亲,一位更老一辈的知识分子对此不能接受,发表声明与之断绝关系,并且到死也没有原谅杨振宁。杨振宁在访谈中提到,这是他一辈子的遗憾。
3.不义:为了个人私利,不惜与合作者李政道反目为仇。
4.无耻:2004年底至2005年初,82岁高龄的杨振宁与28岁广东外语外贸大学翻译系硕士班学生翁帆再一次结婚,违背公理良俗,涉嫌乱伦,根本就是个无耻之徒。
以上只供参考,如果真实,那么真的很恶心。

Ⅷ 2000年图灵奖得主姚期智

姚期智(Andrew Chi-Chih Yao,1946年12月24日-),美籍华人,世界著名计算机科学家,2000年图灵奖得主,目前是清华大学教授。

姚期智祖籍湖北孝感,1946年平安夜出生于上海,幼年随父母移居台湾。1967年,姚期智毕业于台湾大学,之后赴美国深造。1972年获哈佛大学物理学博士学位,1975年获伊利诺大学香槟分校(UIUC)计算机科学博士学位。之后,他曾先后在麻省理工学院(1975—1976)、斯坦福大学(1976—1981,1983—1986)、加州大学伯克利分校(1981—1983)等美国高等学府从事教学和研究,1986年至2004年任普林斯顿大学计算机科学系教授,从2004年9月至今任清华大学高等研究中心教授。此外,姚期智还是美国国家科学院院士、美国人文及科学院院士、中国科学院外籍院士及台湾中央研究院院士。

姚期智获得过美国工业与应用数学学会George Polya奖,美国计算机协会算法与计算理论分会(ACM SIGACT)Donald E.Knuth奖等荣誉。2000年,因为姚期智对计算理论,包括伪随机数生成,密码学与通信复杂度的诸多贡献,美国计算机协会(ACM)决定把该年度的图灵奖授予他。姚期智成为图灵奖创立以来首位获奖的亚裔学者。

Ⅸ 姚期智是唯一的华人图灵奖得主吗

截止2017年6月,姚期智是唯一的华人图灵奖得主。
姚期智:祖藉湖北孝感,1946年12月24日出生于上海。1972年获哈佛大学物理学博士学位,1975年获伊利诺大学香槟分校计算机科学博士学位。之后,他曾先后在麻省理工学院、斯坦福大学、加州大学伯克利分校等美国高等学府从事教学和研究,1986年至2004年6月任普林斯顿大学计算机科学系教授。2000年,因为姚期智对计算理论的诸多贡献,美国计算机学会把该年度的图灵奖(公认为计算机领域诺贝尔奖)授予他,使他成为自图灵奖创立以来首位获奖的华人学者(截止目前,也是唯一一位华人图灵奖得主)。2017年2月,姚期智教授放弃外国国籍成为中国公民,正式转为中国科学院院士,加入中国科学院信息技术科学部。