Listing 1 - 7 of 7 |
Sort by
|
Choose an application
Choose an application
In our modern information societies, we not only use and welcome computers; we are highly dependent upon them. There is a downside of this kind of progress, however. Computers are not 100% reliable. They are insecure. They are vulnerable to attackers. They can either be attacked directly, to disrupt their services, or they can be abused in clever ways to do the bidding of an attacker as a dysfunctional user. Decision-makers and experts alike always struggle with the amount of interdisciplinary knowledge needed to understand the nuts and bolts of modern information societies and their relation to security, the implications of technological or political progress or the lack thereof. This holds in particular for new challenges to come. These are harder to understand and to categorize; their development is difficult to predict. To mitigate this problem and to enable more foresight, The Secure Information Society provides an interdisciplinary spotlight onto some new and unfolding aspects of the uneasy relationship between information technology and information society, to aid the dialogue not only in its current and ongoing struggle, but to anticipate the future in time and prepare perspectives for the challenges ahead.
Computer networks -- Security measures. --- Computer security -- Law and legislation. --- Computer security. --- Computer security --- Computer networks --- Engineering & Applied Sciences --- Computer Science --- Security measures --- Law and legislation --- Government policy --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Protection of computer systems --- Protection --- Computer science. --- Political science. --- Philosophy. --- Computers and civilization. --- Electrical engineering. --- Economic policy. --- Computer Science. --- Computers and Society. --- Communications Engineering, Networks. --- Philosophy of Technology. --- R & D/Technology Policy. --- Political Science. --- Data protection --- Security systems --- Hacking --- Telecommunication. --- Administration --- Civil government --- Commonwealth, The --- Government --- Political theory --- Political thought --- Politics --- Science, Political --- Social sciences --- State, The --- Economic nationalism --- Economic planning --- National planning --- State planning --- Economics --- Planning --- National security --- Social policy --- Mental philosophy --- Humanities --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Informatics --- Science --- Electric engineering --- Engineering --- Civilization and computers --- Civilization
Choose an application
In our modern information societies, we not only use and welcome computers; we are highly dependent upon them. There is a downside of this kind of progress, however. Computers are not 100% reliable. They are insecure. They are vulnerable to attackers. They can either be attacked directly, to disrupt their services, or they can be abused in clever ways to do the bidding of an attacker as a dysfunctional user. Decision-makers and experts alike always struggle with the amount of interdisciplinary knowledge needed to understand the nuts and bolts of modern information societies and their relation to security, the implications of technological or political progress or the lack thereof. This holds in particular for new challenges to come. These are harder to understand and to categorize; their development is difficult to predict. To mitigate this problem and to enable more foresight, The Secure Information Society provides an interdisciplinary spotlight onto some new and unfolding aspects of the uneasy relationship between information technology and information society, to aid the dialogue not only in its current and ongoing struggle, but to anticipate the future in time and prepare perspectives for the challenges ahead.
Politics --- Methodology of economics --- Economic policy and planning (general) --- Economics --- Applied physical engineering --- Engineering sciences. Technology --- Production management --- Business economics --- Computer science --- Computer. Automation --- technologiebeleid --- computers --- economie --- filosofie --- informatica --- maatschappij --- politiek --- kwaliteitscontrole --- ingenieurswetenschappen --- computerkunde
Choose an application
Mathematics --- Engineering sciences. Technology --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- ICT (informatie- en communicatietechnieken) --- analyse (wiskunde) --- toegepaste wiskunde --- informatiesystemen --- KI (kunstmatige intelligentie) --- ingenieurswetenschappen --- robots --- AI (artificiële intelligentie)
Choose an application
Complex analysis --- Mathematical statistics --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- patroonherkenning --- beeldverwerking --- factoranalyse --- complexe analyse (wiskunde) --- grafische vormgeving --- robots
Choose an application
ThisLNCSvolumecontainsthepaperspresentedatthe28thAnnualSymposium of the German Association for Pattern Recognition, DAGM2006, held during September 12-14, 2006 at Fraunhofer IPK in Berlin, Germany. This symposium was jointly organized by the three Fraunhofer Institutes HHI, IPK and FIRST, and it was a great honor for the organizers to host such a renowned, scienti?c event. In total, 171 papers from 29 countries were submitted, of which 76 (44%) were accepted. We would therefore like to thank all the authors for submitting theirworkandapologizethatnotallpaperscouldbeaccepted.Thisrecordn- ber of submissions is an acknowledgement of the high reputation of the DAGM Symposium but atthe sametime it wasa challengefor the ProgramCommittee, asallpaperswerereviewedbythreeexperts.Thereforeweareespeciallygrateful tothe62membersoftheProgramCommitteefortheir remarkablee?ortandthe high quality as well as the timely delivery of the reviews. Out of the 76 accepted papers, 31 were oral presentations and 45 were posters. However, this selection does not imply any quality ranking but re?ects the preference of the authors or the clustering of certain topics. It was also a special honor to have ?ve very renowned invited speakers at this conference: - GabrielCurio-Charit´ e, Bernstein Center for Computational Neuroscience, Berlin, Germany - ThomasHofmann - Technical University Darmstadt, Germany - ThomasHuang - Beckman Institute, University of Illinois, USA - SebastianThrun - Arti?cial Intelligence Lab, Stanford University, USA - PatriceSimard - Document Processing and Understanding (DPU) Group - Microsoft Research, Redmond, USA Thesespeakerspresentedtheirviewsonthestateoftheartinpatternrecognition and image processing.
Complex analysis --- Mathematical statistics --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- patroonherkenning --- beeldverwerking --- factoranalyse --- complexe analyse (wiskunde) --- grafische vormgeving --- robots
Choose an application
This volume presents the proceedings of the 9th Online World Conference on Soft Computing in Industrial Applications (WSC9), September 20th - October 08th, 2004, held on the World Wide Web. It contains plenary lectures, original papers and tutorials presented during the conference. The book brings together outstanding research and developments in the field of soft computing (evolutionary computation, fuzzy logic, neural networks, and their fusion) and its applications in science and technology.
Mathematics --- Engineering sciences. Technology --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- ICT (informatie- en communicatietechnieken) --- analyse (wiskunde) --- toegepaste wiskunde --- informatiesystemen --- KI (kunstmatige intelligentie) --- ingenieurswetenschappen --- robots
Listing 1 - 7 of 7 |
Sort by
|