Narrow your search

Library

AP (3)

KDG (3)

EhB (2)

ULiège (2)

VUB (2)

KU Leuven (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

More...

Resource type

book (4)

digital (3)


Language

English (7)


Year
From To Submit

2013 (2)

2006 (4)

1996 (1)

Listing 1 - 7 of 7
Sort by

Book
Vision systems : applications : 13 June 1996, Besançon, France
Authors: ---
ISBN: 0819421723 Year: 1996 Publisher: Bellingham, WA : SPIE (Society of Photo-optical Instrumentation Engineers) - International Society for Optical Engineering,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
The secure information society : ethical, legal and political challenges
Authors: --- ---
ISBN: 1447147626 1447147634 1283909693 1447158415 Year: 2013 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In our modern information societies, we not only use and welcome computers; we are highly dependent upon them. There is a downside of this kind of progress, however. Computers are not 100% reliable. They are insecure. They are vulnerable to attackers. They can either be attacked directly, to disrupt their services, or they can be abused in clever ways to do the bidding of an attacker as a dysfunctional user. Decision-makers and experts alike always struggle with the amount of interdisciplinary knowledge needed to understand the nuts and bolts of modern information societies and their relation to security, the implications of technological or political progress or the lack thereof. This holds in particular for new challenges to come. These are harder to understand and to categorize; their development is difficult to predict. To mitigate this problem and to enable more foresight, The Secure Information Society provides an interdisciplinary spotlight onto some new and unfolding aspects of the uneasy relationship between information technology and information society, to aid the dialogue not only in its current and ongoing struggle, but to anticipate the future in time and prepare perspectives for the challenges ahead.

Keywords

Computer networks -- Security measures. --- Computer security -- Law and legislation. --- Computer security. --- Computer security --- Computer networks --- Engineering & Applied Sciences --- Computer Science --- Security measures --- Law and legislation --- Government policy --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Protection of computer systems --- Protection --- Computer science. --- Political science. --- Philosophy. --- Computers and civilization. --- Electrical engineering. --- Economic policy. --- Computer Science. --- Computers and Society. --- Communications Engineering, Networks. --- Philosophy of Technology. --- R & D/Technology Policy. --- Political Science. --- Data protection --- Security systems --- Hacking --- Telecommunication. --- Administration --- Civil government --- Commonwealth, The --- Government --- Political theory --- Political thought --- Politics --- Science, Political --- Social sciences --- State, The --- Economic nationalism --- Economic planning --- National planning --- State planning --- Economics --- Planning --- National security --- Social policy --- Mental philosophy --- Humanities --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Informatics --- Science --- Electric engineering --- Engineering --- Civilization and computers --- Civilization


Digital
The Secure Information Society : Ethical, Legal and Political Challenges
Authors: --- ---
ISBN: 9781447147633 Year: 2013 Publisher: London Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

In our modern information societies, we not only use and welcome computers; we are highly dependent upon them. There is a downside of this kind of progress, however. Computers are not 100% reliable. They are insecure. They are vulnerable to attackers. They can either be attacked directly, to disrupt their services, or they can be abused in clever ways to do the bidding of an attacker as a dysfunctional user. Decision-makers and experts alike always struggle with the amount of interdisciplinary knowledge needed to understand the nuts and bolts of modern information societies and their relation to security, the implications of technological or political progress or the lack thereof. This holds in particular for new challenges to come. These are harder to understand and to categorize; their development is difficult to predict. To mitigate this problem and to enable more foresight, The Secure Information Society provides an interdisciplinary spotlight onto some new and unfolding aspects of the uneasy relationship between information technology and information society, to aid the dialogue not only in its current and ongoing struggle, but to anticipate the future in time and prepare perspectives for the challenges ahead.


Digital
Applied Soft Computing Technologies: The Challenge of Complexity
Authors: --- --- ---
ISBN: 9783540316626 Year: 2006 Publisher: Berlin, Heidelberg Springer


Digital
Pattern Recognition (vol. # 4174) : 28th DAGM Symposium, Berlin, Germany, September 12-14, 2006, Proceedings
Authors: --- --- ---
ISBN: 9783540444145 Year: 2006 Publisher: Berlin Heidelberg Springer-Verlag GmbH


Book
Pattern Recognition : 28th DAGM Symposium, Berlin, Germany, September 12-14, 2006. Proceedings
Authors: --- --- --- ---
ISBN: 9783540444145 Year: 2006 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

ThisLNCSvolumecontainsthepaperspresentedatthe28thAnnualSymposium of the German Association for Pattern Recognition, DAGM2006, held during September 12-14, 2006 at Fraunhofer IPK in Berlin, Germany. This symposium was jointly organized by the three Fraunhofer Institutes HHI, IPK and FIRST, and it was a great honor for the organizers to host such a renowned, scienti?c event. In total, 171 papers from 29 countries were submitted, of which 76 (44%) were accepted. We would therefore like to thank all the authors for submitting theirworkandapologizethatnotallpaperscouldbeaccepted.Thisrecordn- ber of submissions is an acknowledgement of the high reputation of the DAGM Symposium but atthe sametime it wasa challengefor the ProgramCommittee, asallpaperswerereviewedbythreeexperts.Thereforeweareespeciallygrateful tothe62membersoftheProgramCommitteefortheir remarkablee?ortandthe high quality as well as the timely delivery of the reviews. Out of the 76 accepted papers, 31 were oral presentations and 45 were posters. However, this selection does not imply any quality ranking but re?ects the preference of the authors or the clustering of certain topics. It was also a special honor to have ?ve very renowned invited speakers at this conference: - GabrielCurio-Charit´ e, Bernstein Center for Computational Neuroscience, Berlin, Germany - ThomasHofmann - Technical University Darmstadt, Germany - ThomasHuang - Beckman Institute, University of Illinois, USA - SebastianThrun - Arti?cial Intelligence Lab, Stanford University, USA - PatriceSimard - Document Processing and Understanding (DPU) Group - Microsoft Research, Redmond, USA Thesespeakerspresentedtheirviewsonthestateoftheartinpatternrecognition and image processing.


Book
Applied Soft Computing Technologies: The Challenge of Complexity
Authors: --- --- --- ---
ISBN: 9783540316626 Year: 2006 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume presents the proceedings of the 9th Online World Conference on Soft Computing in Industrial Applications (WSC9), September 20th - October 08th, 2004, held on the World Wide Web. It contains plenary lectures, original papers and tutorials presented during the conference. The book brings together outstanding research and developments in the field of soft computing (evolutionary computation, fuzzy logic, neural networks, and their fusion) and its applications in science and technology.

Listing 1 - 7 of 7
Sort by