14 Hits in 7.0 sec

Surveillance, Fighting Crime And Violence (Iriss Deliverable 1.1)

David Wright, Johann Cas, Ivan Szekely, Beatrix Vissy, Michael Friedewald, Kerstin Goos, William Webster, Gemma Galdon Clavell, Rowena Rodrigues, Reinhard Kreissl, Clive Norris, Marija Krlic (+10 others)
2012 Zenodo  
A report addressing and analysing the factors underpinning the development and use of surveillance systems and technologies by both public authorities and private actors, and their implications in fighting  ...  crime and terrorism, social and economic costs, protection or infringement of civil liberties, fundamental rights and ethical aspects Co-ordinator Trilateral Research and Consulting LLP Dissemination  ...  Experian was accused of "misleading customers who sign up for a supposedly free service to check their financial records". 232 Though Experian offers visitors "free Experian credit reports", consumers  ... 
doi:10.5281/zenodo.1184324 fatcat:vxti37nlxbbejg6mjbk72ruh3e

Ambient Intelligence and the Right to Privacy: The Challenge of Detection Technologies

Shara Monteleone
2011 Social Science Research Network  
The objective of this study is to envisage some of the main legal challenges posed by the new Ambient Intelligence technologies (AmI) and in particular by the new security enforcement technologies for  ...  Unprecedented advances in Information Communication Technologies (ICT) and their involvement in most of private and public activities are revolutionizing our daily life and the way we relate to our environment  ...  On the concept of semantic web and its development see P.  ... 
doi:10.2139/ssrn.1953939 fatcat:pz4egipn35a2piwbynhlci4bsq

Environmental science theory. Concepts and methods in a one-world, problem-oriented paradigm

1993 Environment International  
, for human use but also out of respect for nature as a value in itself.  ...  This is all standard procedure in land use planning; the tiniest-scale example I know of is reported in Ortolano (1984, p. 246) : "For any particular picnic site, the percentage of ground cover consistent  ...  This chapter explores a way to do so, building up a general structure for explanatory research: action-in-context as part of the Problem-in-Context framework.  ... 
doi:10.1016/0160-4120(93)90104-p fatcat:hey4sdrwsbgntpwjzp763hhecu

OASIcs, Volume 17, KiVS'11, Complete Volume [article]

Norbert Luttenberger, Hagen Peters
Introduction The Web has become an indispensable prerequisite of everyday live and the Web browser is the most used application on a variety of distinct devices.  ...  A well known attack of this type is called history stealing allowing a Web site to access the user's history using JavaScript and CSS [3].  ...  It consists of the estimation and checking of link qualities and the checking of neighbor link qualities.  ... 
doi:10.4230/oasics.kivs.2011 fatcat:tf3jwio36jd77njb3uje6snygm

Asynchronous XSLT

Michael Kay
Proceedings of Balisage: The Markup Conference 2020   unpublished
The proposal is particularly motivated by the requirement for asynchronous retrieval of external resources on the Javascript platform (whether client-side or server-side), but other use cases for asynchronous  ...  This paper describes a proposal for language extensions to XSLT 3.0, and to the XDM data model, to provide for asynchronous processing.  ...  On the implementation level, many features are on the road map.  ... 
doi:10.4242/balisagevol25.kay01 fatcat:gq7gn4okejepjo6fkiy23olxiq

Vulnerability modeling and monadic dynamical systems [article]

Cezar Ionescu, Universitätsbibliothek Der FU Berlin, Universitätsbibliothek Der FU Berlin
The present work aims to use insights from functional programming and the underlying mathematics in order to achieve a better understanding of the concept of vulnerability as used in the interdisciplinary  ...  Similarly, we have also formulated compatibility conditions for vulnerability measures defined on structures of different kinds (for example on sets of impact values versus probability distributions over  ...  The road to its realization is, however, quite long and not altogether straight. We have accordingly prepared a road-map for the convenience of our fellow travellers. Road-map 1.  ... 
doi:10.17169/refubium-9458 fatcat:vbkgroihtbegfgbzajslqsmivq


Assoc, Alina-Teodora Ciuhureanu, Assoc George Bălan, Hans -Christian Arbeiter, Gheorghe Bichicean, Assoc, Oleg Curbatov, Paris, France Dootz, Luigi Dumitrescu, Valentina, Chișinău (+19 others)
Annals of the Romanian-German University of Sibiu -Economics No: 12 / 2013 We share the view of American researchers in the field of persuasion Robert Gass and John Seiter (2009, p 41), according to  ...  which: "The definition of a concept is similar to erecting a fence.  ...  For the first time the dividends begin to be consistent for some issuers and the influence of dividends on total efficiency of the exchange exceeds 10%.  ... 

Determining System Requirements for Human-Machine Integration in Cyber Security Incident Response

Megan M Nyre-Yu
for hybrid systems to advance the current state of security automation were developed through three studies.  ...  However, there is still a lack of basic understanding of factors that impact complexity, scope, and effectiveness of cyber defense efforts.  ...  The activity model can be used to guide further conceptual development, and acts as a road map for other components of the functional architecture.  ... 
doi:10.25394/pgs.10014803 fatcat:u26c4ilasne7ffxqwgx6qtpi2e

Neural networks for legal quantum prediction

Andrew J. Terrett
This thesis argues that Artificial Neural Networks (ANN's) have applications within the domain of law and can be built using readily available Artificial Intelligence software for the Personal Computer  ...  The reasons for building a system are three-fold. First, a working system is the most graphic demonstration of my above assertion.  ...  The SQA was consistent in 21 of the 38 cases, (using the same judgment criterion.)  ... 
doi:10.14288/1.0077428 fatcat:2bv4d6wpsverthhobehodhutne

Gender and human-computer interaction [article]

Rosanne Fleury, University Of Calgary, University Of Calgary, Ronald W. Wardell
The notion of sustainable development suggests that development with equity encourages the equitable development of gender-related techology.  ...  The exploration of the game concept results in a list of recommendations and guidelines for designers when approaching gender-sensitive human-computer interaction.  ...  (words. road signs and conventional symbols) User interface signs referring to domain objeccs and to computer-modeled solutions for problems should be heteromaterial, whereas the representation of UO elements  ... 
doi:10.11575/prism/12067 fatcat:yl3lya24unbtdc7qk55mmbfbam

Lifelong education : definition, agreement and prediction

Therese W.H. Shak
The LLE scale consisted of 28 item pairs (postulates and contrasts). Total scores were derived by summing over items.  ...  This is because its central components are not well identified and it calls for a restructuring of education systems.  ...  Experts were used to examine content and construct validity, the pilot subjects for face validity, and both for reliability in internal consistency purposes.  ... 
doi:10.14288/1.0055849 fatcat:26eltp5cznetxdf3ruc57bqetm

The 6×6 stiffness formulation and transformation of serial manipulators via the CCT theory

Shih-Feng Chen
2003 IEEE International Conference on Robotics and Automation (Cat. No.03CH37422)  
One could visualize a proposed construction project before it is built or view virtual signs along a road or path.  ...  The speed at which events of interest occur and the lack of suitable visible imager techologies, have forced T&E ranges to compromise resolution for speed or continue the use of film contributing to environmental  ...  PHASE III: In order for RP machines to be used for low-rate-of-production parts, consistency and quality must be improved.  ... 
doi:10.1109/robot.2003.1242218 dblp:conf/icra/Chen03 fatcat:zmssxoehbzamtoprst3o56vo5m

How do teachers deal with uncertainty in relation to working with children with autism in the context of the introduction of a new technology tool?

Joseph Minz
of autism for autonomy and agency, and uncertainties in relation to the understanding of and use of new technologies per se.  ...  five teachers at the UK school using HANDS.  ...  The coding process involved a repeated deductive/inductive iteration, leading to the review of the codes, to check for ongoing logical consistency and consistency with the text data itself.  ... 
doi:10.15123/pub.1867 fatcat:n7vhluckprbn7im33vtbjchhxa

Deep ocean mining: Prospects for a new international regime

Sudhir Kumar Chopra, Université D'Ottawa / University Of Ottawa, Université D'Ottawa / University Of Ottawa
x xv Official drafts pertaining to the structure of the Authority include: U. N  ...  Jenks, on this expresses his view that "the use of space instrumentalities as a measure of missile launch detection for warning purposes may be regarded as consistent with the exclusive dedication of space  ...  in ocean space as a whole, together with the .power to deal with the use of potentially dangerous, technology for' the marine Further, there was a common view that the'machinery should consist of at .least  ... 
doi:10.20381/ruor-17924 fatcat:iu75x23lbbdh3g54vcvamwwh4e