2017-05-22
Proceedings of the International Conference on Security and Management (SAM ) In Proceedings of the 2014 ACM SIGSAC Conference on Computer and...Communications Security (CCS ’14) In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’10) In Proceedings of the 3rd Symposium...on Usable Privacy and Security (SOUPS ’07) In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’12) In Proceedings of
ERIC Educational Resources Information Center
Branstad, Dennis K., Ed.
The 15 papers and summaries of presentations in this collection provide technical information and guidance offered by representatives from federal agencies and private industry. Topics discussed include physical security, risk assessment, software security, computer network security, and applications and implementation of the Data Encryption…
NASA Technical Reports Server (NTRS)
1985-01-01
The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.
Design Principles and Guidelines for Security
2007-11-21
Padula , Secure Computer Systems: Unified Exposition and Multics Interpretation. Electronic Systems Division, USAF. ESD-TR-75-306, MTR-2997 Rev.1...Hanscom AFB, MA. March 1976 [7] David Elliott Bell. “Looking Back at the Bell-La Padula Model,” Proc. Annual Computer Security Applications Conference
NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 2
Thomas D'Agostino
2017-12-09
Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.
NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 1
Thomas D'Agostino
2017-12-09
Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.
NASA Astrophysics Data System (ADS)
Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kaneko, Masahiro; Kakinuma, Ryutaro; Moriyama, Noriyuki
2010-03-01
Diagnostic MDCT imaging requires a considerable number of images to be read. Moreover, the doctor who diagnoses a medical image is insufficient in Japan. Because of such a background, we have provided diagnostic assistance methods to medical screening specialists by developing a lung cancer screening algorithm that automatically detects suspected lung cancers in helical CT images, a coronary artery calcification screening algorithm that automatically detects suspected coronary artery calcification and a vertebra body analysis algorithm for quantitative evaluation of osteoporosis. We also have developed the teleradiology network system by using web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. Our teleradiology network system can perform Web medical image conference in the medical institutions of a remote place using the web medical image conference system. We completed the basic proof experiment of the web medical image conference system with information security solution. We can share the screen of web medical image conference system from two or more web conference terminals at the same time. An opinion can be exchanged mutually by using a camera and a microphone that are connected with the workstation that builds in some diagnostic assistance methods. Biometric face authentication used on site of teleradiology makes "Encryption of file" and "Success in login" effective. Our Privacy and information security technology of information security solution ensures compliance with Japanese regulations. As a result, patients' private information is protected. Based on these diagnostic assistance methods, we have developed a new computer-aided workstation and a new teleradiology network that can display suspected lesions three-dimensionally in a short time. The results of this study indicate that our radiological information system without film by using computer-aided diagnosis workstation and our teleradiology network system can increase diagnostic speed, diagnostic accuracy and security improvement of medical information.
Bibliography for computer security, integrity, and safety
NASA Technical Reports Server (NTRS)
Bown, Rodney L.
1991-01-01
A bibliography of computer security, integrity, and safety issues is given. The bibliography is divided into the following sections: recent national publications; books; journal, magazine articles, and miscellaneous reports; conferences, proceedings, and tutorials; and government documents and contractor reports.
Telecommunications Policy Research Conference. Computer and Communications Security Section. Papers.
ERIC Educational Resources Information Center
Telecommunications Policy Research Conference, Inc., Washington, DC.
In his paper, "European Needs and Attitudes towards Information Security," Richard I. Polis notes that the needs for security in computer systems, telecommunications, and media are rather uniform throughout Western Europe, and are seen as being significantly different from the needs in the United States. Recognition of these needs is,…
NASA Technical Reports Server (NTRS)
Tencati, Ron
1991-01-01
An overview is presented of the NASA Science Internet (NSI) security task. The task includes the following: policies and security documentation; risk analysis and management; computer emergency response team; incident handling; toolkit development; user consulting; and working groups, conferences, and committees.
ERIC Educational Resources Information Center
Smith, Peter, Ed.
Papers from a conference on small college computing issues are: "Ethics, Privacy, and Security in Higher Education Technology" (John A. Anderson); "Multimedia in the Classroom: Recollections After Two Years" (Stephen T. Anderson Sr.); "Creating a Computer Competency Requirement for Mary Washington College Students" (David J. Ayersman, Ernest C.…
1988-10-20
The LOCK project , from its very beginnings as an implementation study for the Provably Secure Operating System in 1979...to the security field, can study to gain insight into the evaluation process. The project has developed an innovative format for the DTLS and FTLS...management tern becomes available, the Al Secure DBMS will be system (DBMS) that is currently being developed un- ported to it . der the Advanced
Computer-aided Human Centric Cyber Situation Awareness
2016-03-20
in Video, IJCAI: International Joint Conf. on Artificial Intelligence . 16-JUL-11, . : , Kun Sun, Sushil Jajodia, Jason Li, Yi Cheng, Wei Tang...Cyber-Security Conference, June 2015. 2. V.S. Subrahmanian, Invited Speaker, Summer School on Business Intelligence and Big Data Analysis, Capri, Italy... Cybersecurity Conference, Yuval Ne’eman Workshop for Science, Technology and Security, Tel Aviv University, the Israeli National Cyber Bureau, Prime
Approaches to Privacy and Security in Computer Systems. Publication No. 404.
ERIC Educational Resources Information Center
Renninger, Clark R., Ed.
A conference was held at the National Bureau of Standards on March 4-5, 1974 to continue the dialogue in search of ways to protect confidential information in computer systems. Proposals were presented for meeting governmental needs in safeguarding individual privacy and data confidentiality that were identified at a conference held in November…
77 FR 38306 - GFIRST Conference Stakeholder Evaluation
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-27
...), National Cyber Security Division (NCSD), United States Computer Emergency Readiness Team (US-CERT) will...- CERT, [email protected] . SUPPLEMENTARY INFORMATION: GFIRST is DHS's premier cyber conference and continually seeks to enhance collaborative efforts among cyber constituencies, partners, and stakeholders. The...
77 FR 12320 - Information Collection Request: GFIRST Conference Stakeholder Evaluation
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-29
... Communications (CS&C), National Cyber Security Division (NCSD), United States Computer Emergency Readiness Team... personal information provided. SUPPLEMENTARY INFORMATION: The purpose of DHS's premier cyber conference is to continually seek to enhance collaborative efforts between cyber constituencies, partners and...
1986-09-18
physical and administrativo security tech- These methods are, on the whole, at an early 163 • -- I I " • I I I II I ,I U niques. As in many other areas...o,t) I o member-of 0, t member-of (data;files;pgmstsubjects;i/o T and o maps-completely-to t) devices) S :- set of all subjects ( procesoes ;pgms
CSUN's Conference Advances Opportunities for People with Disabilities
ERIC Educational Resources Information Center
Williams, John M.
2006-01-01
This article reports the highlights of the recently concluded Annual International Technology and Persons with Disabilities Conference organized by California State University at Northridge. Attendees from more than 30 countries learned about services provided by the Social Security Administration, GeorgiaTech (CATEA), NISH, Computer/Electronic…
High Speed Oblivious Random Access Memory (HS-ORAM)
2015-09-01
Bryan Parno, “Non-interactive verifiable computing: Outsourcing computation to untrusted workers”, 30th International Cryptology Conference, pp. 465...holder or any other person or corporation; or convey any rights or permission to manufacture , use, or sell any patented invention that may relate to...secure outsourced data access protocols. HS-ORAM deploys a number of server- side software components running inside tamper-proof secure coprocessors
Proceedings from the conference on high speed computing: High speed computing and national security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hirons, K.P.; Vigil, M.; Carlson, R.
1997-07-01
This meeting covered the following topics: technologies/national needs/policies: past, present and future; information warfare; crisis management/massive data systems; risk assessment/vulnerabilities; Internet law/privacy and rights of society; challenges to effective ASCI programmatic use of 100 TFLOPs systems; and new computing technologies.
Channels: Runtime System Infrastructure for Security-typed Languages
2008-10-01
Milan , Italy, September 2005. Springer-Verlag. [2] D. E. Bell and L. J. LaPadula. Secure computer system: Uni- fied exposition and Multics...Proceedings of the USENIX Annual Technical Conference, Santa Clara, CA, USA, June 2007. To appear. [9] S. Kamara, S. Fahmy, E. Schultz , F. Kerschbaum, and
Foundations for Security Aware Software Development Education
2005-11-22
depending on the budget, that support robustness. We discuss the educational customer base, projected lifetime, and complexity of paradigm shift that should...in Honour of Sir Tony Hoar, [6] Cheetham, C. and Ferraiolo, K., "The Systems Security Millenial Perspectives in Computer Science, Engineering...Capability Maturity Model", 21st 2002, 229-246. National Information Systems Security Conference, [15] Schwartz, J., "Object Oriented Extensions to October 5
1991-06-01
Proceedings of The National Conference on Artificial Intelligence , pages 181-184, The American Association for Aritificial Intelligence , Pittsburgh...Intermediary Resource: Intelligent Executive Computer Communication John Lyman and Carla J. Conaway University of California at Los Angeles for Contracting...Include Security Classification) Interim Report: Distributed Problem Solving: Adaptive Networks With a Computer Intermediary Resource: Intelligent
1987-09-24
Some concerns take on rating (e.g., ’Zl’) that adequately reflects increased significance in the network how well the system provides each service...to how well a M.•.imum, Fair, Good); however, in specific spicific approach may be expected to achieve cases, ratings such as "plesent" or "approved...established thresholds, Supportive policies include idertification and and for detecting the fact that access to a authentication policies as well as
1992-10-16
the DNA Fingerprint Laboratory. The Los Angeles Police Department and its former Chief, Daryl Gates for permitting a secret unit, the ...authorized to change information in. Conclusions Where angels fear .... Of all the reasons for compartmentation for which the level of evaluation...database, and a security label attribute is associated with data in each tuple in a relation. The range and distribution of security levels may
1993-09-23
answer to the question: Is subject s allowed access type a on object o? An authorization was thus seen as a 3-tuple (s,o,a). This view of access...called trusted in a Bell-LaPadula architecture. Work at Carnegie Mellon University on type enforcement contemporaneous with Denning’s was not addressed in...34Implementation Considerations for the Typed Access Matrix Model in a Distributed Environment," Proceedings of the 15th National Computer Security
1989-10-13
and other non -technical aspects of the system). System-wide Perspective. The systerm that is being designed and engineered must include not just the...specifications and is regarded as the lowest-level (implementation) of detail.-’ Ihis decomposition follows the typical "top down" design methodology ...formal verification process has contributed to the security and correctness of the TCB design and implementation. FORMUL METHODOLOGY DESCRIPTION The
2016-05-06
ABSTRACT Awards: Best Paper Honorable Mention Award at the SIAM (Society for Industrial and Applied Mathematics Conference on Data Mining (SDM...magnitude in computation time over the state of the art. 15. SUBJECT TERMS Data Mining 16. SECURITY CLASSIFICATION OF: 17...International Conference on Data Mining and received Best Paper Honorable mention. To ensure broad use and uptake of the outcomes of this research
The 6th International Conference on Computer Science and Computational Mathematics (ICCSCM 2017)
NASA Astrophysics Data System (ADS)
2017-09-01
The ICCSCM 2017 (The 6th International Conference on Computer Science and Computational Mathematics) has aimed to provide a platform to discuss computer science and mathematics related issues including Algebraic Geometry, Algebraic Topology, Approximation Theory, Calculus of Variations, Category Theory; Homological Algebra, Coding Theory, Combinatorics, Control Theory, Cryptology, Geometry, Difference and Functional Equations, Discrete Mathematics, Dynamical Systems and Ergodic Theory, Field Theory and Polynomials, Fluid Mechanics and Solid Mechanics, Fourier Analysis, Functional Analysis, Functions of a Complex Variable, Fuzzy Mathematics, Game Theory, General Algebraic Systems, Graph Theory, Group Theory and Generalizations, Image Processing, Signal Processing and Tomography, Information Fusion, Integral Equations, Lattices, Algebraic Structures, Linear and Multilinear Algebra; Matrix Theory, Mathematical Biology and Other Natural Sciences, Mathematical Economics and Financial Mathematics, Mathematical Physics, Measure Theory and Integration, Neutrosophic Mathematics, Number Theory, Numerical Analysis, Operations Research, Optimization, Operator Theory, Ordinary and Partial Differential Equations, Potential Theory, Real Functions, Rings and Algebras, Statistical Mechanics, Structure Of Matter, Topological Groups, Wavelets and Wavelet Transforms, 3G/4G Network Evolutions, Ad-Hoc, Mobile, Wireless Networks and Mobile Computing, Agent Computing & Multi-Agents Systems, All topics related Image/Signal Processing, Any topics related Computer Networks, Any topics related ISO SC-27 and SC- 17 standards, Any topics related PKI(Public Key Intrastructures), Artifial Intelligences(A.I.) & Pattern/Image Recognitions, Authentication/Authorization Issues, Biometric authentication and algorithms, CDMA/GSM Communication Protocols, Combinatorics, Graph Theory, and Analysis of Algorithms, Cryptography and Foundation of Computer Security, Data Base(D.B.) Management & Information Retrievals, Data Mining, Web Image Mining, & Applications, Defining Spectrum Rights and Open Spectrum Solutions, E-Comerce, Ubiquitous, RFID, Applications, Fingerprint/Hand/Biometrics Recognitions and Technologies, Foundations of High-performance Computing, IC-card Security, OTP, and Key Management Issues, IDS/Firewall, Anti-Spam mail, Anti-virus issues, Mobile Computing for E-Commerce, Network Security Applications, Neural Networks and Biomedical Simulations, Quality of Services and Communication Protocols, Quantum Computing, Coding, and Error Controls, Satellite and Optical Communication Systems, Theory of Parallel Processing and Distributed Computing, Virtual Visions, 3-D Object Retrievals, & Virtual Simulations, Wireless Access Security, etc. The success of ICCSCM 2017 is reflected in the received papers from authors around the world from several countries which allows a highly multinational and multicultural idea and experience exchange. The accepted papers of ICCSCM 2017 are published in this Book. Please check http://www.iccscm.com for further news. A conference such as ICCSCM 2017 can only become successful using a team effort, so herewith we want to thank the International Technical Committee and the Reviewers for their efforts in the review process as well as their valuable advices. We are thankful to all those who contributed to the success of ICCSCM 2017. The Secretary
Ambient Human-to-Human Communication
NASA Astrophysics Data System (ADS)
Härmä, Aki
In the current technological landscape colored by environmental and security concerns the logic of replacing traveling by technical means of communications is undisputable. For example, consider a comparison between a normal family car and a video conference system with two laptop computers connected over the Internet. The power consumption of the car is approximately 25 kW while the two computers and their share of the power consumption in the intermediate routers in total is in the range of 50 W. Therefore, to meet a person using a car at an one hour driving distance is equivalent to 1000 hours of video conference. The difference in the costs is also increasing. An estimate on the same cost difference between travel and video conference twenty years ago gave only three days of continuous video conference for the same situation [29]. The cost of video conference depends on the duration of the session while traveling depends only on the distance. However, in a strict economical and environmental sense even a five minute trip by a car in 2008 becomes more economical than a video conference only when the meeting lasts more than three and half days.
Acquisition of a High Performance Computing Instrument for Big Data Research and Education
2015-12-03
Security and Privacy , University of Texas at Dallas, TX, September 16-17, 2014. • Chopade, P., Zhan, J., Community Detection in Large Scale Big Data...Security and Privacy in Communication Networks, Beijing, China, September 24-26, 2014. • Pravin Chopade, Kenneth Flurchick, Justin Zhan and Marwan...Balkirat Kaur, Malcolm Blow, and Justin Zhan, Digital Image Authentication in Social Media, The Sixth ASE International Conference on Privacy
1988-10-20
bito t- (li e 11 111.1m to ue’i trilt’se tol’ it[I I ~llc~ .) Aguill, it’ is ,eptiolls aboutlN’I’EsN tL...S YS’A’/t! t a n ittc itile Lltcil f v il...carchinig. Vice notifies Venus Vice aeCss lists. LOGIN, LOC ., rind sit are modified versions of standard whtenever tie protection oil a cachted dtirectory...within a COMSEC component. These examples illustrate the composition of COMSEC and COMPUSEC Acknowledarmnt bito an overall INFOSEG architecture. The
Modeling and Simulation Environment for Critical Infrastructure Protection
2006-06-20
address at the triennial International Symposium on Mathematical Programming, held in Copenhagen, Denmark in August 2003. Finally, in very recent work... Teleworking - The human and organizational issues of computer and information security. Paper presented at the 11th Annual Conference on Human
Statistical Observations of Positioning, Navigation, and Timing in a Combat Simulation
2015-03-26
GPS spoofing attacks," in Proceedings of the 18th ACM Conference on Computer and Communications Security, Chicago , 2011. 63 [10] A. Pinker and...D. Shepard , "Characterization of receiver response to spoofing attacks," University of Texas at Austin, Austin, Texas, 2011. 65
1990-10-04
methods Category 6: Cryptographic methods (hard/ software ) - Tested countermeasures and standard means - Acknowledgements As the number of antivirus ...Skulason), only our own antiviruses have been mentioned in the catalog. We hope to include the major antivirus packages in the future. The current...Center GTE SRI International Trusted Information Systems, Inc. Grumann Data Systems SRI International Software Engineering Institute Trusted
6 CFR 13.19 - Prehearing conferences.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Prehearing conferences. 13.19 Section 13.19 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.19 Prehearing conferences. (a) The ALJ may schedule prehearing conferences as appropriate. (b...
Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol
2010-01-01
Conference on Advances in Cryptology, pages 169–177, London, UK, 1991. Springer-Verlag. [6] Stefan Brands and David Chaum . Distance-bounding protocols. In...Lecture Notes in Computer Science, pages 371–388. Springer, 2004. [30] Patrick Schaller, Benedikt Schmidt, David Basin, and Srdjan Capkun. Modeling and
76 FR 61950 - Security Zones, 2011 Asia-Pacific Economic Cooperation Conference, Oahu, HI
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-06
...-AA87 Security Zones, 2011 Asia-Pacific Economic Cooperation Conference, Oahu, HI AGENCY: Coast Guard... of the Asia-Pacific Economic Cooperation (APEC) conference in Oahu, Hawaii. The establishment of... necessary security measures required for the Asia-Pacific Economic Cooperation conference held on Oahu. We...
The Third Annual NASA Science Internet User Working Group Conference
NASA Technical Reports Server (NTRS)
Lev, Brian S. (Editor); Gary, J. Patrick (Editor)
1993-01-01
The NASA Science Internet (NSI) User Support Office (USO) sponsored the Third Annual NSI User Working Group (NSIUWG) Conference March 30 through April 3, 1992, in Greenbelt, MD. Approximately 130 NSI users attended to learn more about the NSI, hear from projects which use NSI, and receive updates about new networking technologies and services. This report contains material relevant to the conference; copies of the agenda, meeting summaries, presentations, and descriptions of exhibitors. Plenary sessions featured a variety of speakers, including NSI project management, scientists, and NSI user project managers whose projects and applications effectively use NSI, and notable citizens of the larger Internet community. The conference also included exhibits of advanced networking applications; tutorials on internetworking, computer security, and networking technologies; and user subgroup meetings on the future direction of the conference, networking, and user services and applications.
1980-01-01
filter and select out. You use your nose - or heuristics. That is just maturity. The only thing we can do is help people discuss possible models of their...Decision models / Conversation Theory Decision training Team decisions Man-computer interaction Learning strategies 2& ANTAACT (Cme1 revere le N nneesmod...paper by Maria Novakowska on a new model of decision under risk. , /V TI I~ 4 A SECURITY CLASSIFICATION OF TIS PAOUI(Ves Date EntetQ ii ,ln 1 to hi
NASA Astrophysics Data System (ADS)
Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kakinuma, Ryutaru; Moriyama, Noriyuki
2009-02-01
Mass screening based on multi-helical CT images requires a considerable number of images to be read. It is this time-consuming step that makes the use of helical CT for mass screening impractical at present. Moreover, the doctor who diagnoses a medical image is insufficient in Japan. To overcome these problems, we have provided diagnostic assistance methods to medical screening specialists by developing a lung cancer screening algorithm that automatically detects suspected lung cancers in helical CT images, a coronary artery calcification screening algorithm that automatically detects suspected coronary artery calcification and a vertebra body analysis algorithm for quantitative evaluation of osteoporosis likelihood by using helical CT scanner for the lung cancer mass screening. The functions to observe suspicious shadow in detail are provided in computer-aided diagnosis workstation with these screening algorithms. We also have developed the telemedicine network by using Web medical image conference system with the security improvement of images transmission, Biometric fingerprint authentication system and Biometric face authentication system. Biometric face authentication used on site of telemedicine makes "Encryption of file" and "Success in login" effective. As a result, patients' private information is protected. We can share the screen of Web medical image conference system from two or more web conference terminals at the same time. An opinion can be exchanged mutually by using a camera and a microphone that are connected with workstation. Based on these diagnostic assistance methods, we have developed a new computer-aided workstation and a new telemedicine network that can display suspected lesions three-dimensionally in a short time. The results of this study indicate that our radiological information system without film by using computer-aided diagnosis workstation and our telemedicine network system can increase diagnostic speed, diagnostic accuracy and security improvement of medical information.
CompGC: Efficient Offline/Online Sem i-honest Two-party Computation
2016-04-22
Rivest, and A. T. Sherman, Eds., Plenum Press, New York, USA, pp. 205–210. 13 [9] Goldreich, O. Foundations of Cryptography : Volume 2, Basic...low depth circuits. In FC 2013: 17th International Conference on Financial Cryptography and Data Security (Okinawa, Japan, Apr. 1–5, 2013), A.-R
1996-10-25
coercing bankers to assist them in their money -laundering activities; or to tap into the multibillion dollar pension funds of labor unions. (3) The...payment systems, have dramatically facilitated the transborder movement of syndicate money . Structure of the Syndicate The very term syndicate or...for the syndicates; i.e., computer/E-mail crimes, data thefts, computer sabotage, high-tech pornography, money laundering, and so forth. The third
PREFACE: International Conference on Applied Sciences 2015 (ICAS2015)
NASA Astrophysics Data System (ADS)
Lemle, Ludovic Dan; Jiang, Yiwen
2016-02-01
The International Conference on Applied Sciences ICAS2015 took place in Wuhan, China on June 3-5, 2015 at the Military Economics Academy of Wuhan. The conference is regularly organized, alternatively in Romania and in P.R. China, by Politehnica University of Timişoara, Romania, and Military Economics Academy of Wuhan, P.R. China, with the joint aims to serve as a platform for exchange of information between various areas of applied sciences, and to promote the communication between the scientists of different nations, countries and continents. The topics of the conference cover a comprehensive spectrum of issues from: >Economical Sciences and Defense: Management Sciences, Business Management, Financial Management, Logistics, Human Resources, Crisis Management, Risk Management, Quality Control, Analysis and Prediction, Government Expenditure, Computational Methods in Economics, Military Sciences, National Security, and others... >Fundamental Sciences and Engineering: Interdisciplinary applications of physics, Numerical approximation and analysis, Computational Methods in Engineering, Metallic Materials, Composite Materials, Metal Alloys, Metallurgy, Heat Transfer, Mechanical Engineering, Mechatronics, Reliability, Electrical Engineering, Circuits and Systems, Signal Processing, Software Engineering, Data Bases, Modeling and Simulation, and others... The conference gathered qualified researchers whose expertise can be used to develop new engineering knowledge that has applicability potential in Engineering, Economics, Defense, etc. The number of participants was 120 from 11 countries (China, Romania, Taiwan, Korea, Denmark, France, Italy, Spain, USA, Jamaica, and Bosnia and Herzegovina). During the three days of the conference four invited and 67 oral talks were delivered. Based on the work presented at the conference, 38 selected papers have been included in this volume of IOP Conference Series: Materials Science and Engineering. These papers present new research in the various fields of Materials Engineering, Mechanical Engineering, Computers Engineering, and Electrical Engineering. It's our great pleasure to present this volume of IOP Conference Series: Materials Science and Engineering to the scientific community to promote further research in these areas. We sincerely hope that the papers published in this volume will contribute to the advancement of knowledge in the respective fields.
Using Artificial Physics to Control Agents
1999-11-01
unlimited 13. SUPPLEMENTARY NOTES IEEE International Conference on Information, Intelligence, and Systems, Oct 31 -Nov 3,1999. Bethesda, MD 14. ABSTRACT...distributed control can also perform distributed computation. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same...1995. [9] H. Pattee. Artificial life needs a real epistemology. In Moran, Moreno, Merelo, and Chacon , editors, Advances in Artificial Life, pages
2008 Homeland Security S and T Stakeholders Conference West
2008-01-16
Untitled Document 2008hls.html[5/26/ 2016 8:25:16 AM] 2008 Homeland Security S&T Stakeholders Conference West “Putting First Responders First” Los...Sector Commander/Captain of the Port, U.S. Coast Guard Sector Los Angeles - Long Beach Mr. Mark Denari, Director, Aviation Security & Public Safety...Document 2008hls.html[5/26/ 2016 8:25:16 AM] Pre Conference Training Workshop Monday, 14 January 2008 Training Session 3:Better Security via Randomization
Predictive Anomaly Management for Resilient Virtualized Computing Infrastructures
2015-05-27
PREC: Practical Root Exploit Containment for Android Devices, ACM Conference on Data and Application Security and Privacy (CODASPY) . 03-MAR-14...05-OCT-11, . : , Hiep Nguyen, Yongmin Tan, Xiaohui Gu. Propagation-aware Anomaly Localization for Cloud Hosted Distributed Applications , ACM...Workshop on Managing Large-Scale Systems via the Analysis of System Logs and the Application of Machine Learning Techniques (SLAML) in conjunction with SOSP
Waterside Security 2010 (WSS 2010) Conference: Post Conference Report
2011-02-01
Memorandum Report NURC-MR-2011-002 Waterside Security 2010 (WSS2010) Conference: post conference report Ronald Kessel and...in NATO, NURC conducts maritime research in support of NATO’s operational and transformation requirements. Reporting to the Supreme Allied Commander...independent business process certification. Copyright © NURC 2011. NATO member nations have unlimited rights to use, modify, reproduce, release
5 CFR 9701.518 - Duty to bargain, confer, and consult.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Duty to bargain, confer, and consult. 9701.518 Section 9701.518 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.518 Duty to bargain, confer...
A Model of Onion Routing With Provable Anonymity
2006-08-30
Lysyanskaya. “A Formal Treatment of Onion Routing.” CRYPTO 2005, pp. 169.187, 2005. [4] David Chaum . “The dining cryptographers problem...1988. [5] David Chaum . “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.” Communi- cations of the ACM, 24(2), pp. 84-88, 1981...network layer.” ACM Conference on Computer and Communications Security, pp. 193-206, 2002. [11] David Goldschlag, Michael Reed, and Paul Syverson
NASA Astrophysics Data System (ADS)
Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kaneko, Masahiro; Kakinuma, Ryutaru; Moriyama, Noriyuki
2011-03-01
We have developed the teleradiology network system with a new information security solution that provided with web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. We are studying the secret sharing scheme as a method safely to store or to transmit the confidential medical information used with the teleradiology network system. The confidential medical information is exposed to the risk of the damage and intercept. Secret sharing scheme is a method of dividing the confidential medical information into two or more tallies. Individual medical information cannot be decoded by using one tally at all. Our method has the function of RAID. With RAID technology, if there is a failure in a single tally, there is redundant data already copied to other tally. Confidential information is preserved at an individual Data Center connected through internet because individual medical information cannot be decoded by using one tally at all. Therefore, even if one of the Data Centers is struck and information is damaged, the confidential medical information can be decoded by using the tallies preserved at the data center to which it escapes damage. We can safely share the screen of workstation to which the medical image of Data Center is displayed from two or more web conference terminals at the same time. Moreover, Real time biometric face authentication system is connected with Data Center. Real time biometric face authentication system analyzes the feature of the face image of which it takes a picture in 20 seconds with the camera and defends the safety of the medical information. We propose a new information transmission method and a new information storage method with a new information security solution.
2016-11-01
in the FY2017 NDAA Congressional Research Service Summary During the lame duck session, the 114th Congress is expected to consider various...the lame duck session beginning in November is expected to address the NDAA conference report. Security cooperation provisions in the conference report...U.S. security assistance authorities, see Defense Security Cooperation Agency (DSCA), Defense Institute of Security Cooperation Studies , “Chapter 2
Real Time Conference 2016 Overview
NASA Astrophysics Data System (ADS)
Luchetta, Adriano
2017-06-01
This is a special issue of the IEEE Transactions on Nuclear Science containing papers from the invited, oral, and poster presentation of the 20th Real Time Conference (RT2016). The conference was held June 6-10, 2016, at Centro Congressi Padova “A. Luciani,” Padova, Italy, and was organized by Consorzio RFX (CNR, ENEA, INFN, Università di Padova, Acciaierie Venete SpA) and the Istituto Nazionale di Fisica Nucleare. The Real Time Conference is multidisciplinary and focuses on the latest developments in real-time techniques in high-energy physics, nuclear physics, astrophysics and astroparticle physics, nuclear fusion, medical physics, space instrumentation, nuclear power instrumentation, general radiation instrumentation, and real-time security and safety. Taking place every second year, it is sponsored by the Computer Application in Nuclear and Plasma Sciences technical committee of the IEEE Nuclear and Plasma Sciences Society. RT2016 attracted more than 240 registrants, with a large proportion of young researchers and engineers. It had an attendance of 67 students from many countries.
Secure quantum signatures: a practical quantum technology (Conference Presentation)
NASA Astrophysics Data System (ADS)
Andersson, Erika
2016-10-01
Modern cryptography encompasses much more than encryption of secret messages. Signature schemes are widely used to guarantee that messages cannot be forged or tampered with, for example in e-mail, software updates and electronic commerce. Messages are also transferrable, which distinguishes digital signatures from message authentication. Transferability means that messages can be forwarded; in other words, that a sender is unlikely to be able to make one recipient accept a message which is subsequently rejected by another recipient if the message is forwarded. Similar to public-key encryption, the security of commonly used signature schemes relies on the assumed computational difficulty of problems such as finding discrete logarithms or factoring large primes. With quantum computers, such assumptions would no longer be valid. Partly for this reason, it is desirable to develop signature schemes with unconditional or information-theoretic security. Quantum signature schemes are one possible solution. Similar to quantum key distribution (QKD), their unconditional security relies only on the laws of quantum mechanics. Quantum signatures can be realized with the same system components as QKD, but are so far less investigated. This talk aims to provide an introduction to quantum signatures and to review theoretical and experimental progress so far.
Preliminary Analysis of a Trusted Platform Module (TPM) Initialization Process
2007-06-01
during system startup. For a laptop, extra precaution must be taken to prevent the machine from transitioning into a Sleep or Hibernate mode, since... hibernate mode [81]. D. TEST AND AUDIT After the system has gone through the predefined initialization and configuration processes, it needs to go...Conference on Computer and Communications Security, 2004, pp. 308-317. [45] L. Sarmenta, “TPM/J java -based API for the Trusted Platform Module (TPM
2008 Homeland Security S and T Stakeholders Conference West-Volume 3 Tuesday
2008-01-16
Architecture ( PNNL SRS) • Online data collection / entry • Data Warehouse • On Demand Analysis and Reporting Tools • Reports, Charts & Graphs • Visual / Data...Sustainability 2007– 2016 Our region wide investment include all PANYNJ business areas Computer Statistical Analysis COMPSTAT •NYPD 1990’s •Personnel Management...Coast Guard, and public health Expertise, Depth, Agility Staff Degrees 6 Our Value Added Capabilities • Risk Analysis • Operations Analysis
NASA Astrophysics Data System (ADS)
The present conference discusses topics in multiwavelength network technology and its applications, advanced digital radio systems in their propagation environment, mobile radio communications, switching programmability, advancements in computer communications, integrated-network management and security, HDTV and image processing in communications, basic exchange communications radio advancements in digital switching, intelligent network evolution, speech coding for telecommunications, and multiple access communications. Also discussed are network designs for quality assurance, recent progress in coherent optical systems, digital radio applications, advanced communications technologies for mobile users, communication software for switching systems, AI and expert systems in network management, intelligent multiplexing nodes, video and image coding, network protocols and performance, system methods in quality and reliability, the design and simulation of lightwave systems, local radio networks, mobile satellite communications systems, fiber networks restoration, packet video networks, human interfaces for future networks, and lightwave networking.
Security Games Applied to Real-World: Research Contributions and Challenges
2012-01-01
Marecki, J.: GUARDS and PROTECT: Next Generation Applications of Security Games . SIGECOM 10 (March 2011) 31–34 4. Shieh, E ., An, B., Yang, R., Tambe...Steigerwald, E .: GUARDS - Game Theoretic Security Allocation on a National Scale. In: Proc. of The 10th International Conference on Autonomous Agents...Shieh, E ., Kiekintveld, C.: Refinement of Strong Stackelberg Equilibria in Security Games . In: Proc. of the 25th Conference on Artificial Intelligence
78 FR 59013 - President's Council of Advisors on Science and Technology
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-25
... Cyber-security report. DATES: The public conference call will be held on Monday, October 7, 2013, from 4.... to 4:30 p.m. (ET) During the conference call, PCAST will discuss its Cyber-security report...
1992-10-16
The Spread of Viruses Programs have been developed to attack some of these problems , primarily in the virus arena. Pick up any PC magazine and you...a particular DBMS-specific research area. These documents discuss the research problem , present an overview of relevant research and development ...MITRE has developed to date and a brief discussion those documents currently under development . For each companion document, the problem being
Editors' Preface to Special Issue on Drinking Water Safety, Security, and Sustainability
Recognizing these needs, researchers from Zhejiang University (China), the US EPA and the University of Alberta (Canada) organized the “International Conference on Drinking Water Safety, Security and Sustainability” in October 2011 in Hangzhou, China. The conference was attended...
PREFACE: IUPAP C20 Conference on Computational Physics (CCP 2011)
NASA Astrophysics Data System (ADS)
Troparevsky, Claudia; Stocks, George Malcolm
2012-12-01
Increasingly, computational physics stands alongside experiment and theory as an integral part of the modern approach to solving the great scientific challenges of the day on all scales - from cosmology and astrophysics, through climate science, to materials physics, and the fundamental structure of matter. Computational physics touches aspects of science and technology with direct relevance to our everyday lives, such as communication technologies and securing a clean and efficient energy future. This volume of Journal of Physics: Conference Series contains the proceedings of the scientific contributions presented at the 23rd Conference on Computational Physics held in Gatlinburg, Tennessee, USA, in November 2011. The annual Conferences on Computational Physics (CCP) are dedicated to presenting an overview of the most recent developments and opportunities in computational physics across a broad range of topical areas and from around the world. The CCP series has been in existence for more than 20 years, serving as a lively forum for computational physicists. The topics covered by this conference were: Materials/Condensed Matter Theory and Nanoscience, Strongly Correlated Systems and Quantum Phase Transitions, Quantum Chemistry and Atomic Physics, Quantum Chromodynamics, Astrophysics, Plasma Physics, Nuclear and High Energy Physics, Complex Systems: Chaos and Statistical Physics, Macroscopic Transport and Mesoscopic Methods, Biological Physics and Soft Materials, Supercomputing and Computational Physics Teaching, Computational Physics and Sustainable Energy. We would like to take this opportunity to thank our sponsors: International Union of Pure and Applied Physics (IUPAP), IUPAP Commission on Computational Physics (C20), American Physical Society Division of Computational Physics (APS-DCOMP), Oak Ridge National Laboratory (ORNL), Center for Defect Physics (CDP), the University of Tennessee (UT)/ORNL Joint Institute for Computational Sciences (JICS) and Cray, Inc. We are grateful to the committees that helped put the conference together, especially the local organizing committee. Particular thanks are also due to a number of ORNL staff who spent long hours with the administrative details. We are pleased to express our thanks to the conference administrator Ann Strange (ORNL/CDP) for her responsive and efficient day-to-day handling of this event, Sherry Samples, Assistant Conference Administrator (ORNL), Angie Beach and the ORNL Conference Office, and Shirley Shugart (ORNL) and Fern Stooksbury (ORNL) who created and maintained the conference website. Editors: G Malcolm Stocks (ORNL) and M Claudia Troparevsky (UT) http://ccp2011.ornl.gov Chair: Dr Malcolm Stocks (ORNL) Vice Chairs: Adriana Moreo (ORNL/UT) James Guberrnatis (LANL) Local Program Committee: Don Batchelor (ORNL) Jack Dongarra (UTK/ORNL) James Hack (ORNL) Robert Harrison (ORNL) Paul Kent (ORNL) Anthony Mezzacappa (ORNL) Adriana Moreo (ORNL) Witold Nazarewicz (UT) Loukas Petridis (ORNL) David Schultz (ORNL) Bill Shelton (ORNL) Claudia Troparevsky (ORNL) Mina Yoon (ORNL) International Advisory Board Members: Joan Adler (Israel Institute of Technology, Israel) Constantia Alexandrou (University of Cyprus, Cyprus) Claudia Ambrosch-Draxl (University of Leoben, Austria) Amanda Barnard (CSIRO, Australia) Peter Borcherds (University of Birmingham, UK) Klaus Cappelle (UFABC, Brazil) Giovanni Ciccotti (Università degli Studi di Roma 'La Sapienza', Italy) Nithaya Chetty (University of Pretoria, South Africa) Charlotte Froese-Fischer (NIST, US) Giulia A. Galli (University of California, Davis, US) Gillian Gehring (University of Sheffield, UK) Guang-Yu Guo (National Taiwan University, Taiwan) Sharon Hammes-Schiffer (Penn State, US) Alex Hansen (Norweigan UST) Duane D. Johnson (University of Illinois at Urbana-Champaign, US) David Landau (University of Georgia, US) Joaquin Marro (University of Granada, Spain) Richard Martin (UIUC, US) Todd Martinez (Stanford University, US) Bill McCurdy (Lawrence Berkeley National Laboratory, US) Ingrid Mertig (Martin Luther University, Germany) Alejandro Muramatsu (Universitat Stuttgart, Germany) Richard Needs (Cavendish Laboratory, UK) Giuseppina Orlandini (University of Trento, Italy) Martin Savage (University of Washington, US) Thomas Schulthess (ETH, Switzerland) Dzidka Szotek (Daresbury Laboratory, UK) Hideaki Takabe (Osaka University, Japan) William M. Tang (Princeton University, US) James Vary (Iowa State, US) Enge Wang (Chinese Academy of Science, China) Jian-Guo Wang (Institute of Applied Physics and Computational Mathematics, China) Jian-Sheng Wang (National University, Singapore) Dan Wei (Tsinghua University, China) Tony Williams (University of Adelaide, Australia) Rudy Zeller (Julich, Germany) Conference Administrator: Ann Strange (ORNL)
The 12th International Conference on Computer Safety, Reliability and Security
1993-10-29
then used [10]. The adequacy of the proposed methodology is shown through the design and the validation of a simple control system: a train set example...satisfying the safety condition. 4 Conclusions In this paper we have presented a methodology which can be used for the design of safety-critical systems...has a Burner but no Detector (or the Detector is permanently non -active). The PA: G1 for this design is shown in Fig 3a. The probability matrices are
Provable Security of Communication for Protecting Information Flow in Distributed Systems
2015-06-01
tensorization of extremal mutual information quantities, which have been of recent...Control, and Computing, Oct. 2012. 25) T. Wang, J. Sturm, P. Cuff, S. Kulkarni, “Condorcet Voting ...Methods Avoid the Paradoxes of Voting Theory,” Proc. of the Allerton Conference on Communication,
2000-09-21
This camper-equipped truck known as “Old Blue” served as mobile field command center for the Emergency Preparedness team at KSC. It has been replaced with a larger vehicle that includes a conference room, computer work stations, mobile telephones and a fax machine, plus its own onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or Cape Canaveral Air Force Station
2000-09-21
This new specially equipped vehicle serves as a mobile command center for emergency preparedness staff and other support personnel when needed at KSC or Cape Canaveral Air Force Station. It features a conference room, computer work stations, mobile telephones and a fax machine. It also can generate power with its onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or CCAFS
2000-09-21
This new specially equipped vehicle serves as a mobile command center for emergency preparedness staff and other support personnel when needed at KSC or Cape Canaveral Air Force Station. It features a conference room, computer work stations, mobile telephones and a fax machine. It also can generate power with its onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or CCAFS
2000-09-21
This camper-equipped truck known as “Old Blue” served as mobile field command center for the Emergency Preparedness team at KSC. It has been replaced with a larger vehicle that includes a conference room, computer work stations, mobile telephones and a fax machine, plus its own onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or Cape Canaveral Air Force Station
Cost Comparison Among Provable Data Possession Schemes
2016-03-01
possession,” in Proceedings of the 11th International Conference on Ap- plied Cryptography and Network Security. Berlin, Heidelberg: Springer-Verlag, 2013...curves,” in Security and Cryptography (SECRYPT), 2013 International Conference on, July 2013, pp. 1–12. [19] R. S. Kumar and A. Saxena, “Data integrity
78 FR 10180 - Annual Computational Science Symposium; Conference
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-13
...] Annual Computational Science Symposium; Conference AGENCY: Food and Drug Administration, HHS. ACTION... Computational Science Symposium.'' The purpose of the conference is to help the broader community align and share experiences to advance computational science. At the conference, which will bring together FDA...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-15
... issues implicated by agency use of social media to support rulemaking. The Conference's consultant for... Committee on Adjudication will meet to consider a draft report and recommendations on social security... and recommendations based on legal and empirical analysis of the Social Security Administration's...
Strategy for Peace. Annual U.S. Foreign Policy Conference (22nd, October 16-18, 1981).
ERIC Educational Resources Information Center
Stanley Foundation, Muscatine, IA.
Five discussion topics concerning peace were dealt with by conference participants, who included university faculty and officials from national and international agencies and organizations. The first topic, North-South relations and international security, considers U.S. security and the Third World, U.S. economic interests in the developing…
World Food Security and Insecurity, 1974-84.
ERIC Educational Resources Information Center
Kriesberg, Martin
In the decade since the World Food Conference of 1974, increased attention has been directed to the problems of world food security. The emphasis on technologies of production, while important, have not sufficed. Two major shortcomings of the World Food Conference and the efforts it stimulated were (1) the failure to recognize the relationship…
NASA Astrophysics Data System (ADS)
Papa, Mauricio; Shenoi, Sujeet
The information infrastructure -- comprising computers, embedded devices, networks and software systems -- is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: - Themes and Issues - Infrastructure Security - Control Systems Security - Security Strategies - Infrastructure Interdependencies - Infrastructure Modeling and Simulation This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.
The new Mobile Command Center at KSC is important addition to emergency preparedness
NASA Technical Reports Server (NTRS)
2000-01-01
This new specially equipped vehicle serves as a mobile command center for emergency preparedness staff and other support personnel when needed at KSC or Cape Canaveral Air Force Station. It features a conference room, computer work stations, mobile telephones and a fax machine. It also can generate power with its onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or CCAFS.
2000-09-21
Charles Street, Roger Scheidt and Robert ZiBerna, the Emergency Preparedness team at KSC, sit in the conference room inside the Mobile Command Center, a specially equipped vehicle. Nicknamed “The Brute,” it also features computer work stations, mobile telephones and a fax machine. It also can generate power with its onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or Cape Canaveral Air Force Station
2000-09-21
Robert ZiBerna, Roger Scheidt and Charles Street, the Emergency Preparedness team at KSC, practice for an emergency scenario inside the Mobile Command Center, a specially equipped vehicle. It features a conference room, computer work stations, mobile telephones and a fax machine. It also can generate power with its onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or Cape Canaveral Air Force Station
2000-09-21
Charles Street, Roger Scheidt and Robert ZiBerna, the Emergency Preparedness team at KSC, sit in the conference room inside the Mobile Command Center, a specially equipped vehicle. Nicknamed “The Brute,” it also features computer work stations, mobile telephones and a fax machine. It also can generate power with its onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or Cape Canaveral Air Force Station
2000-09-21
Robert ZiBerna, Roger Scheidt and Charles Street, the Emergency Preparedness team at KSC, practice for an emergency scenario inside the Mobile Command Center, a specially equipped vehicle. It features a conference room, computer work stations, mobile telephones and a fax machine. It also can generate power with its onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or Cape Canaveral Air Force Station
The new Mobile Command Center at KSC is important addition to emergency preparedness
NASA Technical Reports Server (NTRS)
2000-01-01
This camper-equipped truck known as '''Old Blue''' served as mobile field command center for the Emergency Preparedness team at KSC. It has been replaced with a larger vehicle that includes a conference room, computer work stations, mobile telephones and a fax machine, plus its own onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or Cape Canaveral Air Force Station.
NASA Astrophysics Data System (ADS)
Shuja Syed, Ahmed
2013-12-01
The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want to thank the Organizing Committee, the Institutions and Sponsors supporting the Conference, especially 'Centre for Emerging Sciences, Engineering & Technology (CESET), Islamabad', the IOP Publishers and everyone who contributed to the organization of this meeting, for their invaluable efforts to make this event a great success. Professor Dr Ahmed Shuja Syed Chief Editor The PDF also contains lists of the boards, committees and sponsors.
Wilcox, Lauren; Patel, Rupa; Chen, Yunan; Shachak, Aviv
2013-12-01
Health Information Technologies, such as electronic health records (EHR) and secure messaging, have already transformed interactions among patients and clinicians. In addition, technologies supporting asynchronous communication outside of clinical encounters, such as email, SMS, and patient portals, are being increasingly used for follow-up, education, and data reporting. Meanwhile, patients are increasingly adopting personal tools to track various aspects of health status and therapeutic progress, wishing to review these data with clinicians during consultations. These issues have drawn increasing interest from the human-computer interaction (HCI) community, with special focus on critical challenges in patient-centered interactions and design opportunities that can address these challenges. We saw this community presenting and interacting at the ACM SIGCHI 2013, Conference on Human Factors in Computing Systems, (also known as CHI), held April 27-May 2nd, 2013 at the Palais de Congrès de Paris in France. CHI 2013 featured many formal avenues to pursue patient-centered health communication: a well-attended workshop, tracks of original research, and a lively panel discussion. In this report, we highlight these events and the main themes we identified. We hope that it will help bring the health care communication and the HCI communities closer together. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
ERIC Educational Resources Information Center
Stanley Foundation, Muscatine, IA.
The world's political structure and many economic practices are out of harmony with nature. This disharmony threatens environmentally sustainable growth and human survival. United Nations (UN) conference participants discussed the degree of political acceptance of concepts such as environmental security and sustainable development. Their reading…
Mat Kiah, M L; Al-Bakri, S H; Zaidan, A A; Zaidan, B B; Hussain, Muzammil
2014-10-01
One of the applications of modern technology in telemedicine is video conferencing. An alternative to traveling to attend a conference or meeting, video conferencing is becoming increasingly popular among hospitals. By using this technology, doctors can help patients who are unable to physically visit hospitals. Video conferencing particularly benefits patients from rural areas, where good doctors are not always available. Telemedicine has proven to be a blessing to patients who have no access to the best treatment. A telemedicine system consists of customized hardware and software at two locations, namely, at the patient's and the doctor's end. In such cases, the video streams of the conferencing parties may contain highly sensitive information. Thus, real-time data security is one of the most important requirements when designing video conferencing systems. This study proposes a secure framework for video conferencing systems and a complete management solution for secure video conferencing groups. Java Media Framework Application Programming Interface classes are used to design and test the proposed secure framework. Real-time Transport Protocol over User Datagram Protocol is used to transmit the encrypted audio and video streams, and RSA and AES algorithms are used to provide the required security services. Results show that the encryption algorithm insignificantly increases the video conferencing computation time.
5 CFR 9701.512 - Conferring on procedures for the exercise of management rights.
Code of Federal Regulations, 2010 CFR
2010-01-01
... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.512...
PREFACE: International Conference on Computing in High Energy and Nuclear Physics (CHEP'07)
NASA Astrophysics Data System (ADS)
Sobie, Randall; Tafirout, Reda; Thomson, Jana
2007-07-01
The 2007 International Conference on Computing in High Energy and Nuclear Physics (CHEP) was held on 2-7 September 2007 in Victoria, British Columbia, Canada. CHEP is a major series of international conferences for physicists and computing professionals from the High Energy and Nuclear Physics community, Computer Science and Information Technology. The CHEP conference provides an international forum to exchange information on computing experience and needs for the community, and to review recent, ongoing, and future activities. The CHEP'07 conference had close to 500 attendees with a program that included plenary sessions of invited oral presentations, a number of parallel sessions comprising oral and poster presentations, and an industrial exhibition. Conference tracks covered topics in Online Computing, Event Processing, Software Components, Tools and Databases, Software Tools and Information Systems, Computing Facilities, Production Grids and Networking, Grid Middleware and Tools, Distributed Data Analysis and Information Management and Collaborative Tools. The conference included a successful whale-watching excursion involving over 200 participants and a banquet at the Royal British Columbia Museum. The next CHEP conference will be held in Prague in March 2009. We would like thank the sponsors of the conference and the staff at the TRIUMF Laboratory and the University of Victoria who made the CHEP'07 a success. Randall Sobie and Reda Tafirout CHEP'07 Conference Chairs
Brynin, Malcolm
2006-09-01
Men have traditionally gained more than women from access to technologies at work which bring prestige, job security, more satisfying work and higher pay. Typically female jobs have centred on technologies, if they have at all, which tend towards routine and possibly deskilled work. Typing is a prime example. It is possible that this is changing through computerization, which is extensive but also equally distributed by gender. Does the wage premium, which use of a computer has been found to confer on users, benefit women sufficiently to suggest some sort of equalization through technology, or possibly even a female advantage? This is tested using data from four European countries. There is no across-the-board benefit from the use of computers. For both men and women it depends on the nature of their occupation. Some, more routine usages of computers are associated with a negative outcome. However, this occupational balance itself varies by gender.
ISMB 2016 offers outstanding science, networking, and celebration
Fogg, Christiana
2016-01-01
The annual international conference on Intelligent Systems for Molecular Biology (ISMB) is the major meeting of the International Society for Computational Biology (ISCB). Over the past 23 years the ISMB conference has grown to become the world's largest bioinformatics/computational biology conference. ISMB 2016 will be the year's most important computational biology event globally. The conferences provide a multidisciplinary forum for disseminating the latest developments in bioinformatics/computational biology. ISMB brings together scientists from computer science, molecular biology, mathematics, statistics and related fields. Its principal focus is on the development and application of advanced computational methods for biological problems. ISMB 2016 offers the strongest scientific program and the broadest scope of any international bioinformatics/computational biology conference. Building on past successes, the conference is designed to cater to variety of disciplines within the bioinformatics/computational biology community. ISMB 2016 takes place July 8 - 12 at the Swan and Dolphin Hotel in Orlando, Florida, United States. For two days preceding the conference, additional opportunities including Satellite Meetings, Student Council Symposium, and a selection of Special Interest Group Meetings and Applied Knowledge Exchange Sessions (AKES) are all offered to enable registered participants to learn more on the latest methods and tools within specialty research areas. PMID:27347392
ISMB 2016 offers outstanding science, networking, and celebration.
Fogg, Christiana
2016-01-01
The annual international conference on Intelligent Systems for Molecular Biology (ISMB) is the major meeting of the International Society for Computational Biology (ISCB). Over the past 23 years the ISMB conference has grown to become the world's largest bioinformatics/computational biology conference. ISMB 2016 will be the year's most important computational biology event globally. The conferences provide a multidisciplinary forum for disseminating the latest developments in bioinformatics/computational biology. ISMB brings together scientists from computer science, molecular biology, mathematics, statistics and related fields. Its principal focus is on the development and application of advanced computational methods for biological problems. ISMB 2016 offers the strongest scientific program and the broadest scope of any international bioinformatics/computational biology conference. Building on past successes, the conference is designed to cater to variety of disciplines within the bioinformatics/computational biology community. ISMB 2016 takes place July 8 - 12 at the Swan and Dolphin Hotel in Orlando, Florida, United States. For two days preceding the conference, additional opportunities including Satellite Meetings, Student Council Symposium, and a selection of Special Interest Group Meetings and Applied Knowledge Exchange Sessions (AKES) are all offered to enable registered participants to learn more on the latest methods and tools within specialty research areas.
ERIC Educational Resources Information Center
Palme, Jacob
The four papers contained in this document provide: (1) a survey of computer based mail and conference systems; (2) an evaluation of systems for both individually addressed mail and group addressing through conferences and distribution lists; (3) a discussion of various methods of structuring the text data in existing systems; and (4) a…
Selected Papers Presented at MODSIM World 2011 Conference and Expo
NASA Technical Reports Server (NTRS)
Pinelli, Thomas E. (Compiler); Bullock, Leanna S. (Compiler)
2012-01-01
Selected papers from MODSIM World 2011 Conference & Expo are contained in this NASA Conference Publication (CP). MODSIM World 2011 was held in Virginia Beach, Virginia, October 11-14, 2011. The theme of the 2011 conference & expo was "Overcoming Critical Global Challenges with Modeling & Simulation". The conference program consisted of five technical tracks - Defense, Homeland Security & First Responders; Education; Health & Medicine; The Human Dimension; and Serious Games & Virtual Worlds.
2008-09-01
telephone, conference calls, emails, alert notifications, and blackberry . The RDTSF holds conference calls with its stakeholders to provide routine... tunnels ) is monitored by CCTV cameras with live feeds to WMATA’s Operations Control Center (OCC) to detect unauthorized entry into areas not intended for...message by email, blackberry and phone to the Security Coordinators. Dissemination of classified information however, is generally handled through the
The new Mobile Command Center at KSC is important addition to emergency preparedness
NASA Technical Reports Server (NTRS)
2000-01-01
Charles Street, Roger Scheidt and Robert ZiBerna, the Emergency Preparedness team at KSC, sit in the conference room inside the Mobile Command Center, a specially equipped vehicle. Nicknamed '''The Brute,''' it also features computer work stations, mobile telephones and a fax machine. It also can generate power with its onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or Cape Canaveral Air Force Station.
The new Mobile Command Center at KSC is important addition to emergency preparedness
NASA Technical Reports Server (NTRS)
2000-01-01
Robert ZiBerna, Roger Scheidt and Charles Street, the Emergency Preparedness team at KSC, practice for an emergency scenario inside the Mobile Command Center, a specially equipped vehicle. It features a conference room, computer work stations, mobile telephones and a fax machine. It also can generate power with its onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or Cape Canaveral Air Force Station.
Ethics in the computer age. Conference proceedings
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kizza, J.M.
1994-12-31
These proceedings contain the papers presented at the Ethics in the Computer Age conference held in Gatlinburg, Tennessee, November 11-13, 1994. The conference was sponsored by ACM SIGCAS (Computers and Society) to which I am very grateful. The Ethics in the Computer Age conference sequence started in 1991 with the first conference at the campus of the University of Tennessee at Chattanooga. The second was help at the same location a year later. These two conferences were limited to only invited speakers, but their success was overwhelming. This is the third in the sequence and the first truly international one.more » Plans are already under way for the fourth in 1996.« less
XXV IUPAP Conference on Computational Physics (CCP2013): Preface
NASA Astrophysics Data System (ADS)
2014-05-01
XXV IUPAP Conference on Computational Physics (CCP2013) was held from 20-24 August 2013 at the Russian Academy of Sciences in Moscow, Russia. The annual Conferences on Computational Physics (CCP) present an overview of the most recent developments and opportunities in computational physics across a broad range of topical areas. The CCP series aims to draw computational scientists from around the world and to stimulate interdisciplinary discussion and collaboration by putting together researchers interested in various fields of computational science. It is organized under the auspices of the International Union of Pure and Applied Physics and has been in existence since 1989. The CCP series alternates between Europe, America and Asia-Pacific. The conferences are traditionally supported by European Physical Society and American Physical Society. This year the Conference host was Landau Institute for Theoretical Physics. The Conference contained 142 presentations, and, in particular, 11 plenary talks with comprehensive reviews from airbursts to many-electron systems. We would like to take this opportunity to thank our sponsors: International Union of Pure and Applied Physics (IUPAP), European Physical Society (EPS), Division of Computational Physics of American Physical Society (DCOMP/APS), Russian Foundation for Basic Research, Department of Physical Sciences of Russian Academy of Sciences, RSC Group company. Further conference information and images from the conference are available in the pdf.
ERIC Educational Resources Information Center
Association for the Advancement of Computing in Education. Asia-Pacific Chapter.
This conference addressed pedagogical, social, and technological issues related to computers in education. The conference theme, "Learning Societies in the New Millennium: Creativity, Caring & Commitments," focused on creative learning, caring for diverse cultures and global issues, and committing oneself to a new way of…
ERIC Educational Resources Information Center
National Educational Computing Conference.
The National Educational Computing Conference (NECC) is the largest conference of its kind in the world. This document is the Proceedings from the 23rd annual National Educational Computing Conference (NECC) held in San Antonio, June 17-19, 2002. Included are: general information; schedule of events; evaluation form; and the program. Information…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Halvorson, C S
The FY09 budgets for homeland security research and development programs in the U.S. are summarized. Homeland security policy developments that can influence future efforts are discussed. Initial indications of the new administration direction on homeland security R&D are summarized. An overview of the Optics and Photonics in Global Homeland Security V conference is presented.
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-01-01
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464
Security analysis and improvements of authentication and access control in the Internet of Things.
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-08-13
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.
2002-05-31
Central America such as Fuerzas Aliadas Humanitarian and more pointedly, through the expansion of the Caribbean Nations Security Conference (CANSEC...Costa Rica, El Salvador, Guatemala, Honduras, Mexico, and Nicaragua attended as observers. At the conference Major General Soligan, the SOUTHCOM J5, put...United States, Britain, and Canada are deporting undocumented aliens and legal aliens that have been convicted of criminal offences. Between 1993 and
2003-09-01
infrastructure, and providing consequence management and mitigation of man-made and natural disasters. The United States Army, Pacifi c (USARPAC), the Offi...Terrorism, Disaster Response and Consequence Management , and Medical Aspects of Environmental Security. The conference brought together military and...consequence management in maintaining governmental legitimacy, and examine salient military roles in preventing, responding to, and mitigating natural
International Symposium on Grids and Clouds (ISGC) 2016
NASA Astrophysics Data System (ADS)
The International Symposium on Grids and Clouds (ISGC) 2016 will be held at Academia Sinica in Taipei, Taiwan from 13-18 March 2016, with co-located events and workshops. The conference is hosted by the Academia Sinica Grid Computing Centre (ASGC). The theme of ISGC 2016 focuses on“Ubiquitous e-infrastructures and Applications”. Contemporary research is impossible without a strong IT component - researchers rely on the existence of stable and widely available e-infrastructures and their higher level functions and properties. As a result of these expectations, e-Infrastructures are becoming ubiquitous, providing an environment that supports large scale collaborations that deal with global challenges as well as smaller and temporal research communities focusing on particular scientific problems. To support those diversified communities and their needs, the e-Infrastructures themselves are becoming more layered and multifaceted, supporting larger groups of applications. Following the call for the last year conference, ISGC 2016 continues its aim to bring together users and application developers with those responsible for the development and operation of multi-purpose ubiquitous e-Infrastructures. Topics of discussion include Physics (including HEP) and Engineering Applications, Biomedicine & Life Sciences Applications, Earth & Environmental Sciences & Biodiversity Applications, Humanities, Arts, and Social Sciences (HASS) Applications, Virtual Research Environment (including Middleware, tools, services, workflow, etc.), Data Management, Big Data, Networking & Security, Infrastructure & Operations, Infrastructure Clouds and Virtualisation, Interoperability, Business Models & Sustainability, Highly Distributed Computing Systems, and High Performance & Technical Computing (HPTC), etc.
Complex Failure Forewarning System - DHS Conference Proceedings
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Hively, Lee M; Prowell, Stacy J
2011-01-01
As the critical infrastructures of the United States have become more and more dependent on public and private networks, the potential for widespread national impact resulting from disruption or failure of these networks has also increased. Securing the nation s critical infrastructures requires protecting not only their physical systems but, just as important, the cyber portions of the systems on which they rely. A failure is inclusive of random events, design flaws, and instabilities caused by cyber (and/or physical) attack. One such domain, aging bridges, is used to explain the Complex Structure Failure Forewarning System. We discuss the workings ofmore » such a system in the context of the necessary sensors, command and control and data collection as well as the cyber security efforts that would support this system. Their application and the implications of this computing architecture are also discussed, with respect to our nation s aging infrastructure.« less
ERIC Educational Resources Information Center
Lawlor, Joseph, Ed.
Suggestions for integrating computer technology and composition instruction are presented in four conference papers, summaries of four conference courseware demonstrations, a paper describing computer-based evaluation of textual responses, and a reactor's address. In an overview of the current state of computer-based composition instruction,…
76 FR 72967 - Aviation Security Advisory Committee (ASAC) Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-28
...The Transportation Security Administration (TSA) will hold a meeting of the Aviation Security Advisory Committee (ASAC) via telephone conference on December 15, 2011, to establish working groups and set the agenda for future activity. This meeting will be open to the public.
Ground Robotics Capabilities Conference and Exhibition
2008-03-06
decision makers within the federal government , industry and academia Participate in your choice of sessions designed to map future...purpose of this conference is to bring together warfighters and homeland security users, technology developers ( government , industry and academia...developers ( government , industry and academia), and acquisition professionals to address increased responsiveness to user’s needs. This conference will
Code of Federal Regulations, 2010 CFR
2010-07-01
... existence of any rights or obligations conferred or imposed by any international agreement or any contract... rights or obligations conferred or imposed by any international agreementor any contract entered into or... authorized, and notwithstanding the existence of any rights or obligations conferred or imposed by any...
Integrating electronic conferencing to enhance problem solving in nursing.
Witucki, J M; Hodson, K E; Malm, L D
1996-01-01
The authors describe how a computer-mediated conference was integrated into a baccalaureate nursing program clinical course. They discuss methods used in implementing the conference, including a technical review of the software and hardware, and methods of implementing and monitoring the conference with students. Examples of discussion items, student and faculty responses to posted items, and responses to use of the computer-mediated conference are included. Results and recommendations from this experience will be useful to other schools integrating computer-mediated conference technology into the nursing school curriculum.
Computer Conferences and Learning: Authority, Resistance, and Internally Persuasive Discourse.
ERIC Educational Resources Information Center
Cooper, Marilyn M.; Selfe, Cynthia L.
1990-01-01
Describes a nontraditional discourse forum, computer-based conferences, in which students hold written conversations to discuss readings, debate issues, share frustrations, and try to become comfortable with the ideas presented in the classroom. Argues that these computer conferences are powerful learning forums for students because they encourage…
A novel quantum scheme for secure two-party distance computation
NASA Astrophysics Data System (ADS)
Peng, Zhen-wan; Shi, Run-hua; Zhong, Hong; Cui, Jie; Zhang, Shun
2017-12-01
Secure multiparty computational geometry is an essential field of secure multiparty computation, which computes a computation geometric problem without revealing any private information of each party. Secure two-party distance computation is a primitive of secure multiparty computational geometry, which computes the distance between two points without revealing each point's location information (i.e., coordinate). Secure two-party distance computation has potential applications with high secure requirements in military, business, engineering and so on. In this paper, we present a quantum solution to secure two-party distance computation by subtly using quantum private query. Compared to the classical related protocols, our quantum protocol can ensure higher security and better privacy protection because of the physical principle of quantum mechanics.
NASA Technical Reports Server (NTRS)
Tompkins, F. G.
1983-01-01
The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.
NASA Astrophysics Data System (ADS)
Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Moriyama, Noriyuki; Ohmatsu, Hironobu; Masuda, Hideo; Machida, Suguru
2008-03-01
Mass screening based on multi-helical CT images requires a considerable number of images to be read. It is this time-consuming step that makes the use of helical CT for mass screening impractical at present. To overcome this problem, we have provided diagnostic assistance methods to medical screening specialists by developing a lung cancer screening algorithm that automatically detects suspected lung cancers in helical CT images, a coronary artery calcification screening algorithm that automatically detects suspected coronary artery calcification and a vertebra body analysis algorithm for quantitative evaluation of osteoporosis likelihood by using helical CT scanner for the lung cancer mass screening. The function to observe suspicious shadow in detail are provided in computer-aided diagnosis workstation with these screening algorithms. We also have developed the telemedicine network by using Web medical image conference system with the security improvement of images transmission, Biometric fingerprint authentication system and Biometric face authentication system. Biometric face authentication used on site of telemedicine makes "Encryption of file" and Success in login" effective. As a result, patients' private information is protected. Based on these diagnostic assistance methods, we have developed a new computer-aided workstation and a new telemedicine network that can display suspected lesions three-dimensionally in a short time. The results of this study indicate that our radiological information system without film by using computer-aided diagnosis workstation and our telemedicine network system can increase diagnostic speed, diagnostic accuracy and security improvement of medical information.
Interaction and Cognition in Asynchronous Computer Conferencing
ERIC Educational Resources Information Center
Schrire, Sarah
2004-01-01
This paper is based on a multiple-case study of the learning process in three asynchronous computer conferences. The conferences were part of the distance learning component in doctoral degree courses in computing technology in education offered at an American university. The conferences were analyzed from a number of perspectives, the emphasis in…
ERIC Educational Resources Information Center
National Educational Computing Conference.
Topics of NECC '98 (National Educational Computing Conference) papers presented at this conference on technology in education include: digital portfolios; technology-integrated multidisciplinary curriculum design; a virtual Web site; a computer literacy course; Internet projects for various subjects; staff development; music videos; interaction of…
NNSA Administrator Tom D'Agostino's speech at the 2009 ISM Conference
Thomas D'Agostino
2017-12-09
National Nuclear Security Administration Administrator Thomas DAgostino addressed the 2009 Department of Energy Integrated Safety Management (ISM) Conference in Knoxville, Tenn., on Wednesday, Aug. 26. In his remarks, Administrator DAgostino highlighted the NNSAs track record of developing innovative approaches to workplace safety. And, while he noted the improvements in NNSAs safety record over the years, the Administrator highlighted the need to ensure that workers across the nuclear security enterprise never become complacent in their approach to safety.
ERIC Educational Resources Information Center
Smith, Peter, Ed.; Smith, Carol L., Ed.
2004-01-01
This 2004 Association of Small Computer Users in Education (ASCUE) conference proceedings presented the theme "Leading Strategic & Cultural Change through Technology." The conference introduced its ASCUE Officers and Directors, and provides abstracts of the pre-conference workshops. The full-text conference papers in this document…
ERIC Educational Resources Information Center
Smith, Peter, Ed.; Smith, Carol L., Ed.
2005-01-01
This 2005 Association of Small Computer Users in Education (ASCUE) conference proceedings presented the theme "Campus Technology: Anticipating the Future." The conference introduced its ASCUE Officers and Directors, and provides abstracts of the pre-conference workshops. The full-text conference papers in this document include: (1) Developing…
ERIC Educational Resources Information Center
Chen, Gwo-Dong; Chen, Chun-Hsiang; Wang, Chin-Yeh; Li, Liang-Yi
2012-01-01
The article aims to compare international conferences, "The International Educational Technology Conference" (IETC, 2011) and "The International Conference on Computers in Education" (ICCE, 2010), from various dimensions. The comparison is expected to conclude a better approach for every IETC and ICCE to be held. (Contains 4…
ERIC Educational Resources Information Center
Baptista Nunes, Miguel, Ed.; McPherson, Maggie, Ed.
2014-01-01
These proceedings contain the papers of the International Conference e-Learning 2014, which was organised by the International Association for Development of the Information Society and is part of the Multi Conference on Computer Science and Information Systems (Lisbon, Portugal July 15-19, 2014). The e-Learning 2014 conference aims to address the…
The new Mobile Command Center at KSC is important addition to emergency preparedness
NASA Technical Reports Server (NTRS)
2000-01-01
Charles Street, part of the Emergency Preparedness team at KSC, uses a phone on the specially equipped emergency response vehicle. The vehicle, nicknamed '''The Brute,''' serves as a mobile command center for emergency preparedness staff and other support personnel when needed. It features a conference room, computer work stations, mobile telephones and a fax machine. It also can generate power with its onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or Cape Canaveral Air Force Station.
2000-09-21
Charles Street, part of the Emergency Preparedness team at KSC, uses a phone on the specially equipped emergency response vehicle. The vehicle, nicknamed “The Brute,” serves as a mobile command center for emergency preparedness staff and other support personnel when needed. It features a conference room, computer work stations, mobile telephones and a fax machine. It also can generate power with its onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or Cape Canaveral Air Force Station
2000-09-21
Charles Street, part of the Emergency Preparedness team at KSC, uses a phone on the specially equipped emergency response vehicle. The vehicle, nicknamed “The Brute,” serves as a mobile command center for emergency preparedness staff and other support personnel when needed. It features a conference room, computer work stations, mobile telephones and a fax machine. It also can generate power with its onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or Cape Canaveral Air Force Station
Gender Aspects of Human Security
ERIC Educational Resources Information Center
Moussa, Ghada
2008-01-01
The chapter deals with the gender dimensions in human security through focusing on the relationship between gender and human security, first manifested in international declarations and conventions, and subsequently evolving in world women conferences. It aims at analysing the various gender aspects in its relation to different human security…
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Investigation. 13.4 Section 13.4 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.4 Investigation. (a) If an Investigating Official concludes that a subpoena pursuant to the Authority conferred by...
Research Trends in Computational Linguistics. Conference Report.
ERIC Educational Resources Information Center
Center for Applied Linguistics, Washington, DC.
This document contains the reports summarizing the main discussion held during the March 1972 Computational Linguistics Conference. The first report, "Computational Linguistics and Linguistics," helps to establish definitions and an understanding of the scope of computational linguistics. "Integrated Computer Systems for Language" and…
Group Communication Through Computers. Volume 4: Social, Managerial, and Economic Issues.
ERIC Educational Resources Information Center
Vallee, Jacques; And Others
This study is the first assessment of the long term effects of computer conferencing. The use of PLANET and FORUM are described, and major users and conference characteristics are presented through excerpts from conference transcripts. Part I of the report focuses on the ways in which organizations used computer conferencing. Conference size and…
6 CFR 27.410 - Third party actions.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Third party actions. 27.410 Section 27.410 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Other § 27.410 Third party actions. (a) Nothing in this part shall confer upon any person except...
6 CFR 27.410 - Third party actions.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Third party actions. 27.410 Section 27.410 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Other § 27.410 Third party actions. (a) Nothing in this part shall confer upon any person except...
6 CFR 27.410 - Third party actions.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Third party actions. 27.410 Section 27.410 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Other § 27.410 Third party actions. (a) Nothing in this part shall confer upon any person except...
6 CFR 27.410 - Third party actions.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Third party actions. 27.410 Section 27.410 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Other § 27.410 Third party actions. (a) Nothing in this part shall confer upon any person except...
6 CFR 27.410 - Third party actions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Third party actions. 27.410 Section 27.410 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Other § 27.410 Third party actions. (a) Nothing in this Part shall confer upon any person except...
2017 Joint Annual NDIA/AIA Industrial Security Committee Fall Conference
2017-11-15
beyond credit data to offer the insights that government professionals need to make informed decisions and ensure citizen safety, manage compliance...business that provides information technology and professional services. We specialize in managing business processes and systems integration for both... Information Security System ISFD Industrial Security Facilities Database OBMS ODAA Business Management System STEPP Security, Training, Education and
2011 Defense Industrial Base Critical Infrastructure Protection Conference (DIBCIP)
2011-08-25
Office of the Program Manager, Information Sharing Environment u Mr. Vince Jarvie , Vice President, Corporate Security, L-3 Communications...National Defense University IRM College and in 2008 he obtained the Certified Information System Security Professional certificate. MR. VINCE JARVIE ...Vice President, Corporate Security, L-3 Communciations Corporation Mr. Vincent (Vince) Jarvie is the Vice President, Corporate Security for L-3
NASA Astrophysics Data System (ADS)
Hirota, Osamu; Ohhata, Kenichi; Honda, Makoto; Akutsu, Shigeto; Doi, Yoshifumi; Harasawa, Katsuyoshi; Yamashita, Kiichi
2009-08-01
The security issue for the next generation optical network which realizes Cloud Computing System Service with data center" is urgent problem. In such a network, the encryption by physical layer which provide super security and small delay should be employed. It must provide, however, very high speed encryption because the basic link is operated at 2.5 Gbit/sec or 10 Gbit/sec. The quantum stream cipher by Yuen-2000 protocol (Y-00) is a completely new type random cipher so called Gauss-Yuen random cipher, which can break the Shannon limit for the symmetric key cipher. We develop such a cipher which has good balance of the security, speed and cost performance. In SPIE conference on quantum communication and quantum imaging V, we reported a demonstration of 2.5 Gbit/sec system for the commercial link and proposed how to improve it to 10 Gbit/sec. This paper reports a demonstration of the Y-00 cipher system which works at 10 Gbit/sec. A transmission test in a laboratory is tried to get the basic data on what parameters are important to operate in the real commercial networks. In addition, we give some theoretical results on the security. It is clarified that the necessary condition to break the Shannon limit requires indeed the quantum phenomenon, and that the full information theoretically secure system is available in the satellite link application.
Financial security for women -- Fem Consult congress.
1996-01-01
The nongovernmental organization "Fem Consult," which seeks to strengthen the socioeconomic position of women by applying a gender perspective to programs and projects in developing countries, celebrated its 10th anniversary in 1996 by holding a conference in the Netherlands on financial security for women in the developing world. During the conference, the President of the WWF (Working Women's Forum) described her agency's 17 years of experience in lending to impoverished rural and urban women in India. By extending microcredit assistance through a network of cooperatives, the WWF has been the catalyst for lasting improvements in the economic and social status of impoverished women. Representatives of the Grameen Bank, Women's World Banking, the Ecumenical Development Cooperative Society, and other organizations also addressed the conference.
Qualitative and Quantitative Proofs of Security Properties
2013-04-01
Naples, Italy (September 2012) – Australasian Joint Conference on Artifical Intelligence (December 2012). • Causality, Responsibility, and Blame...realistic solution concept, Proceedings of the 21st International Joint Conference on Artificial Intelligence (IJCAI 2009), 2009, pp. 153–158. 17. J...Conference on Artificial Intelligence (AAAI-12), 2012, pp. 1917-1923. 29. J. Y. Halpern and S. Leung, Weighted sets of probabilities and minimax
Geographical Database Integrity Validation
NASA Technical Reports Server (NTRS)
Jacobs, Derya; Kauffman, Paul; Blackstock, Dexter
2000-01-01
Airport Safety Modeling Data (ASMD) was developed at the request of a 1997 White House Conference on Aviation Safety and Security. Politicians, military personnel, commercial aircraft manufacturers and the airline industry attended the conference. The objective of the conference was to study the airline industry and make recommendations to improve safety and security. One of the topics discussed at the conference was the loss of situational awareness by aircraft pilots. Loss of situational awareness occurs when a pilot loses his geographic position during flight and can result in crashes into terrain and obstacles. It was recognized at the conference that aviation safety could be improved by reducing the loss of situational awareness. The conference advised that a system be placed in the airplane cockpit that would provide pilots with a visual representation of the terrain around airports. The system would prevent airline crashes during times of inclement weather and loss of situational awareness. The system must be based on accurate data that represents terrain around airports. The Department of Defense and the National Imagery and Mapping Agency (NIMA) released ASMD to be used for the development of a visual system for aircraft pilots. ASMD was constructed from NIMA digital terrain elevation data (DTED).
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
A video on computer security is described. Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education and Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1--3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices.
Transit security in the 90's : conference summary
DOT National Transportation Integrated Search
1996-10-01
As a result of the Federal Transit Administration's concern for the potential of terrorist attacks on our Nation's : transit systems, especially in a year when we are hosting the Olympics, a conference was held in Atlanta, Georgia, on : February 27-2...
ICCE/ICCAI 2000 Full & Short Papers (Computer-Assisted Language Learning).
ERIC Educational Resources Information Center
2000
This document contains the following full and short papers on computer-assisted language learning (CALL) from ICCE/ICCAI 2000 (International Conference on Computers in Education/International Conference on Computer-Assisted Instruction): (1) "A Computer-Assisted English Abstract Words Learning Environment on the Web" (Wenli Tsou and…
A Portable Computer Security Workshop
ERIC Educational Resources Information Center
Wagner, Paul J.; Phillips, Andrew T.
2006-01-01
We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education to IT professionals and students. It is effective in communicating basic computer security principles…
NASA Technical Reports Server (NTRS)
Vallee, J.; Wilson, T.
1976-01-01
Results are reported of the first experiments for a computer conference management information system at the National Aeronautics and Space Administration. Between August 1975 and March 1976, two NASA projects with geographically separated participants (NASA scientists) used the PLANET computer conferencing system for portions of their work. The first project was a technology assessment of future transportation systems. The second project involved experiments with the Communication Technology Satellite. As part of this project, pre- and postlaunch operations were discussed in a computer conference. These conferences also provided the context for an analysis of the cost of computer conferencing. In particular, six cost components were identified: (1) terminal equipment, (2) communication with a network port, (3) network connection, (4) computer utilization, (5) data storage and (6) administrative overhead.
The arms race at a time of decision
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rotblat, J.; Pascolini, A.
1984-01-01
This book contains thirty-one articles by leading scientists and scholars form East and West presented at the 33rd Pugwash Conference held in Venice in 1983. The contributors provide research findings and recommendations on such topics as space militarization, nuclear strategy and safety, European security, regional security, and the security of the Third World.
High Productivity Computing Systems and Competitiveness Initiative
2007-07-01
planning committee for the annual, international Supercomputing Conference in 2004 and 2005. This is the leading HPC industry conference in the world. It...sector partnerships. Partnerships will form a key part of discussions at the 2nd High Performance Computing Users Conference, planned for July 13, 2005...other things an interagency roadmap for high-end computing core technologies and an accessibility improvement plan . Improving HPC Education and
Personal, Electronic, Secure National Library of Medicine Hosts Health Records Conference
... Bar Home Current Issue Past Issues EHR Personal, Electronic, Secure: National Library of Medicine Hosts Health Records ... One suggestion for saving money is to implement electronic personal health records. With this in mind, the ...
ERIC Educational Resources Information Center
Murphy, Harry J., Ed.
The following 25 papers (with their authors) are presented from a conference on computer technology in special education and rehabilitation: "Computers for Business--Computers for Life" (I. Keith Austin); "Rehabilitation and the Computer: How to Find What You Need" (Thomas Backer); "Computer Access Alternatives for Visually Impaired People in…
1990-06-01
PL-TR-92-2054 AD-A247 625 PROCEEDINGS OF THE 13TH ANNUAL REVIEW CONFERENCE ON ATMOSPHERIC TRANSMISSION MODELS, 5-6 JUNE 1990 Editors: F. X. Kneizys L...Security Classification) Proceedings of the 13th Annual Review Conference on Atmospheric Transmission Models. 12. PERSONAL AUTHOR(S) Editors, F.X...the 31 papers presented at the Thirteenth Annual Review Conference on Atmospheric Transmission Models held at the Geophysics Laborator-, (ASFC
20 CFR 498.206 - Prehearing conferences.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Prehearing conferences. 498.206 Section 498.206 Employees' Benefits SOCIAL SECURITY ADMINISTRATION CIVIL MONETARY PENALTIES, ASSESSMENTS AND... hearing and dates for the exchange of witness lists and of proposed exhibits; (8) Discovery of documents...
44 CFR 19.235 - Statutory amendments.
Code of Federal Regulations, 2011 CFR
2011-10-01
... HOMELAND SECURITY GENERAL NONDISCRIMINATION ON THE BASIS OF SEX IN EDUCATION PROGRAMS OR ACTIVITIES... Legion undertaken in connection with the organization or operation of any Boys State conference, Boys... secondary school or educational institution specifically for: (i) The promotion of any Boys State conference...
20 CFR 405.366 - Posthearing conferences.
Code of Federal Regulations, 2010 CFR
2010-04-01
....366 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW PROCESS FOR ADJUDICATING INITIAL DISABILITY CLAIMS Administrative Law Judge Hearing § 405.366 Posthearing conferences. (a) The administrative law judge may decide, on his or her own initiative or at your request, to hold a posthearing...
20 CFR 405.330 - Prehearing conferences.
Code of Federal Regulations, 2010 CFR
2010-04-01
....330 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW PROCESS FOR ADJUDICATING INITIAL DISABILITY CLAIMS Administrative Law Judge Hearing § 405.330 Prehearing conferences. (a)(1) The administrative law judge, on his or her own initiative or at your request, may decide to conduct a prehearing...
17 CFR 10.41 - Prehearing conferences; procedural matters.
Code of Federal Regulations, 2010 CFR
2010-04-01
...; procedural matters. 10.41 Section 10.41 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... Prehearing conferences; procedural matters. In any proceeding the Administrative Law Judge may direct that...) Determining matters of which official notice may be taken; (d) Discussing amendments to pleadings; (e...
17 CFR 10.41 - Prehearing conferences; procedural matters.
Code of Federal Regulations, 2013 CFR
2013-04-01
...; procedural matters. 10.41 Section 10.41 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... Prehearing conferences; procedural matters. In any proceeding the Administrative Law Judge may direct that...) Determining matters of which official notice may be taken; (d) Discussing amendments to pleadings; (e...
17 CFR 10.41 - Prehearing conferences; procedural matters.
Code of Federal Regulations, 2011 CFR
2011-04-01
...; procedural matters. 10.41 Section 10.41 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... Prehearing conferences; procedural matters. In any proceeding the Administrative Law Judge may direct that...) Determining matters of which official notice may be taken; (d) Discussing amendments to pleadings; (e...
17 CFR 10.41 - Prehearing conferences; procedural matters.
Code of Federal Regulations, 2014 CFR
2014-04-01
...; procedural matters. 10.41 Section 10.41 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... Prehearing conferences; procedural matters. In any proceeding the Administrative Law Judge may direct that...) Determining matters of which official notice may be taken; (d) Discussing amendments to pleadings; (e...
15 CFR 719.13 - Prehearing conference.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Prehearing conference. 719.13 Section 719.13 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS...
15 CFR 719.13 - Prehearing conference.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 15 Commerce and Foreign Trade 2 2011-01-01 2011-01-01 false Prehearing conference. 719.13 Section 719.13 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS...
46 CFR 153.968 - Cargo transfer conference.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 5 2012-10-01 2012-10-01 false Cargo transfer conference. 153.968 Section 153.968 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS CARRYING BULK LIQUID, LIQUEFIED GAS, OR COMPRESSED GAS HAZARDOUS MATERIALS Operations Cargo Transfer...
46 CFR 153.968 - Cargo transfer conference.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 5 2014-10-01 2014-10-01 false Cargo transfer conference. 153.968 Section 153.968 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS CARRYING BULK LIQUID, LIQUEFIED GAS, OR COMPRESSED GAS HAZARDOUS MATERIALS Operations Cargo Transfer...
46 CFR 153.968 - Cargo transfer conference.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 5 2013-10-01 2013-10-01 false Cargo transfer conference. 153.968 Section 153.968 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS CARRYING BULK LIQUID, LIQUEFIED GAS, OR COMPRESSED GAS HAZARDOUS MATERIALS Operations Cargo Transfer...
46 CFR 153.968 - Cargo transfer conference.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 5 2011-10-01 2011-10-01 false Cargo transfer conference. 153.968 Section 153.968 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS CARRYING BULK LIQUID, LIQUEFIED GAS, OR COMPRESSED GAS HAZARDOUS MATERIALS Operations Cargo Transfer...
ERIC Educational Resources Information Center
Interuniversity Communications Council (EDUCOM), Princeton, NJ.
Further developing a theme that has characterized several recent EDUCOM conferences, the 1974 EDUCOM Fall Conference focused on "Computing and Networks in Higher Education." Included in the conference program were papers and discussions on approaches to solving the organizational and financial problems of networking used in both the…
Conference Abstracts: AEDS '84.
ERIC Educational Resources Information Center
Baird, William E.
1985-01-01
The Association of Educational Data Systems (AEDS) conference included 102 presentations. Abstracts of seven of these presentations are provided. Topic areas considered include LOGO, teaching probability through a computer game, writing effective computer assisted instructional materials, computer literacy, research on instructional…
e-Science platform for translational biomedical imaging research: running, statistics, and analysis
NASA Astrophysics Data System (ADS)
Wang, Tusheng; Yang, Yuanyuan; Zhang, Kai; Wang, Mingqing; Zhao, Jun; Xu, Lisa; Zhang, Jianguo
2015-03-01
In order to enable multiple disciplines of medical researchers, clinical physicians and biomedical engineers working together in a secured, efficient, and transparent cooperative environment, we had designed an e-Science platform for biomedical imaging research and application cross multiple academic institutions and hospitals in Shanghai and presented this work in SPIE Medical Imaging conference held in San Diego in 2012. In past the two-years, we implemented a biomedical image chain including communication, storage, cooperation and computing based on this e-Science platform. In this presentation, we presented the operating status of this system in supporting biomedical imaging research, analyzed and discussed results of this system in supporting multi-disciplines collaboration cross-multiple institutions.
Electronic Warfare / Electronic Protection (EW/EP) S&T Priority Steering Council
2011-11-08
Office Office of the Assistant Secretary of Defense (Research and Engineering) NDIA 8th Annual Disruptive Technologies Conference 8 November 2011...the NDIA Disruptive Technologies Conference, November 8, 2011 Washington, DC 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17
2008 Stability, Security, Transition and Reconstruction Operations Conference
2008-09-04
Facilitator Power of Public-Private Partnerships • Health Professional Education • Greater Access to Care China Diabetes Education Program Dominican Republic...Argentina Canada Chile Colombia Ecuador Peru Uruguay Interagency, multinational, inter-institutional partnerships State Department Homeland Security...Disaster Preparedness Disaster Response Regional Response Capacity OFDA-LAC / MDROs Regional Security System (RSS) UNCLASSIFIED ECUADOR / KY PERU / WV
ERIC Educational Resources Information Center
Huston, Rick, Ed.; Armel, Donald, Ed.
Topics addressed by 40 papers from a conference on microcomputers include: developing a campus wide computer ethics policy; integrating new technologies into professional education; campus computer networks; computer assisted instruction; client/server architecture; competencies for entry-level computing positions; auditing and professional…
Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi
2014-01-01
Background and objective While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Materials and methods Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software ‘R’ by effectively combining secret-sharing-based secure computation with original computation. Results Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50 000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. Discussion If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using ‘R’ that works interactively while secure computation protocols generally require a significant amount of processing time. Conclusions We propose a secure statistical analysis system using ‘R’ for medical data that effectively integrates secret-sharing-based secure computation and original computation. PMID:24763677
Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi
2014-10-01
While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software 'R' by effectively combining secret-sharing-based secure computation with original computation. Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50,000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using 'R' that works interactively while secure computation protocols generally require a significant amount of processing time. We propose a secure statistical analysis system using 'R' for medical data that effectively integrates secret-sharing-based secure computation and original computation. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
ERIC Educational Resources Information Center
Suiter, Martha, Ed.
This set of proceedings assembles papers presented at the 1995 Council for Higher Education Computing Services (CHECS) conference, held at the New Mexico Military Institute in Roswell, New Mexico. CHECS members are higher education computing services organizations within the state of New Mexico. The main focus of the conference was the Internet…
Selected Papers and Presentations Presented at MODSIM World 2010 Conference and Expo. Part 1
NASA Technical Reports Server (NTRS)
Pinelli, Thomas E. (Editor)
2011-01-01
MODSIM World 2010 was held in Hampton, Virginia, October 13-15, 2010. The theme of the 2010 conference & expo was "21st Century Decision-Making: The Art of Modeling& Simulation". The conference program consisted of seven technical tracks - Defense, Engineering and Science, Health & Medicine, Homeland Security & First Responders, The Human Dimension, K-20 STEM Education, and Serious Games & Virtual Worlds. Selected papers and presentations from MODSIM World 2010 Conference & Expo are contained in this NASA Conference Publication (CP). Section 8.0 of this CP contains papers from MODSIM World 2009 Conference & Expo that were unavailable at the time of publication of NASA/CP-2010-216205 Selected Papers Presented at MODSIM World 2009 Conference and Expo, March 2010.
Selected Papers and Presentations Presented at MODSIM World 2010 Conference Expo. Part 2
NASA Technical Reports Server (NTRS)
Pinelli, Thomas E. (Editor)
2011-01-01
MODSIM World 2010 was held in Hampton, Virginia, October 13-15, 2010. The theme of the 2010 conference & expo was "21st Century Decision-Making: The Art of Modeling& Simulation". The conference program consisted of seven technical tracks - Defense, Engineering and Science, Health & Medicine, Homeland Security & First Responders, The Human Dimension, K-20 STEM Education, and Serious Games & Virtual Worlds. Selected papers and presentations from MODSIM World 2010 Conference & Expo are contained in this NASA Conference Publication (CP). Section 8.0 of this CP contains papers from MODSIM World 2009 Conference & Expo that were unavailable at the time of publication of NASA/CP-2010-216205 Selected Papers Presented at MODSIM World 2009 Conference and Expo, March 2010.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Conferences. 20.501 Section 20.501 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY GENERAL RULES OF... stenographic report if authorized by the ALJ; (2) A written transcript from a magnetic tape or the equivalent...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Conferences. 20.501 Section 20.501 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY GENERAL RULES OF... stenographic report if authorized by the ALJ; (2) A written transcript from a magnetic tape or the equivalent...
46 CFR 153.968 - Cargo transfer conference.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 5 2010-10-01 2010-10-01 false Cargo transfer conference. 153.968 Section 153.968 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS... the facility. (b) The person in charge of cargo transfer shall discuss the important aspects of the...
An Experiment with CC Version 3.0 Migration
2006-09-01
7th International Common Criteria Conference Lanzarote , Spain September 19-21, 2006 An Experiment with CC Version 3.0 Migration Thuy D. Nguyen...SUPPLEMENTARY NOTES 7th International Common Criteria Conference (ICCC 06), Lanzarote , Spaon, 19-21 Sep 2006 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY
Exploring Factors That Affect Adoption of Computer Security Practices among College Students
ERIC Educational Resources Information Center
Alqarni, Amani
2017-01-01
Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…
NASA Technical Reports Server (NTRS)
Reinsch, K. G. (Editor); Schmidt, W. (Editor); Ecer, A. (Editor); Haeuser, Jochem (Editor); Periaux, J. (Editor)
1992-01-01
A conference was held on parallel computational fluid dynamics and produced related papers. Topics discussed in these papers include: parallel implicit and explicit solvers for compressible flow, parallel computational techniques for Euler and Navier-Stokes equations, grid generation techniques for parallel computers, and aerodynamic simulation om massively parallel systems.
ERIC Educational Resources Information Center
Nanlohy, Phil, Ed.
1993-01-01
The 43 papers in this collection were presented at the Australian Council for Computers in Education 1993 annual conference. The papers focus on research and scholarship in the use of computers at the elementary, secondary, and higher education levels. The papers address the following aspects of the use of computers in education: (1) theoretical…
Kraemer, Sara; Carayon, Pascale
2007-03-01
This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.
Argumentation in a Multi Party Asynchronous Computer Mediated Conference: A Generic Analysis
ERIC Educational Resources Information Center
Coffin, Caroline; Painter, Clare; Hewings, Ann
2005-01-01
This paper draws on systemic functional linguistic genre analysis to illuminate the way in which post graduate applied linguistics students structure their argumentation within a multi party asynchronous computer mediated conference. Two conference discussions within the same postgraduate course are compared in order to reveal the way in which…
Using Computational Toxicology to Enable Risk-Based ...
presentation at Drug Safety Gordon Research Conference 2016 on research efforts in NCCT to enable Computational Toxicology to support risk assessment. Slide presentation at Drug Safety Gordon Research Conference 2016 on research efforts in NCCT to enable Computational Toxicology to support risk assessment.
The 68th Session of the International Labour Conference, June 1982.
ERIC Educational Resources Information Center
International Labour Review, 1982
1982-01-01
This year's session adopted new standards such as maintenance of migrant workers' social security rights, protection of workers against unjustified dismissal, and vocational rehabilitation. This article describes the conference's examination of these technical agenda items, and its annual review of the application of Conventions and…
PREFACE: New trends in Computer Simulations in Physics and not only in physics
NASA Astrophysics Data System (ADS)
Shchur, Lev N.; Krashakov, Serge A.
2016-02-01
In this volume we have collected papers based on the presentations given at the International Conference on Computer Simulations in Physics and beyond (CSP2015), held in Moscow, September 6-10, 2015. We hope that this volume will be helpful and scientifically interesting for readers. The Conference was organized for the first time with the common efforts of the Moscow Institute for Electronics and Mathematics (MIEM) of the National Research University Higher School of Economics, the Landau Institute for Theoretical Physics, and the Science Center in Chernogolovka. The name of the Conference emphasizes the multidisciplinary nature of computational physics. Its methods are applied to the broad range of current research in science and society. The choice of venue was motivated by the multidisciplinary character of the MIEM. It is a former independent university, which has recently become the part of the National Research University Higher School of Economics. The Conference Computer Simulations in Physics and beyond (CSP) is planned to be organized biannually. This year's Conference featured 99 presentations, including 21 plenary and invited talks ranging from the analysis of Irish myths with recent methods of statistical physics, to computing with novel quantum computers D-Wave and D-Wave2. This volume covers various areas of computational physics and emerging subjects within the computational physics community. Each section was preceded by invited talks presenting the latest algorithms and methods in computational physics, as well as new scientific results. Both parallel and poster sessions paid special attention to numerical methods, applications and results. For all the abstracts presented at the conference please follow the link http://csp2015.ac.ru/files/book5x.pdf
A novel quantum solution to secure two-party distance computation
NASA Astrophysics Data System (ADS)
Peng, Zhen-wan; Shi, Run-hua; Wang, Pan-hong; Zhang, Shun
2018-06-01
Secure Two-Party Distance Computation is an important primitive of Secure Multiparty Computational Geometry that it involves two parties, where each party has a private point, and the two parties want to jointly compute the distance between their points without revealing anything about their respective private information. Secure Two-Party Distance Computation has very important and potential applications in settings of high secure requirements, such as privacy-preserving Determination of Spatial Location-Relation, Determination of Polygons Similarity, and so on. In this paper, we present a quantum protocol for Secure Two-Party Distance Computation by using QKD-based Quantum Private Query. The security of the protocol is based on the physical principles of quantum mechanics, instead of difficulty assumptions, and therefore, it can ensure higher security than the classical related protocols.
ERIC Educational Resources Information Center
National Indian Council on Aging, Albuquerque, NM.
Focusing on six major topics to be addressed at the 1981 White House Conference (economic security, physical and mental health, social well being, older Americans as a national resource, creating an age-integrated society, and research), the National Indian Conference attracted 1,165 persons from more than 140 tribes (592 being Indian elders over…
Secure Multiparty Quantum Computation for Summation and Multiplication.
Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
2016-01-21
As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics.
Secure Multiparty Quantum Computation for Summation and Multiplication
Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
2016-01-01
As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics. PMID:26792197
A Computer Security Course in the Undergraduate Computer Science Curriculum.
ERIC Educational Resources Information Center
Spillman, Richard
1992-01-01
Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…
2010-07-01
Cloud computing , an emerging form of computing in which users have access to scalable, on-demand capabilities that are provided through Internet... cloud computing , (2) the information security implications of using cloud computing services in the Federal Government, and (3) federal guidance and...efforts to address information security when using cloud computing . The complete report is titled Information Security: Federal Guidance Needed to
76 FR 7818 - Announcing a Meeting of the Information Security and Privacy Advisory Board
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-11
... will be open to the public. The ISPAB was established by the Computer Security Act of 1987 (Pub. L. 100..., --Presentation on Science of Security relating to computer security research, --Presentation on Access of..., --A panel of Inspector Generals regarding privacy and security, and --Update on NIST Computer Security...
ERIC Educational Resources Information Center
Association of Small Computer Users in Education, Greencastle, IN.
Forty-three papers from a conference on microcomputers are presented under the following headings: Computing in the Curriculum, Information and Computer Science Information; Institutional and Administrative Computing, and Management, Services, and Training. Topics of the papers include the following: telecommunications projects that work in…
ERIC Educational Resources Information Center
Lesgold, Alan; Reif, Frederick
The future of computers in education and the research needed to realize the computer's potential are discussed in this report, which presents a summary and the conclusions from an invitational conference involving 40 computer scientists, psychologists, educational researchers, teachers, school administrators, and parents. The summary stresses the…
SEED: A Suite of Instructional Laboratories for Computer Security Education
ERIC Educational Resources Information Center
Du, Wenliang; Wang, Ronghua
2008-01-01
The security and assurance of our computing infrastructure has become a national priority. To address this priority, higher education has gradually incorporated the principles of computer and information security into the mainstream undergraduate and graduate computer science curricula. To achieve effective education, learning security principles…
ICCE/ICCAI 2000 Full & Short Papers (Artificial Intelligence in Education).
ERIC Educational Resources Information Center
2000
This document contains the full and short papers on artificial intelligence in education from ICCE/ICCAI 2000 (International Conference on Computers in Education/International Conference on Computer-Assisted Instruction) covering the following topics: a computational model for learners' motivation states in individualized tutoring system; a…
ICCE/ICCAI 2000 Full & Short Papers (Student Modeling).
ERIC Educational Resources Information Center
2000
This document contains the following full and short papers on student modeling from ICCE/ICCAI 2000 (International Conference on Computers in Education/International Conference on Computer-Assisted Instruction): (1) "A Computational Model for Learner's Motivation States in Individualized Tutoring System" (Behrouz H. Far and Anete H.…
ISMB Conference Funding to Support Attendance of Early Researchers and Students
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gaasterland, Terry
ISMB Conference Funding for Students and Young Scientists Historical Description The Intelligent Systems for Molecular Biology (ISMB) conference has provided a general forum for disseminating the latest developments in bioinformatics on an annual basis for the past 22 years. ISMB is a multidisciplinary conference that brings together scientists from computer science, molecular biology, mathematics and statistics. The goal of the ISMB meeting is to bring together biologists and computational scientists in a focus on actual biological problems, i.e., not simply theoretical calculations. The combined focus on “intelligent systems” and actual biological data makes ISMB a unique and highly important meeting.more » 21 years of experience in holding the conference has resulted in a consistently well-organized, well attended, and highly respected annual conference. "Intelligent systems" include any software which goes beyond straightforward, closed-form algorithms or standard database technologies, and encompasses those that view data in a symbolic fashion, learn from examples, consolidate multiple levels of abstraction, or synthesize results to be cognitively tractable to a human, including the development and application of advanced computational methods for biological problems. Relevant computational techniques include, but are not limited to: machine learning, pattern recognition, knowledge representation, databases, combinatorics, stochastic modeling, string and graph algorithms, linguistic methods, robotics, constraint satisfaction, and parallel computation. Biological areas of interest include molecular structure, genomics, molecular sequence analysis, evolution and phylogenetics, molecular interactions, metabolic pathways, regulatory networks, developmental control, and molecular biology generally. Emphasis is placed on the validation of methods using real data sets, on practical applications in the biological sciences, and on development of novel computational techniques. The ISMB conferences are distinguished from many other conferences in computational biology or artificial intelligence by an insistence that the researchers work with real molecular biology data, not theoretical or toy examples; and from many other biological conferences by providing a forum for technical advances as they occur, which otherwise may be shunned until a firm experimental result is published. The resulting intellectual richness and cross-disciplinary diversity provides an important opportunity for both students and senior researchers. ISMB has become the premier conference series in this field with refereed, published proceedings, establishing an infrastructure to promote the growing body of research.« less
Sagot, Marie-France; McKay, B.J. Morrison; Myers, Gene
2009-01-01
The International Society for Computational Biology (ISCB; http://www.iscb.org) presents the Seventeenth Annual International Conference on Intelligent Systems for Molecular Biology (ISMB), organized jointly with the Eighth Annual European Conference on Computational Biology (ECCB; http://bioinf.mpi-inf.mpg.de/conferences/eccb/eccb.htm), in Stockholm, Sweden, 27 June to 2 July 2009. The organizers are putting the finishing touches on the year's premier computational biology conference, with an expected attendance of 1400 computer scientists, mathematicians, statisticians, biologists and scientists from other disciplines related to and reliant on this multi-disciplinary science. ISMB/ECCB 2009 (http://www.iscb.org/ismbeccb2009/) follows the framework introduced at the ISMB/ECCB 2007 (http://www.iscb.org/ismbeccb2007/) in Vienna, and further refined at the ISMB 2008 (http://www.iscb.org/ismb2008/) in Toronto; a framework developed to specifically encourage increased participation from often under-represented disciplines at conferences on computational biology. During the main ISMB conference dates of 29 June to 2 July, keynote talks from highly regarded scientists, including ISCB Award winners, are the featured presentations that bring all attendees together twice a day. The remainder of each day offers a carefully balanced selection of parallel sessions to choose from: proceedings papers, special sessions on emerging topics, highlights of the past year's published research, special interest group meetings, technology demonstrations, workshops and several unique sessions of value to the broad audience of students, faculty and industry researchers. Several hundred posters displayed for the duration of the conference has become a standard of the ISMB and ECCB conference series, and an extensive commercial exhibition showcases the latest bioinformatics publications, software, hardware and services available on the market today. The main conference is preceded by 2 days of Special Interest Group (SIG) and Satellite meetings running in parallel to the fifth Student Council Symposium on 27 June, and in parallel to Tutorials on 28 June. All scientific sessions take place at the Stockholmsmässan/Stockholm International Fairs conference and exposition facility. Contact: bj@iscb.org PMID:19447790
48 CFR 952.204-77 - Computer security.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Computer security. 952.204... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 952.204-77 Computer security. As prescribed in 904.404(d)(7), the following clause shall be included: Computer Security (AUG 2006) (a...
48 CFR 952.204-77 - Computer security.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Computer security. 952.204... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 952.204-77 Computer security. As prescribed in 904.404(d)(7), the following clause shall be included: Computer Security (AUG 2006) (a...
48 CFR 952.204-77 - Computer security.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Computer security. 952.204... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 952.204-77 Computer security. As prescribed in 904.404(d)(7), the following clause shall be included: Computer Security (AUG 2006) (a...
48 CFR 952.204-77 - Computer security.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Computer security. 952.204... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 952.204-77 Computer security. As prescribed in 904.404(d)(7), the following clause shall be included: Computer Security (AUG 2006) (a...
48 CFR 952.204-77 - Computer security.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Computer security. 952.204... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 952.204-77 Computer security. As prescribed in 904.404(d)(7), the following clause shall be included: Computer Security (AUG 2006) (a...
Tribal Militias: An Effective Tool to Counter Al-Qaida and Its Affiliates?
2014-11-01
Army issues affecting the national security community . The Peacekeeping and Stability Operations Institute provides subject matter expertise...implications for the Army, the Department of Defense, and the larger national security community . In addition to its studies, SSI publishes special reports on...newsletter to update the national security community on the research of our analysts, recent and forthcoming publications, and upcoming confer- ences
ERIC Educational Resources Information Center
White House Conference on Aging, Washington, DC.
This first volume of three of the final report of the 1981 White House Conference on Aging contains the response to the congressional charge to the Conference that the final report propose a national policy on aging not only for the minority who need aid but also for the majority of older adults who live in comfort and security. The report is…
ICCE/ICCAI 2000 Full & Short Papers (Web-Based Learning).
ERIC Educational Resources Information Center
2000
This document contains full and short papers on World Wide Web-based learning from ICCE/ICCAI 2000 (International Conference on Computers in Education/International Conference on Computer-Assisted Instruction). Topics covered include: design and development of CAL (Computer Assisted Learning) systems; design and development of WBI (Web-Based…
ERIC Educational Resources Information Center
Association for the Development of Computer-based Instructional Systems.
These proceedings include papers on such topics as authoring systems, computer-managed instruction, testing, instructional design, management education, simulations, intelligent computer-assisted instruction, and other areas related to computer-based education. Fifty-six papers and 104 abstracts are organized by Association for the Development of…
Designing Asynchronous, Text-Based Computer Conferences: Ten Research-Based Suggestions
ERIC Educational Resources Information Center
Choitz, Paul; Lee, Doris
2006-01-01
Asynchronous computer conferencing refers to the use of computer software and a network enabling participants to post messages that allow discourse to continue even though interactions may be extended over days and weeks. Asynchronous conferences are time-independent, adapting to multiple time zones and learner schedules. Such activities as…
Secretary of Energy Steven Chu speaks to the 2009 IAEA General Conference delegation
Secretary Chu
2017-12-09
On Sept. 14, 2009, U.S. Secretary of Energy Steven Chu addressed the 2009 IAEA General Conference delegation. Chu is the first Cabinet official to discuss President Obama's nuclear security and nonproliferation agenda outside the United States since the President delivered his landmark speech in Prague in April 2009.
ERIC Educational Resources Information Center
Institute of Family Studies, Melbourne (Australia).
Fourth in a series of volumes containing the proceedings of the 1983 Australian Family Research Conference, this publication deals with policies and families in Australia. Papers and authors included are: "Improving Social Security Programs: Some Options and Barriers" (Andrew Burbidge), "Single Parent Families and Social Policies:…
Eighteenth Strategy for Peace Conference Report, October 13-16, 1977.
ERIC Educational Resources Information Center
Stanley Foundation, Muscatine, IA.
The document presents a report of a conference to stimulate study, research, and education in the field of foreign relations. The report contains summaries of small group discussions of peace and security, economic order, development, resource/population balance, the environment, and human rights. It is presented in six sections. Section I…
Transportation Secure Data Center Publications | Transportation Secure Data
: Emerging Technologies, June 2015 Pavement Performance Evaluation Using Connected Vehicles Author: R Research Procedia, 2015 Quantification of Temperature Implications and Investigation of Battery Design Design, and Consumer Usage Authors: E. Wood, J. Neubauer, A. Brooker, J. Gonder, and K. Smith Conference
ERIC Educational Resources Information Center
Smith, Peter, Ed.
Papers from a conference on small college computing issues are: "An On-line Microcomputer Course for Pre-service Teachers" (Mary K. Abkemeier); "The Mathematics and Computer Science Learning Center (MLC)" (Solomon T. Abraham); "Multimedia for the Non-Computer Science Faculty Member" (Stephen T. Anderson, Sr.); "Achieving Continuous Improvement:…
Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation
2016-07-14
of the important properties of secure computation . In particular, it is known that full fairness cannot be achieved in the case of two-party com...Jakobsen, J. Nielsen, and C. Orlandi. A framework for outsourcing of secure computation . In ACM Workshop on Cloud Computing Security (CCSW), pages...Function Evaluation with Applications to Genomic Computation Abstract: Computation based on genomic data is becoming increasingly popular today, be it
Advanced Helmet Mounted Display (AHMD) for simulator applications
NASA Astrophysics Data System (ADS)
Sisodia, Ashok; Riser, Andrew; Bayer, Michael; McGuire, James P.
2006-05-01
The Advanced Helmet Mounted Display (AHMD), augmented reality visual system first presented at last year's Cockpit and Future Displays for Defense and Security conference, has now been evaluated in a number of military simulator applications and by L-3 Link Simulation and Training. This paper presents the preliminary results of these evaluations and describes current and future simulator and training applications for HMD technology. The AHMD blends computer-generated data (symbology, synthetic imagery, enhanced imagery) with the actual and simulated visible environment. The AHMD is designed specifically for highly mobile deployable, minimum resource demanding reconfigurable virtual training systems to satisfy the military's in-theater warrior readiness objective. A description of the innovative AHMD system and future enhancements will be discussed.
1999-07-28
Inf Med, 35 (1996). 8. J. P . O’Connor, J. W. Gray, C. McCollum, L. Notargiacomo, in Research Directions in Database Security, T. F. Lunt, Ed...Therefore, in general we favour refusal over lying. 104 There are several directions for further interesting research. We only mention a few of them...of the rules of P . Given two nodes p1 and p2 there is a direct edge from p1 to p2 if and only if predicate p2 occurs positively or negatively in the
Method for transferring data from an unsecured computer to a secured computer
Nilsen, Curt A.
1997-01-01
A method is described for transferring data from an unsecured computer to a secured computer. The method includes transmitting the data and then receiving the data. Next, the data is retransmitted and rereceived. Then, it is determined if errors were introduced when the data was transmitted by the unsecured computer or received by the secured computer. Similarly, it is determined if errors were introduced when the data was retransmitted by the unsecured computer or rereceived by the secured computer. A warning signal is emitted from a warning device coupled to the secured computer if (i) an error was introduced when the data was transmitted or received, and (ii) an error was introduced when the data was retransmitted or rereceived.
1984-09-01
Verification Technique for a Class of Security Kernels," International Symposium on Programming , Lecture Notes in Computer Science 137, Springer-Verlag, New York...September 1984 MTR9S31 " J. K. Millen Computer Security C. M. Cerniglia Models * 0 Ne c - ¢- C. S• ~CONTRACT SPONSOR OUSDRE/C31 & ESO/ALEE...ABSTRACT The purpose of this report is to provide a basis for evaluating security models in the context of secure computer system development
Home Computer and Internet User Security
2005-01-01
Information Security Model © 2005 Carnegie Mellon University (Lawrence R. Rogers, Author) Home Computer and Internet User Security...Carnegie Mellon University (Lawrence R. Rogers, Author) Home Computer and Internet User Security Version 1.0.4 – slide 50 Contact Information Lawrence R. Rogers • Email: cert@cert.org CERT website: http://www.cert.org/ ...U.S. Patent and Trademark Office Home Computer and Internet User Security Report Documentation Page Form ApprovedOMB
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
The Second SIAM Conference on Computational Science and Engineering was held in San Diego from February 10-12, 2003. Total conference attendance was 553. This is a 23% increase in attendance over the first conference. The focus of this conference was to draw attention to the tremendous range of major computational efforts on large problems in science and engineering, to promote the interdisciplinary culture required to meet these large-scale challenges, and to encourage the training of the next generation of computational scientists. Computational Science & Engineering (CS&E) is now widely accepted, along with theory and experiment, as a crucial third modemore » of scientific investigation and engineering design. Aerospace, automotive, biological, chemical, semiconductor, and other industrial sectors now rely on simulation for technical decision support. For federal agencies also, CS&E has become an essential support for decisions on resources, transportation, and defense. CS&E is, by nature, interdisciplinary. It grows out of physical applications and it depends on computer architecture, but at its heart are powerful numerical algorithms and sophisticated computer science techniques. From an applied mathematics perspective, much of CS&E has involved analysis, but the future surely includes optimization and design, especially in the presence of uncertainty. Another mathematical frontier is the assimilation of very large data sets through such techniques as adaptive multi-resolution, automated feature search, and low-dimensional parameterization. The themes of the 2003 conference included, but were not limited to: Advanced Discretization Methods; Computational Biology and Bioinformatics; Computational Chemistry and Chemical Engineering; Computational Earth and Atmospheric Sciences; Computational Electromagnetics; Computational Fluid Dynamics; Computational Medicine and Bioengineering; Computational Physics and Astrophysics; Computational Solid Mechanics and Materials; CS&E Education; Meshing and Adaptivity; Multiscale and Multiphysics Problems; Numerical Algorithms for CS&E; Discrete and Combinatorial Algorithms for CS&E; Inverse Problems; Optimal Design, Optimal Control, and Inverse Problems; Parallel and Distributed Computing; Problem-Solving Environments; Software and Wddleware Systems; Uncertainty Estimation and Sensitivity Analysis; and Visualization and Computer Graphics.« less
Bañares, Miguel A; Haase, Andrea; Tran, Lang; Lobaskin, Vladimir; Oberdörster, Günter; Rallo, Robert; Leszczynski, Jerzy; Hoet, Peter; Korenstein, Rafi; Hardy, Barry; Puzyn, Tomasz
2017-09-01
A first European Conference on Computational Nanotoxicology, CompNanoTox, was held in November 2015 in Benahavís, Spain with the objectives to disseminate and integrate results from the European modeling and database projects (NanoPUZZLES, ModENPTox, PreNanoTox, MembraneNanoPart, MODERN, eNanoMapper and EU COST TD1204 MODENA) as well as to create synergies within the European NanoSafety Cluster. This conference was supported by the COST Action TD1204 MODENA on developing computational methods for toxicological risk assessment of engineered nanoparticles and provided a unique opportunity for cross fertilization among complementary disciplines. The efforts to develop and validate computational models crucially depend on high quality experimental data and relevant assays which will be the basis to identify relevant descriptors. The ambitious overarching goal of this conference was to promote predictive nanotoxicology, which can only be achieved by a close collaboration between the computational scientists (e.g. database experts, modeling experts for structure, (eco) toxicological effects, performance and interaction of nanomaterials) and experimentalists from different areas (in particular toxicologists, biologists, chemists and material scientists, among others). The main outcome and new perspectives of this conference are summarized here.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bañares, Miguel A.; Haase, Andrea; Tran, Lang
A first European Conference on Computational Nanotoxicology, CompNanoTox, was held in November 2015 in Benahavís, Spain with the objectives to disseminate and integrate results from the European modeling and database projects (NanoPUZZLES, ModENPTox, PreNanoTox, MembraneNanoPart, MODERN, eNanoMapper and EU COST TD1204 MODENA) as well as to create synergies within the European NanoSafety Cluster. This conference was supported by the COST Action TD1204 MODENA on developing computational methods for toxicological risk assessment of engineered nanoparticles and provided a unique opportunity for crossfertilization among complementary disciplines. The efforts to develop and validate computational models crucially depend on high quality experimental data andmore » relevant assays which will be the basis to identify relevant descriptors. The ambitious overarching goal of this conference was to promote predictive nanotoxicology, which can only be achieved by a close collaboration between the computational scientists (e.g. database experts, modeling experts for structure, (eco) toxicological effects, performance and interaction of nanomaterials) and experimentalists from different areas (in particular toxicologists, biologists, chemists and material scientists, among others). The main outcome and new perspectives of this conference are summarized here.« less
Countering Russian Active Measures
2018-04-16
28 Economic Capture ......................................................................................................... 30...Vladimir Putin delivered a speech at the 43rd Munich Conference on Security Policy, where he accused the US of imposing its economic , political...National-Security- Strategy-31Dec2015.pdf, accessed 1 September 2017. 2 Russian leaders have viewed the economic expansion of the EU with similar
Defense.gov Special Report: Travels With Hagel
Germany January 2014 News Stories Hagel: Future Requires Renewed Era of Partnership In a changing security 50th Munich Security Conference in Germany today, Defense Secretary Chuck Hagel met with leaders from Germany, the United Kingdom, Israel, Georgia and India to discuss military relationships and common
75 FR 39955 - Homeland Security Science and Technology Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-13
... Technology Advisory Committee AGENCY: Science and Technology Directorate, DHS. ACTION: Committee Management... Technology Advisory Committee (HSSTAC) will meet July 20-21, 2010 at 4075 Wilson Blvd., Liberty Conference... Homeland Security Science and Technology Advisory Committee meeting will be open to the public on July 20th...
Sixth New Zealand Computer Conference (Auckland 78). Volume I, Papers.
ERIC Educational Resources Information Center
New Zealand Computer Society, Auckland.
This collection of conference presentations includes 23 papers on a variety of topics pertaining to the use of computer in New Zealand. Among the topics discussed are computer science techniques in a commercial data processing situation, data processing personnel and their careers, the communication aspects of an airline system, implementation of…
ERIC Educational Resources Information Center
Murphy, Harry J.
Twenty-seven papers are presented from a conference on applications of computer technology for disabled persons. The following titles and authors are represented: "Computer Applications For Rehabilitation Organizations: Finding What You Need" (T. Backer); "Similarities In Cognitive Development Of Severely Physically Handicapped and Younger Regular…
Information Security: Computer Hacker Information Available on the Internet
1996-06-05
INFORMATION SECURITY Computer Hacker Information Available on the Internet Statement for the Record of...Report Type N/A Dates Covered (from... to) - Title and Subtitle INFORMATION SECURITY Computer Hacker Information Available on the Internet Contract...1996 4. TITLE AND SUBTITLE Information Security: Computer Hacker Information Available on the Internet 5. FUNDING NUMBERS 6. AUTHOR(S) Jack L.
Indirection and computer security.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Berg, Michael J.
2011-09-01
The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyzemore » common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education & Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1-3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices. Leaders may incorporate the Short Subjects into presentations. After talkingmore » about a subject area, one of the Short Subjects may be shown to highlight that subject matter. Another method for sharing them could be to show a Short Subject first and then lead a discussion about its topic. The cast of characters and a bit of information about their personalities in the LLNL Computer Security Short Subjects is included in this report.« less
The U.S. Footprint on the Arabian Peninsula: Can We Avoid a Repeat of the Pullout from Saudi Arabia?
2009-12-01
respective GCC country. Centrally located power is defined as the government of a GCC country that allows minimal or no political liberalization ...exercise more political liberalization , and carefully balance religious entities with secular foreign policy requirements are far less easily manipulated...Command and Defense Security Cooperation Agency staff, and conference material related to EU -GCC security. Other national security strategy
Arab Threat Perceptions and the Future of the U.S. Military Presence in the Middle East
2015-10-01
knowledge, and provides solutions to strategic Army issues affecting the national security community . The Peacekeeping and Stability Operations...analysts concern topics having strategic implications for the Army, the Department of Defense, and the larger national security community . In addition...update the national security community on the research of our analysts, recent and forthcoming publications, and upcoming confer- ences sponsored by
NASA Astrophysics Data System (ADS)
Dong, Yumin; Xiao, Shufen; Ma, Hongyang; Chen, Libo
2016-12-01
Cloud computing and big data have become the developing engine of current information technology (IT) as a result of the rapid development of IT. However, security protection has become increasingly important for cloud computing and big data, and has become a problem that must be solved to develop cloud computing. The theft of identity authentication information remains a serious threat to the security of cloud computing. In this process, attackers intrude into cloud computing services through identity authentication information, thereby threatening the security of data from multiple perspectives. Therefore, this study proposes a model for cloud computing protection and management based on quantum authentication, introduces the principle of quantum authentication, and deduces the quantum authentication process. In theory, quantum authentication technology can be applied in cloud computing for security protection. This technology cannot be cloned; thus, it is more secure and reliable than classical methods.
Shaping the Security Environment Newport paper no. 29
2006-11-29
interest in and set the stage for a ministerial conference. That ministerial conference, held in November 2006 in Cotonou , Benin, brought together...awareness has been at least partially met. The Accra workshop and Cotonou Ministerial Conference were both considered suc- cessful in that the outputs...Organization and the Maritime Organization for West and Central Africa in the Accra workshop and Cotonou S H A P I N G T H E S E C U R I T Y E N V I R
Summary of talks and papers at ISCB-Asia/SCCG 2012
2013-01-01
The second ISCB-Asia conference of the International Society for Computational Biology took place December 17-19, 2012, in Shenzhen, China. The conference was co-hosted by BGI as the first Shenzhen Conference on Computational Genomics (SCCG). 45 talks were presented at ISCB-Asia/SCCG 2012. The topics covered included software tools, reproducible computing, next-generation sequencing data analysis, transcription and mRNA regulation, protein structure and function, cancer genomics and personalized medicine. Nine of the proceedings track talks are included as full papers in this supplement. In this report we first give a short overview of the conference by listing some statistics and visualizing the talk abstracts as word clouds. Then we group the talks by topic and briefly summarize each one, providing references to related publications whenever possible. Finally, we close with a few comments on the success of this conference.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-24
... Armed Services, Foreign Relations, Homeland Security and Governmental Affairs, and Appropriations of the... Section 1235(c) of the Ike Skelton National Defense Authorization Act for Fiscal Year 2011 Memorandum for... function and authority conferred upon the President by section 1235(c) of the Ike Skelton National Defense...
ERIC Educational Resources Information Center
Commonwealth Education Liaison Committee, London (England).
A TOTAL OF 118 DELEGATES AND OBSERVERS REPRESENTING 24 COMMONWEALTH COUNTRIES AND BRITISH TERRITORIES AND A NUMBER OF INTERNATIONAL ORGANIZATIONS ATTENDED A CONFERENCE TO HELP EACH PARTICIPATING COUNTRY SECURE THE MAXIMUM POSSIBLE IMPROVEMENT IN ITS ARRANGEMENTS FOR EDUCATING AND TRAINING TECHNICIANS. RECOGNIZED EXPERTS PRESENTED THE MAIN THEMES…
Managing Interdependence: Eleventh Conference on the United Nations of the Next Decade.
ERIC Educational Resources Information Center
Stanley Foundation, Muscatine, IA.
This report of the United Nations 11th conference is distributed in the hope that it will stimulate study, research, and education with respect to the United Nations and its vital role in achieving international peace and security and a better world. In 1976, international statesmen, diplomats, and scholars assembled at Charlottesville, Virginia…
... Money & Credit Homes & Mortgages Health & Fitness Jobs & Making Money Privacy, Identity & Online Security Limiting Unwanted Calls and Emails Online Security "Free" Security Scans Computer Security Disposing of Old Computers ...
ERIC Educational Resources Information Center
Edwards, Keith
2015-01-01
Attacks on computer systems continue to be a problem. The majority of the attacks target home computer users. To help mitigate the attacks some companies provide security awareness training to their employees. However, not all people work for a company that provides security awareness training and typically, home computer users do not have the…
Have Computer, Will Not Travel: Meeting Electronically.
ERIC Educational Resources Information Center
Kurland, Norman D.
1983-01-01
Beginning with two different scenarios depicting a face-to-face conference on the one hand and, on the other, a computer or electronic conference, the author argues the advantages of electronic conferencing and describes some of its uses. (JBM)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Vigil, M.B.
1995-03-01
This document provides a written compilation of the presentations and viewgraphs from the 1994 Conference on High Speed Computing given at the High Speed Computing Conference, {open_quotes}High Performance Systems,{close_quotes} held at Gleneden Beach, Oregon, on April 18 through 21, 1994.
ICCE/ICCAI 2000 Keynote Papers.
ERIC Educational Resources Information Center
2000
This document contains the four keynote papers from ICCE/ICCAI 2000 (International Conference on Computers in Education/International Conference on Computer-Assisted Instruction). "Using Technologies To Model Student Problem Spaces" (David Jonassen) contrasts examples of semantic network, expert system, and systems modeling…
ERIC Educational Resources Information Center
Martin, C. Dianne, Ed.; Murchie-Beyma, Eric, Ed.
This monograph includes nine papers delivered at a National Educational Computing Conference (NECC) preconference workshop, and a previously unpublished paper on gender and attitudes. The papers, which are presented in four categories, are: (1) "Report on the Workshop: In Search of Gender Free Paradigms for Computer Science Education"…
ERIC Educational Resources Information Center
National Educational Computing Association, Eugene, OR.
This document contains the proceedings of the National Educational Computing Conference (NECC) 2001. The following research papers are included: "UCI Computer Arts: Building Gender Equity While Meeting ISTE NETS" (Kimberly Bisbee Burge); "From Mythology to Technology: Sisyphus Makes the Leap to Learn" (Patricia J. Donohue, Mary…
Cognitive Computational Neuroscience: A New Conference for an Emerging Discipline.
Naselaris, Thomas; Bassett, Danielle S; Fletcher, Alyson K; Kording, Konrad; Kriegeskorte, Nikolaus; Nienborg, Hendrikje; Poldrack, Russell A; Shohamy, Daphna; Kay, Kendrick
2018-05-01
Understanding the computational principles that underlie complex behavior is a central goal in cognitive science, artificial intelligence, and neuroscience. In an attempt to unify these disconnected communities, we created a new conference called Cognitive Computational Neuroscience (CCN). The inaugural meeting revealed considerable enthusiasm but significant obstacles remain. Copyright © 2018 Elsevier Ltd. All rights reserved.
ERIC Educational Resources Information Center
Ellis, Edwin, Ed.
This volume of proceedings of the 1990 National Educational Computing Conference (NECC) provides a record of the state-of-the-art in the use of computing in a variety of educational settings. Special sessions, panels, projects, 153 abstracts, and 44 papers are reported here on subjects including: elementary and secondary educational software,…
ERIC Educational Resources Information Center
Roehl, Janet E., Ed.
These proceedings provide 30 papers from a conference to highlight a frontier area in serving the disabled--microcomputers--which blends two disciplines, vocational rehabilitation and special education. Keynote addresses are "High Tech/High Touch: Making Good on the Promise" (Fenderson); "Curbcuts and Computers: Providing Access to Computers and…
Science and Technology Resources on the Internet: Computer Security.
ERIC Educational Resources Information Center
Kinkus, Jane F.
2002-01-01
Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…
... Money & Credit Homes & Mortgages Health & Fitness Jobs & Making Money Privacy, Identity & Online Security Limiting Unwanted Calls and Emails Online Security "Free" Security Scans Computer Security Disposing of Old Computers ...
ERIC Educational Resources Information Center
1983
Delegates to this training computer conference agreed that the scope of economic change is both accelerating and profound and, therefore, will require a wide variety of approaches to human resource development. Training is only a small part of this development. To meet future needs, the conferees discussed and made recommendations in four areas:…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lyonnais, Marc; Smith, Matt; Mace, Kate P.
SCinet is the purpose-built network that operates during the International Conference for High Performance Computing,Networking, Storage and Analysis (Super Computing or SC). Created each year for the conference, SCinet brings to life a high-capacity network that supports applications and experiments that are a hallmark of the SC conference. The network links the convention center to research and commercial networks around the world. This resource serves as a platform for exhibitors to demonstrate the advanced computing resources of their home institutions and elsewhere by supporting a wide variety of applications. Volunteers from academia, government and industry work together to design andmore » deliver the SCinet infrastructure. Industry vendors and carriers donate millions of dollars in equipment and services needed to build and support the local and wide area networks. Planning begins more than a year in advance of each SC conference and culminates in a high intensity installation in the days leading up to the conference. The SCinet architecture for SC16 illustrates a dramatic increase in participation from the vendor community, particularly those that focus on network equipment. Software-Defined Networking (SDN) and Data Center Networking (DCN) are present in nearly all aspects of the design.« less
Computer Security Systems Enable Access.
ERIC Educational Resources Information Center
Riggen, Gary
1989-01-01
A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)
The research of computer network security and protection strategy
NASA Astrophysics Data System (ADS)
He, Jian
2017-05-01
With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.
NASA Astrophysics Data System (ADS)
Stevens, Rick
2008-07-01
The fourth annual Scientific Discovery through Advanced Computing (SciDAC) Conference was held June 13-18, 2008, in Seattle, Washington. The SciDAC conference series is the premier communitywide venue for presentation of results from the DOE Office of Science's interdisciplinary computational science program. Started in 2001 and renewed in 2006, the DOE SciDAC program is the country's - and arguably the world's - most significant interdisciplinary research program supporting the development of advanced scientific computing methods and their application to fundamental and applied areas of science. SciDAC supports computational science across many disciplines, including astrophysics, biology, chemistry, fusion sciences, and nuclear physics. Moreover, the program actively encourages the creation of long-term partnerships among scientists focused on challenging problems and computer scientists and applied mathematicians developing the technology and tools needed to address those problems. The SciDAC program has played an increasingly important role in scientific research by allowing scientists to create more accurate models of complex processes, simulate problems once thought to be impossible, and analyze the growing amount of data generated by experiments. To help further the research community's ability to tap into the capabilities of current and future supercomputers, Under Secretary for Science, Raymond Orbach, launched the Innovative and Novel Computational Impact on Theory and Experiment (INCITE) program in 2003. The INCITE program was conceived specifically to seek out computationally intensive, large-scale research projects with the potential to significantly advance key areas in science and engineering. The program encourages proposals from universities, other research institutions, and industry. During the first two years of the INCITE program, 10 percent of the resources at NERSC were allocated to INCITE awardees. However, demand for supercomputing resources far exceeded available systems; and in 2003, the Office of Science identified increasing computing capability by a factor of 100 as the second priority on its Facilities of the Future list. The goal was to establish leadership-class computing resources to support open science. As a result of a peer reviewed competition, the first leadership computing facility was established at Oak Ridge National Laboratory in 2004. A second leadership computing facility was established at Argonne National Laboratory in 2006. This expansion of computational resources led to a corresponding expansion of the INCITE program. In 2008, Argonne, Lawrence Berkeley, Oak Ridge, and Pacific Northwest national laboratories all provided resources for INCITE. By awarding large blocks of computer time on the DOE leadership computing facilities, the INCITE program enables the largest-scale computations to be pursued. In 2009, INCITE will award over half a billion node-hours of time. The SciDAC conference celebrates progress in advancing science through large-scale modeling and simulation. Over 350 participants attended this year's talks, poster sessions, and tutorials, spanning the disciplines supported by DOE. While the principal focus was on SciDAC accomplishments, this year's conference also included invited presentations and posters from DOE INCITE awardees. Another new feature in the SciDAC conference series was an electronic theater and video poster session, which provided an opportunity for the community to see over 50 scientific visualizations in a venue equipped with many high-resolution large-format displays. To highlight the growing international interest in petascale computing, this year's SciDAC conference included a keynote presentation by Herman Lederer from the Max Planck Institut, one of the leaders of DEISA (Distributed European Infrastructure for Supercomputing Applications) project and a member of the PRACE consortium, Europe's main petascale project. We also heard excellent talks from several European groups, including Laurent Gicquel of CERFACS, who spoke on `Large-Eddy Simulations of Turbulent Reacting Flows of Real Burners: Status and Challenges', and Jean-Francois Hamelin from EDF, who presented a talk on `Getting Ready for Petaflop Capacities and Beyond: A Utility Perspective'. Two other compelling addresses gave attendees a glimpse into the future. Tomas Diaz de la Rubia of Lawrence Livermore National Laboratory spoke on a vision for a fusion/fission hybrid reactor known as the `LIFE Engine' and discussed some of the materials and modeling challenges that need to be overcome to realize the vision for a 1000-year greenhouse-gas-free power source. Dan Reed from Microsoft gave a capstone talk on the convergence of technology, architecture, and infrastructure for cloud computing, data-intensive computing, and exascale computing (1018 flops/sec). High-performance computing is making rapid strides. The SciDAC community's computational resources are expanding dramatically. In the summer of 2008 the first general purpose petascale system (IBM Cell-based RoadRunner at Los Alamos National Laboratory) was recognized in the top 500 list of fastest machines heralding in the dawning of the petascale era. The DOE's leadership computing facility at Argonne reached number three on the Top 500 and is at the moment the most capable open science machine based on an IBM BG/P system with a peak performance of over 550 teraflops/sec. Later this year Oak Ridge is expected to deploy a 1 petaflops/sec Cray XT system. And even before the scientific community has had an opportunity to make significant use of petascale systems, the computer science research community is forging ahead with ideas and strategies for development of systems that may by the end of the next decade sustain exascale performance. Several talks addressed barriers to, and strategies for, achieving exascale capabilities. The last day of the conference was devoted to tutorials hosted by Microsoft Research at a new conference facility in Redmond, Washington. Over 90 people attended the tutorials, which covered topics ranging from an introduction to BG/P programming to advanced numerical libraries. The SciDAC and INCITE programs and the DOE Office of Advanced Scientific Computing Research core program investments in applied mathematics, computer science, and computational and networking facilities provide a nearly optimum framework for advancing computational science for DOE's Office of Science. At a broader level this framework also is benefiting the entire American scientific enterprise. As we look forward, it is clear that computational approaches will play an increasingly significant role in addressing challenging problems in basic science, energy, and environmental research. It takes many people to organize and support the SciDAC conference, and I would like to thank as many of them as possible. The backbone of the conference is the technical program; and the task of selecting, vetting, and recruiting speakers is the job of the organizing committee. I thank the members of this committee for all the hard work and the many tens of conference calls that enabled a wonderful program to be assembled. This year the following people served on the organizing committee: Jim Ahrens, LANL; David Bader, LLNL; Bryan Barnett, Microsoft; Peter Beckman, ANL; Vincent Chan, GA; Jackie Chen, SNL; Lori Diachin, LLNL; Dan Fay, Microsoft; Ian Foster, ANL; Mark Gordon, Ames; Mohammad Khaleel, PNNL; David Keyes, Columbia University; Bob Lucas, University of Southern California; Tony Mezzacappa, ORNL; Jeff Nichols, ORNL; David Nowak, ANL; Michael Papka, ANL; Thomas Schultess, ORNL; Horst Simon, LBNL; David Skinner, LBNL; Panagiotis Spentzouris, Fermilab; Bob Sugar, UCSB; and Kathy Yelick, LBNL. I owe a special thanks to Mike Papka and Jim Ahrens for handling the electronic theater. I also thank all those who submitted videos. It was a highly successful experiment. Behind the scenes an enormous amount of work is required to make a large conference go smoothly. First I thank Cheryl Zidel for her tireless efforts as organizing committee liaison and posters chair and, in general, handling all of my end of the program and keeping me calm. I also thank Gail Pieper for her work in editing the proceedings, Beth Cerny Patino for her work on the Organizing Committee website and electronic theater, and Ken Raffenetti for his work in keeping that website working. Jon Bashor and John Hules did an excellent job in handling conference communications. I thank Caitlin Youngquist for the striking graphic design; Dan Fay for tutorials arrangements; and Lynn Dory, Suzanne Stevenson, Sarah Pebelske and Sarah Zidel for on-site registration and conference support. We all owe Yeen Mankin an extra-special thanks for choosing the hotel, handling contracts, arranging menus, securing venues, and reassuring the chair that everything was under control. We are pleased to have obtained corporate sponsorship from Cray, IBM, Intel, HP, and SiCortex. I thank all the speakers and panel presenters. I also thank the former conference chairs Tony Metzzacappa, Bill Tang, and David Keyes, who were never far away for advice and encouragement. Finally, I offer my thanks to Michael Strayer, without whose leadership, vision, and persistence the SciDAC program would not have come into being and flourished. I am honored to be part of his program and his friend. Rick Stevens Seattle, Washington July 18, 2008
NATO Transformation and Operational Support in the Canadian Forces: Part 1: The Political Dimension
2010-11-01
David Rudd; DRDC CORA TR 2010-244; R & D pour la défense Canada –CARO; Novembre 2010. Contexte: L’Organisation du Traité de l’Atlantique Nord (OTAN...Alliance as a tool through which it pursues a globalized security strategy. 13 At the 2010 Munich Conference on Security Policy, Defense Secretary... 13 National Security Strategy May 2010, p. 41. http://www.whitehouse.gov/sites/default/files
2011-08-26
peoples, such as the Inuit , have been accorded greater control of their own lives, while multilateral organizations have been crafted to provide a forum...stakeholders in the Inuit community, and not all of the agreements made between aboriginal groups and national governments have been honored. As a...North America and the Arctic Council”; and, (3) Udloriak Hanson from the Inuit Tapiriit Kanatami, “Sovereignty, Resource Development and Security
DefenseLink Special: Travels with Gates, February 2007
to address the 43rd Munich Conference on Security Policy, Feb. 10 and 11, in Munich, Germany. Feb. 12 , the secretary traveled to Pakistan to meet with Pakistan President Pervez Musharaff to discuss border security on the Pakistan-Afghanistan border. Islamabad, Pakistan Gates, Pakistani President Discuss Border
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-21
... DEPARTMENT OF COMMERCE Bureau of Industry and Security President's Export Council; Subcommittee on... Administration (PECSEA) will meet on June 4, 2013, 9:30 a.m. (pacific daylight time), at Boeing Defense, Space and Security, Space and Intelligence Systems, Building S24, Conference Center, 2020 East Imperial...
76 FR 34088 - Homeland Security Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-10
... purpose of deliberating on recommendations by the HSAC's Community Resilience Task Force. DATES: The HSAC conference call will take place from 1 p.m. to 2 p.m. E.D.T. on Monday, June 27, 2011. Please be advised that... homeland security operations. The HSAC will meet to review and approve the Community Resilience Task Force...
2007-07-11
Corn Oil High Fructose Corn Syrup Gluten Meal Gluten Feed Starch Wet Feed Germ Meal Gluten Condensed Corn Fermented Extractives Energy...nuts. "Pigs can be picky eaters," Mr. Smith says, scooping a handful of banana chips, yogurt -covered raisins, dried papaya and cashews from one of
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-11
... before May 12, 2011. ADDRESSES: Written comments may be sent to: Chief, Computer Security Division... FURTHER INFORMATION CONTACT: Elaine Barker, Computer Security Division, National Institute of Standards... Quynh Dang, Computer Security Division, National Institute of Standards and Technology, Gaithersburg, MD...
Delivering the Benefits of Chemical-Biological Integration in ...
Slide Presentation at the German Cheminformatics Conference on Delivering the Benefits of Chemical-Biological Integration in Computational Toxicology at the EPA. Presentation at the German Cheminformatics Conference on Delivering the Benefits of Chemical-Biological Integration in Computational Toxicology at the EPA.
2011-01-01
The 2011 International Conference on Bioinformatics (InCoB) conference, which is the annual scientific conference of the Asia-Pacific Bioinformatics Network (APBioNet), is hosted by Kuala Lumpur, Malaysia, is co-organized with the first ISCB-Asia conference of the International Society for Computational Biology (ISCB). InCoB and the sequencing of the human genome are both celebrating their tenth anniversaries and InCoB’s goalposts for the next decade, implementing standards in bioinformatics and globally distributed computational networks, will be discussed and adopted at this conference. Of the 49 manuscripts (selected from 104 submissions) accepted to BMC Genomics and BMC Bioinformatics conference supplements, 24 are featured in this issue, covering software tools, genome/proteome analysis, systems biology (networks, pathways, bioimaging) and drug discovery and design. PMID:22372736
The Challenges of Seeking Security While Respecting Privacy
NASA Astrophysics Data System (ADS)
Kantor, Paul B.; Lesk, Michael E.
Security is a concern for persons, organizations, and nations. For the individual members of organizations and nations, personal privacy is also a concern. The technologies for monitoring electronic communication are at the same time tools to protect security and threats to personal privacy. Participants in this workshop address the interrelation of personal privacy and national or societal security, from social, technical and legal perspectives. The participants represented industry, the academy and the United States Government. The issues addressed have become, if anything, even more pressing today than they were when the conference was held.
Secure key storage and distribution
Agrawal, Punit
2015-06-02
This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.
PREFACE: Theory, Modelling and Computational methods for Semiconductors
NASA Astrophysics Data System (ADS)
Migliorato, Max; Probert, Matt
2010-04-01
These conference proceedings contain the written papers of the contributions presented at the 2nd International Conference on: Theory, Modelling and Computational methods for Semiconductors. The conference was held at the St Williams College, York, UK on 13th-15th Jan 2010. The previous conference in this series took place in 2008 at the University of Manchester, UK. The scope of this conference embraces modelling, theory and the use of sophisticated computational tools in Semiconductor science and technology, where there is a substantial potential for time saving in R&D. The development of high speed computer architectures is finally allowing the routine use of accurate methods for calculating the structural, thermodynamic, vibrational and electronic properties of semiconductors and their heterostructures. This workshop ran for three days, with the objective of bringing together UK and international leading experts in the field of theory of group IV, III-V and II-VI semiconductors together with postdocs and students in the early stages of their careers. The first day focused on providing an introduction and overview of this vast field, aimed particularly at students at this influential point in their careers. We would like to thank all participants for their contribution to the conference programme and these proceedings. We would also like to acknowledge the financial support from the Institute of Physics (Computational Physics group and Semiconductor Physics group), the UK Car-Parrinello Consortium, Accelrys (distributors of Materials Studio) and Quantumwise (distributors of Atomistix). The Editors Acknowledgements Conference Organising Committee: Dr Matt Probert (University of York) and Dr Max Migliorato (University of Manchester) Programme Committee: Dr Marco Califano (University of Leeds), Dr Jacob Gavartin (Accelrys Ltd, Cambridge), Dr Stanko Tomic (STFC Daresbury Laboratory), Dr Gabi Slavcheva (Imperial College London) Proceedings edited and compiled by Dr Max Migliorato and Dr Matt Probert
Computer conferencing: the "nurse" in the "Electronic School District".
Billings, D M; Phillips, A
1991-01-01
As computer-based instructional technologies become increasingly available, they offer new mechanisms for health educators to provide health instruction. This article describes a pilot project in which nurses established a computer conference to provide health instruction to high school students participating in an electronic link of high schools. The article discusses computer conferencing, the "Electronic School District," the design of the nursing conference, and the role of the nurse in distributed health education.
ERIC Educational Resources Information Center
Douglass, Malcolm P., Ed.
The articles in this collection approach the theme of "Reading in the Age of the Computer" in a variety of ways. Topics covered in the 26 articles include the following: (1) children, school, and computers; (2) new kinds of electronic learning environments; (3) the personal computer for creative learning and thinking; (4) going beyond…
ERIC Educational Resources Information Center
Educational Computing Organization of Ontario, Toronto.
The 88 papers included in this publication are organized into seven groupings used as themes in the conference, "Computing Knows No Borders." The topics are: Administration (12 papers); Computer Studies (13 papers); Educational Tools (10 papers); Logo (7 papers); Software (9 papers); Special Education (8 papers); and Teaching (16…
Quantum-Enhanced Cyber Security: Experimental Computation on Quantum-Encrypted Data
2017-03-02
AFRL-AFOSR-UK-TR-2017-0020 Quantum-Enhanced Cyber Security: Experimental Computation on Quantum-Encrypted Data Philip Walther UNIVERSITT WIEN Final...REPORT TYPE Final 3. DATES COVERED (From - To) 15 Oct 2015 to 31 Dec 2016 4. TITLE AND SUBTITLE Quantum-Enhanced Cyber Security: Experimental Computation...FORM SF 298 Final Report for FA9550-1-6-1-0004 Quantum-enhanced cyber security: Experimental quantum computation with quantum-encrypted data
ERIC Educational Resources Information Center
Chiam, Heng Keng, Ed.
These proceedings report the results of 10 years of ongoing research by the Malaysian Child Development Project to develop and implement measures to study the cognitive, language, and socioemotional development of Malaysian preschool children. Part 1 of the report contains opening speeches delivered by conference organizers and dignitaries. Part 2…
ERIC Educational Resources Information Center
DAVENPORT, ROY K.; AND OTHERS
A JOINT CONFERENCE OF PERSONNEL CONCERNED WITH EDUCATION AND TRAINING OF MANPOWER IN THE DEPARTMENT OF DEFENSE (DOD), OFFICE OF EDUCATION, AND THE NATIONAL SECURITY INDUSTRIAL ASSOCIATION, WAS CALLED BY THE DOD TO CONSIDER HOW THE THREE ORGANIZATIONS COULD COLLABORATE. THE DOD PROPOSED USING THE ENORMOUS POWER OF ITS PROCUREMENT SYSTEM TO…
ERIC Educational Resources Information Center
National Hispanic Leadership Conference, Washington, DC.
This document presents the 1988 National Hispanic Leadership Conference's agenda on the following major issues: (1) civil rights; (2) corporate and philanthropic responsibility; (3) criminal justice; (4) culture and language policy; (5) economic development policy; (6) education; (7) employment and economic security; (8) health and mental health;…
78 FR 1275 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-08
... Social Security Administration (Computer Matching Agreement 1071). SUMMARY: In accordance with the... of its new computer matching program with the Social Security Administration (SSA). DATES: OPM will... conditions under which SSA will disclose Social Security benefit data to OPM via direct computer link. OPM...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pfaltzgraff, Robert L
2006-10-22
This conference's focus was the peaceful uses of the atom and their implications for nuclear science, energy security, nuclear medicine and national security. The conference also provided the setting for the presentation of the prestigious Enrico Fermi Prize, a Presidential Award which recognizes the contributions of distinguished members of the scientific community for a lifetime of exceptional achievement in the science and technology of nuclear, atomic, molecular, and particle interactions and effects. An impressive group of distinguished speakers addressed various issues that included: the impact and legacy of the Eisenhower Administrationâs âAtoms for Peaceâ concept, the current and future rolemore » of nuclear power as an energy source, the challenges of controlling and accounting for existing fissile material, and the horizons of discovery for particle or high-energy physics. The basic goal of the conference was to examine what has been accomplished over the past fifty years as well as to peer into the future to gain insights into what may occur in the fields of nuclear energy, nuclear science, nuclear medicine, and the control of nuclear materials.« less
ERIC Educational Resources Information Center
Dalton, David W., Ed.
The theme of the 32nd International Association for the Development of Computer-Based Instructional Systems (ADCIS) Conference was "Restructuring Training and Education through Technology." This collection of conference presentations contains 52 papers and 183 abstracts for which there are no formal papers. The papers and abstracts are presented…
ERIC Educational Resources Information Center
Stentz, Michael, Ed.; Motsinger, Linda, Ed.
Topics which range from the more popular computing applications in accounting, statistics, and administration to the less ordinary applications of the computer to the fields of fine arts, medicine, and linguistics, are discussed in this collection of 22 conference papers. The papers are divided into four tracks: the first deals with statistical…
ERIC Educational Resources Information Center
Lesgold, Alan M., Ed.; Reif, Frederick, Ed.
The full proceedings are provided here of a conference of 40 teachers, educational researchers, and scientists from both the public and private sectors that centered on the future of computers in education and the research required to realize the computer's educational potential. A summary of the research issues considered and suggested means for…
ERIC Educational Resources Information Center
Petrushin, V., Ed.; Dovgiallo, A., Ed.
The conference reported in this document provides a meeting place for researchers from around the world, where the emphasis is on new ideas connected to computer technologies in education. This volume contains 140 extended abstracts selected by the program committee and organized into the following categories: (1) educational informational…
Proceedings of the 3rd Annual Conference on Aerospace Computational Control, volume 1
NASA Technical Reports Server (NTRS)
Bernard, Douglas E. (Editor); Man, Guy K. (Editor)
1989-01-01
Conference topics included definition of tool requirements, advanced multibody component representation descriptions, model reduction, parallel computation, real time simulation, control design and analysis software, user interface issues, testing and verification, and applications to spacecraft, robotics, and aircraft.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-01
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0089] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that...
FAA computer security : recommendations to address continuing weaknesses
DOT National Transportation Integrated Search
2000-12-01
In September, testimony before the Committee on Science, House of Representatives, focused on the Federal Aviation Administration's (FAA) computer security program. In brief, we reported that FAA's agency-wide computer security program has serious, p...
ERIC Educational Resources Information Center
Defense Language Inst., Monterey, CA.
Twenty-five conference papers are presented along with the conference agenda, two welcoming speeches, and lists of conference speakers and participants. The conference focused on the use of video and computer technology in foreign language instruction. The individual papers address such topics as: (1) video design and methodology for foreign…
Fully device-independent conference key agreement
NASA Astrophysics Data System (ADS)
Ribeiro, Jérémy; Murta, Gláucia; Wehner, Stephanie
2018-02-01
We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N -partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N -1 . We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N -1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.
MDA-image: an environment of networked desktop computers for teleradiology/pathology.
Moffitt, M E; Richli, W R; Carrasco, C H; Wallace, S; Zimmerman, S O; Ayala, A G; Benjamin, R S; Chee, S; Wood, P; Daniels, P
1991-04-01
MDA-Image, a project of The University of Texas M. D. Anderson Cancer Center, is an environment of networked desktop computers for teleradiology/pathology. Radiographic film is digitized with a film scanner and histopathologic slides are digitized using a red, green, and blue (RGB) video camera connected to a microscope. Digitized images are stored on a data server connected to the institution's computer communication network (Ethernet) and can be displayed from authorized desktop computers connected to Ethernet. Images are digitized for cases presented at the Bone Tumor Management Conference, a multidisciplinary conference in which treatment options are discussed among clinicians, surgeons, radiologists, pathologists, radiotherapists, and medical oncologists. These radiographic and histologic images are shown on a large screen computer monitor during the conference. They are available for later review for follow-up or representation.
Security and Efficiency Concerns With Distributed Collaborative Networking Environments
2003-09-01
have the ability to access Web communications services of the WebEx MediaTone Network from a single login. [24] WebEx provides a range of secure...Web. WebEx services enable secure data, voice and video communications through the browser and are supported by the WebEx MediaTone Network, a global...designed to host large-scale, structured events and conferences, featuring a Q&A Manager that allows multiple moderators to handle questions while
Security model for VM in cloud
NASA Astrophysics Data System (ADS)
Kanaparti, Venkataramana; Naveen K., R.; Rajani, S.; Padmvathamma, M.; Anitha, C.
2013-03-01
Cloud computing is a new approach emerged to meet ever-increasing demand for computing resources and to reduce operational costs and Capital Expenditure for IT services. As this new way of computation allows data and applications to be stored away from own corporate server, it brings more issues in security such as virtualization security, distributed computing, application security, identity management, access control and authentication. Even though Virtualization forms the basis for cloud computing it poses many threats in securing cloud. As most of Security threats lies at Virtualization layer in cloud we proposed this new Security Model for Virtual Machine in Cloud (SMVC) in which every process is authenticated by Trusted-Agent (TA) in Hypervisor as well as in VM. Our proposed model is designed to with-stand attacks by unauthorized process that pose threat to applications related to Data Mining, OLAP systems, Image processing which requires huge resources in cloud deployed on one or more VM's.
[Selected Papers of the EDUCOM Annual Conference, October 1981].
ERIC Educational Resources Information Center
Interuniversity Communications Council (EDUCOM), Princeton, NJ.
This collection of 10 papers from the 1981 conference of the Interuniversity Communications Council (EDUCOM) highlights developments in new communications technologies and their impact on higher education, emphasizing computer usage and telecommunications advancements. Three papers analyzing computer applications to higher education focus on the…
ICCE/ICCAI 2000 Full & Short Papers (Collaborative Learning).
ERIC Educational Resources Information Center
2000
This document contains the full and short papers on collaborative learning from ICCE/ICCAI 2000 (International Conference on Computers in Education/International Conference on Computer-Assisted Instruction) covering the following topics: comparison of applying Internet to cooperative and traditional learning; a distributed backbone system for…
ICCE/ICCAI 2000 Full & Short Papers (Creative Learning).
ERIC Educational Resources Information Center
2000
This document contains the following full and short papers on creative learning from ICCE/ICCAI 2000 (International Conference on Computers in Education/International Conference on Computer-Assisted Instruction): (1) "A Collaborative Learning Support System Based on Virtual Environment Server for Multiple Agents" (Takashi Ohno, Kenji…
ICCE/ICCAI 2000 Full & Short Papers (Others).
ERIC Educational Resources Information Center
2000
This document contains the following full and short papers from ICCE/ICCAI 2000 (International Conference on Computers in Education/International Conference on Computer-Assisted Instruction): (1) "A Code Restructuring Tool To Help Scaffold Novice Programmers" (Stuart Garner); (2) "An Assessment Framework for Information Technology Integrated…
Can Humans Fly Action Understanding with Multiple Classes of Actors
2015-06-08
recognition using structure from motion point clouds. In European Conference on Computer Vision, 2008. [5] R. Caruana. Multitask learning. Machine Learning...tonomous driving ? the kitti vision benchmark suite. In IEEE Conference on Computer Vision and Pattern Recognition, 2012. [12] L. Gorelick, M. Blank
SciCADE 95: International conference on scientific computation and differential equations
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1995-12-31
This report consists of abstracts from the conference. Topics include algorithms, computer codes, and numerical solutions for differential equations. Linear and nonlinear as well as boundary-value and initial-value problems are covered. Various applications of these problems are also included.
Close the Gate, Lock the Windows, Bolt the Doors: Securing Library Computers. Online Treasures
ERIC Educational Resources Information Center
Balas, Janet
2005-01-01
This article, written by a systems librarian at the Monroeville Public Library, discusses a major issue affecting all computer users, security. It indicates that while, staying up-to-date on the latest security issues has become essential for all computer users, it's more critical for network managers who are responsible for securing computer…
Laboratory of Viral Diseases Guest Researcher Seminar Series | Center for Cancer Research
Laboratory of Viral Diseases Guest Researcher Seminar Series New Epigenetic Regulators of HIV Latency Speaker: Melanie Ott, M.D., Ph.D, Senior Investigator & Professor of Medicine Gladstone Institutes & University of California Building 33, Main Conference Room 1N09 Main NIH CAMPUS *BLDG 33 is a secure facility, please allow time to pass through security.
ERIC Educational Resources Information Center
Education Law Association, Dayton, OH.
This booklet contains five chapters relating to issues in school safety and security, and fair dismissals: (1) "Ohio Legislation and Federal and State Decisions" (Richard J. Dickinson). Items of deliberation include financial matters, school safety issues, administrator and teacher contract matters, Title IX liability, school prayer, drug testing…
2014-09-18
radios in a cognitive radio network using a radio frequency fingerprinting based method. In IEEE International Conference on Communications (ICC...IMPROVEDWIRELESS SECURITY THROUGH PHYSICAL LAYER PROTOCOL MANIPULATION AND RADIO FREQUENCY FINGERPRINTING DISSERTATION Benjamin W. Ramsey, Captain...PHYSICAL LAYER PROTOCOL MANIPULATION AND RADIO FREQUENCY FINGERPRINTING DISSERTATION Presented to the Faculty Graduate School of Engineering and
ERIC Educational Resources Information Center
McLain, Douglas, Jr.
Eugene Rostow (Yale University) and David Tarr (University of Wisconsin) present their views concerning the wisdom and validity of U.S. security policies, including SALT, and the adequacy of the country's political/military planning. Rostow, representing the views of the Committee on the Present Danger, believes that America is losing the…
Developing a computer security training program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1990-01-01
We all know that training can empower the computer protection program. However, pushing computer security information outside the computer security organization into the rest of the company is often labeled as an easy project or a dungeon full of dragons. Used in part or whole, the strategy offered in this paper may help the developer of a computer security training program ward off dragons and create products and services. The strategy includes GOALS (what the result of training will be), POINTERS (tips to ensure survival), and STEPS (products and services as a means to accomplish the goals).
A future for systems and computational neuroscience in France?
Faugeras, Olivier; Frégnac, Yves; Samuelides, Manuel
2007-01-01
This special issue of the Journal of Physiology, Paris, is an outcome of NeuroComp'06, the first French conference in Computational Neuroscience. The preparation for this conference, held at Pont-à-Mousson in October 2006, was accompanied by a survey which has resulted in an up-to-date inventory of human resources and labs in France concerned with this emerging new field of research (see team directory in http://neurocomp.risc.cnrs.fr/). This thematic JPP issue gathers some of the key scientific presentations made on the occasion of this first interdisciplinary meeting, which should soon become recognized as a yearly national conference representative of a new scientific community. The present introductory paper presents the general scientific context of the conference and reviews some of the historical and conceptual foundations of Systems and Computational Neuroscience in France.
ERIC Educational Resources Information Center
College and Univ. Computer Users Association, Columbia, SC.
The 36 papers contained in this collection from the College and University Computer Users Conference (CUMREC '93) are grouped under six topic areas. The main subject areas and examples of the topics covered are: (1) computer-based student support systems, including telecounseling and recruiting, a student advising system, the assignment of…
1989-02-01
North American algebraists, in academic mathematics departments, appear to have computer anxiety or computation anxiety . Conferences and...the Heaviside function of S[4,51. H(S)[(p+ Vov] =0 (1) D H(S)[ HRv + Vp = 0 (2) Dt where D 8 a -- = +3- (3) We nondimensionalize the equations by using
ERIC Educational Resources Information Center
Miami-Dade Community Coll., FL.
This book contains 37 papers on computer use in higher education originally presented at a May, 1992, conference of college and university computer users. Most of the papers describe programs or systems implemented at particular institutions and cover the following: systems for career planning, automating purchasing and financial commitments,…
Quantum Optical Implementations of Current Quantum Computing Paradigms
2005-05-01
Conferences and Proceedings: The results were presented at several conferences. These include: 1. M. O. Scully, " Foundations of Quantum Mechanics ", in...applications have revealed a strong connection between the fundamental aspects of quantum mechanics that governs physical systems and the informational...could be solved in polynomial time using quantum computers. Another set of problems where quantum mechanics can carry out computations substantially
6 CFR 13.27 - Computation of time.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Computation of time. 13.27 Section 13.27 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.27 Computation of time. (a) In computing any period of time under this part or in an order issued...
Reviews on Security Issues and Challenges in Cloud Computing
NASA Astrophysics Data System (ADS)
An, Y. Z.; Zaaba, Z. F.; Samsudin, N. F.
2016-11-01
Cloud computing is an Internet-based computing service provided by the third party allowing share of resources and data among devices. It is widely used in many organizations nowadays and becoming more popular because it changes the way of how the Information Technology (IT) of an organization is organized and managed. It provides lots of benefits such as simplicity and lower costs, almost unlimited storage, least maintenance, easy utilization, backup and recovery, continuous availability, quality of service, automated software integration, scalability, flexibility and reliability, easy access to information, elasticity, quick deployment and lower barrier to entry. While there is increasing use of cloud computing service in this new era, the security issues of the cloud computing become a challenges. Cloud computing must be safe and secure enough to ensure the privacy of the users. This paper firstly lists out the architecture of the cloud computing, then discuss the most common security issues of using cloud and some solutions to the security issues since security is one of the most critical aspect in cloud computing due to the sensitivity of user's data.
Information Systems, Security, and Privacy.
ERIC Educational Resources Information Center
Ware, Willis H.
1984-01-01
Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)
Intelligent cloud computing security using genetic algorithm as a computational tools
NASA Astrophysics Data System (ADS)
Razuky AL-Shaikhly, Mazin H.
2018-05-01
An essential change had occurred in the field of Information Technology which represented with cloud computing, cloud giving virtual assets by means of web yet awesome difficulties in the field of information security and security assurance. Currently main problem with cloud computing is how to improve privacy and security for cloud “cloud is critical security”. This paper attempts to solve cloud security by using intelligent system with genetic algorithm as wall to provide cloud data secure, all services provided by cloud must detect who receive and register it to create list of users (trusted or un-trusted) depend on behavior. The execution of present proposal has shown great outcome.
24th IUPAP Conference on Computational Physics (2012): Introduction, acknowledgements, program
NASA Astrophysics Data System (ADS)
Baiotti, Luca; Takabe, Hideaki
2013-08-01
Welcome to CCP2012, held next to the K computer site in Kobe and in Japan's best season. The Conference on Computational Physics (CCP) is organized annually under the auspices of Commission 20 of the IUPAP (International Union of Pure and Applied Physics). This is the first time it has been held in Japan. I was asked to be the chairman about two and half years ago and when I accepted the request I decided to make the conference very unique and different from the traditional style of CCP. I was not satisfied when I attended big conferences where the parallel sessions are classified with the name of the research field. These days we have many opportunities to attend domestic and international conferences, where it is possible to listen to many talks on the same topics. If the topics are very new, then the conference is very useful for my research. However, I wanted to have a conference where I could listen to a variety of topics carried out with the same method. Computational science is very unique and it is easy to organize a new type of conference with the classification in the horizontal direction of the matrix made of the names of research fields and the name of numerical methods. You may be able to list the names of methods easily; finite difference, Monte Carlo, particle, molecular dynamics and so on. I was dissatisfied to find that most conferences focus solely on research fields and the method that brings to the scientific research is not highlighted as much. I wanted to listen to topics from fundamental physics to industrial science in a systematic way. In order to create such a conference, a small number of experts is not enough, so I asked for the help of more than 100 Japanese computer scientists, in a variety of fields. We called this group the Japan Advisory Board (JAB). I asked them to recommend a member of the International Advisory Board (IAB). Then, we could start making the list of plenary and invited speakers. This was almost the end of March last year. CCP2012 is organized also to celebrate the shared use of the K computer and we selected a venue next to it. Its use is of course open to the public and started on 28 September, one month earlier than had been scheduled. I hope you also enjoy the guided tour of the K computer. Throughout CCP2012, I hope new collaborations start among scientists in different fields. It would be also my great pleasure if such an inter-disciplinary conference encouraged young scientists (with their fresh energy and skills) to challenge new topics in different fields, particularly emerging ones like bio-computing, industrial applications, social sciences and so on. Finally, allow me to express my sincere thanks to all members of the local organizing committee (LOC). Twenty scientists from three universities and one institute voluntarily worked very hard to prepare CCP2012. Hideaki Takabe (Aki) The Chairman, CCP2012
ICCE/ICCAI 2000 Full & Short Papers (Virtual Lab/Classroom/School).
ERIC Educational Resources Information Center
2000
This document contains the following full and short papers on virtual laboratories, classrooms, and schools from ICCE/ICCAI 2000 (International Conference on Computers in Education/International Conference on Computer-Assisted Instruction): (1) "A Collaborative Learning Support System Based on Virtual Environment Server for Multiple…
ERIC Educational Resources Information Center
Stanley Foundation, Muscatine, IA.
The conference reported on in this document focused on the profound changes taking place in the world, changes characterized by their international nature and requiring multinational cooperation. The security of national borders continues to be a concern, but internal threats to governments are the more common phenomenon. The combination of…
Report on Progress Toward Security and Stability in Afghanistan
2010-04-01
which has resulted in continued capability gaps in the Combined Joint Statement of Requirements (CJSOR) from unresourced requirements not filled by...international partners. The most notable gap is the requirement for trainers and mentors to support development of the ANSF. U.S. Forces are taking...made at the December 2009 NATO Foreign Ministerial and February 2010 NATO Force Generation Conference. The December conference yielded contributions
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-02
... Standards and Technology's (NIST) Computer Security Division maintains a Computer Security Resource Center... Regarding Driver History Record Information Security, Continuity of Operation Planning, and Disaster... (SDLAs) to support their efforts at maintaining the security of information contained in the driver...
Wren, Jonathan D; Dozmorov, Mikhail G; Burian, Dennis; Kaundal, Rakesh; Perkins, Andy; Perkins, Ed; Kupfer, Doris M; Springer, Gordon K
2013-01-01
The tenth annual conference of the MidSouth Computational Biology and Bioinformatics Society (MCBIOS 2013), "The 10th Anniversary in a Decade of Change: Discovery in a Sea of Data", took place at the Stoney Creek Inn & Conference Center in Columbia, Missouri on April 5-6, 2013. This year's Conference Chairs were Gordon Springer and Chi-Ren Shyu from the University of Missouri and Edward Perkins from the US Army Corps of Engineers Engineering Research and Development Center, who is also the current MCBIOS President (2012-3). There were 151 registrants and a total of 111 abstracts (51 oral presentations and 60 poster session abstracts).
Restricted access processor - An application of computer security technology
NASA Technical Reports Server (NTRS)
Mcmahon, E. M.
1985-01-01
This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.
2011-06-01
4. Conclusion The Web -based AGeS system described in this paper is a computationally-efficient and scalable system for high- throughput genome...method for protecting web services involves making them more resilient to attack using autonomic computing techniques. This paper presents our initial...20–23, 2011 2011 DoD High Performance Computing Modernzation Program Users Group Conference HPCMP UGC 2011 The papers in this book comprise the
Proposal for a Security Management in Cloud Computing for Health Care
Dzombeta, Srdan; Brandis, Knud
2014-01-01
Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system. Therefore, in this paper we propose a framework that includes the most important security processes regarding cloud computing in the health care sector. Starting with a framework of general information security management processes derived from standards of the ISO 27000 family the most important information security processes for health care organizations using cloud computing will be identified considering the main risks regarding cloud computing and the type of information processed. The identified processes will help a health care organization using cloud computing to focus on the most important ISMS processes and establish and operate them at an appropriate level of maturity considering limited resources. PMID:24701137
Proposal for a security management in cloud computing for health care.
Haufe, Knut; Dzombeta, Srdan; Brandis, Knud
2014-01-01
Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system. Therefore, in this paper we propose a framework that includes the most important security processes regarding cloud computing in the health care sector. Starting with a framework of general information security management processes derived from standards of the ISO 27000 family the most important information security processes for health care organizations using cloud computing will be identified considering the main risks regarding cloud computing and the type of information processed. The identified processes will help a health care organization using cloud computing to focus on the most important ISMS processes and establish and operate them at an appropriate level of maturity considering limited resources.
ICCE/ICCAI 2000 Full & Short Papers (Knowledge Construction and Navigation).
ERIC Educational Resources Information Center
2000
This document contains the following full and short papers on knowledge construction and navigation from ICCE/ICCAI 2000 (International Conference on Computers in Education/International Conference on Computer-Assisted Instruction): (1) "An XML-Based Tool for Building and Using Conceptual Maps in Education and Training Environments"…
ICCE/ICCAI 2000 Full & Short Papers (Lifelong Learning).
ERIC Educational Resources Information Center
2000
This document contains the following full and short papers on lifelong learning from ICCE/ICCAI 2000 (International Conference on Computers in Education/International Conference on Computer-Assisted Instruction): (1) "A Study on the School Information Technology Pilot Scheme: Possibilities of Creative and Lifelong Learning" (Siu-Cheung Kong,…
ICCE/ICCAI 2000 Full & Short Papers (Educational Agent).
ERIC Educational Resources Information Center
2000
This document contains the full text of the following papers on educational agent from ICCE/ICCAI 2000 (International Conference on Computers in Education/International Conference on Computer-Assisted Instruction): (1) "An Agent-Based Intelligent Tutoring System" (C.M. Bruff and M.A. Williams); (2) "Design of Systematic Concept…
ERIC Educational Resources Information Center
1986
This document includes summaries of conference presentations dealing with a wide variety of topics, including chemistry units for the elementary classroom, science experimentation in the secondary school, computer simulations, computer interfaces, videodisc technology, correspondence teaching of general chemistry, interdisciplinary energy courses,…
ICCE/ICCAI 2000 Full & Short Papers (Intelligent Tutoring Systems).
ERIC Educational Resources Information Center
2000
This document contains the full and short papers on intelligent tutoring systems (ITS) from ICCE/ICCAI 2000 (International Conference on Computers in Education/International Conference on Computer-Assisted Instruction) covering the following topics: a framework for Internet-based distributed learning; a fuzzy-based assessment for the Perl tutoring…
ICCE/ICCAI 2000 Full & Short Papers (Interactive Learning Environments).
ERIC Educational Resources Information Center
2000
This document contains the full and short papers on interactive learning environments from ICCE/ICCAI 2000 (International Conference on Computers in Education/International Conference on Computer-Assisted Instruction) covering the following topics: a CAL system for appreciation of 3D shapes by surface development; a constructivist virtual physics…
Sixth Annual Conference on Computers, Freedom, and Privacy: The RealAudio Proceedings.
ERIC Educational Resources Information Center
Glover, Barbara; Meernik, Mary
1996-01-01
Reviews the sixth Conference on Computers, Freedom, and Privacy (CFP) held in March 1996. Highlights include the Communications Decency Act, part of the 1996 Telecommunications Reform Act; European views; Internet service providers; limiting online speech on campus; cryptography; the global information infrastructure; copyright; and China and the…
Show & Tell. Proceedings of the Ontario Universities' Conference (1st, Guelph, Canada, May 1987).
ERIC Educational Resources Information Center
Herrmann, Thom, Ed.
Twenty-three conference papers focus on the use of information technology in Ontario's technical colleges and universities: "The Analytic Criticism Module--Authorial Structures & Design" (P. Beam); "Computing by Design" (R. D. Brown & J. D. Milliken); "Engineers and Computers" (P. S. Chisholm, M. Iwaniw, and…
ICCE/ICCAI 2000 Full & Short Papers (System Design and Development).
ERIC Educational Resources Information Center
2000
This document contains the full and short papers on system design and development from ICCE/ICCAI 2000 (International Conference on Computers in Education/International Conference on Computer-Assisted Instruction) covering the following topics: a code restructuring tool to help scaffold novice programmers; a framework for Internet-based…
Technology 2003: The Fourth National Technology Transfer Conference and Exposition, volume 2
NASA Technical Reports Server (NTRS)
Hackett, Michael (Compiler)
1994-01-01
Proceedings from symposia of the Technology 2003 Conference and Exposition, Dec. 7-9, 1993, Anaheim, CA, are presented. Volume 2 features papers on artificial intelligence, CAD&E, computer hardware, computer software, information management, photonics, robotics, test and measurement, video and imaging, and virtual reality/simulation.
ICCE/ICCAI 2000 Full & Short Papers (Multimedia and Hypermedia in Education).
ERIC Educational Resources Information Center
2000
This document contains the full and short papers on multimedia and hypermedia in education from ICCE/ICCAI 2000 (International Conference on Computers in Education/International Conference on Computer-Assisted Instruction) covering the following topics: learner-centered navigation path planning in world Wide Web-based learning; the relation…
ICCE/ICCAI 2000 Full & Short Papers (Methodologies).
ERIC Educational Resources Information Center
2000
This document contains the full text of the following full and short papers on methodologies from ICCE/ICCAI 2000 (International Conference on Computers in Education/International Conference on Computer-Assisted Instruction): (1) "A Methodology for Learning Pattern Analysis from Web Logs by Interpreting Web Page Contents" (Chih-Kai Chang and…
SIAM Conference on Geometric Design and Computing. Final Technical Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2002-03-11
The SIAM Conference on Geometric Design and Computing attracted 164 domestic and international researchers, from academia, industry, and government. It provided a stimulating forum in which to learn about the latest developments, to discuss exciting new research directions, and to forge stronger ties between theory and applications. Final Report
ICCE/ICCAI 2000 Full & Short Papers (Teaching and Learning Processes).
ERIC Educational Resources Information Center
2000
This document contains the full and short papers on teaching and learning processes from ICCE/ICCAI 2000 (International Conference on Computers in Education/International Conference on Computer-Assisted Instruction) covering the following topics: a code restructuring tool to help scaffold novice programmers; efficient study of Kanji using…
ERIC Educational Resources Information Center
Nixon, Carol, Comp.
This book contains the presentations of the 16th annual Computers in Libraries Conference. Contents include: "Creating New Services & Opportunities through Web Databases"; "Influencing Change and Student Learning through Staff Development"; "Top Ten Navigation Tips"; "Library of the Year: Gwinnett County…
Overview of Computer Security Certification and Accreditation. Final Report.
ERIC Educational Resources Information Center
Ruthberg, Zella G.; Neugent, William
Primarily intended to familiarize ADP (automatic data processing) policy and information resource managers with the approach to computer security certification and accreditation found in "Guideline to Computer Security Certification and Accreditation," Federal Information Processing Standards Publications (FIPS-PUB) 102, this overview…
Visualization Tools for Teaching Computer Security
ERIC Educational Resources Information Center
Yuan, Xiaohong; Vega, Percy; Qadah, Yaseen; Archer, Ricky; Yu, Huiming; Xu, Jinsheng
2010-01-01
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network…
Computer Network Security: Best Practices for Alberta School Jurisdictions.
ERIC Educational Resources Information Center
Alberta Dept. of Education, Edmonton.
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems
Wu, Jun; Su, Zhou; Li, Jianhua
2017-01-01
Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on “friend” relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems. PMID:28758943
Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems.
Wu, Jun; Su, Zhou; Wang, Shen; Li, Jianhua
2017-07-30
Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on "friend" relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems.
ERIC Educational Resources Information Center
Oregon Univ., Eugene. Center for Advanced Technology in Education.
The 13 conference presentations in this proceedings are arranged by general and special interest sessions and listed within each session in the order in which they were presented. These papers are: (1) "Key Issues for the Near Future" (David Moursund); (2) "Educating with Computers: Insights from Cognitive Psychology (and Video Games)" (Morton Ann…
PREFACE: International Conference on Computing in High Energy and Nuclear Physics (CHEP 2010)
NASA Astrophysics Data System (ADS)
Lin, Simon C.; Shen, Stella; Neufeld, Niko; Gutsche, Oliver; Cattaneo, Marco; Fisk, Ian; Panzer-Steindel, Bernd; Di Meglio, Alberto; Lokajicek, Milos
2011-12-01
The International Conference on Computing in High Energy and Nuclear Physics (CHEP) was held at Academia Sinica in Taipei from 18-22 October 2010. CHEP is a major series of international conferences for physicists and computing professionals from the worldwide High Energy and Nuclear Physics community, Computer Science, and Information Technology. The CHEP conference provides an international forum to exchange information on computing progress and needs for the community, and to review recent, ongoing and future activities. CHEP conferences are held at roughly 18 month intervals, alternating between Europe, Asia, America and other parts of the world. Recent CHEP conferences have been held in Prauge, Czech Republic (2009); Victoria, Canada (2007); Mumbai, India (2006); Interlaken, Switzerland (2004); San Diego, California(2003); Beijing, China (2001); Padova, Italy (2000) CHEP 2010 was organized by Academia Sinica Grid Computing Centre. There was an International Advisory Committee (IAC) setting the overall themes of the conference, a Programme Committee (PC) responsible for the content, as well as Conference Secretariat responsible for the conference infrastructure. There were over 500 attendees with a program that included plenary sessions of invited speakers, a number of parallel sessions comprising around 260 oral and 200 poster presentations, and industrial exhibitions. We thank all the presenters, for the excellent scientific content of their contributions to the conference. Conference tracks covered topics on Online Computing, Event Processing, Software Engineering, Data Stores, and Databases, Distributed Processing and Analysis, Computing Fabrics and Networking Technologies, Grid and Cloud Middleware, and Collaborative Tools. The conference included excursions to various attractions in Northern Taiwan, including Sanhsia Tsu Shih Temple, Yingko, Chiufen Village, the Northeast Coast National Scenic Area, Keelung, Yehliu Geopark, and Wulai Aboriginal Village, as well as two banquets held at the Grand Hotel and Grand Formosa Regent in Taipei. The next CHEP conference will be held in New York, the United States on 21-25 May 2012. We would like to thank the National Science Council of Taiwan, the EU ACEOLE project, commercial sponsors, and the International Advisory Committee and the Programme Committee members for all their support and help. Special thanks to the Programme Committee members for their careful choice of conference contributions and enormous effort in reviewing and editing about 340 post conference proceedings papers. Simon C Lin CHEP 2010 Conference Chair and Proceedings Editor Taipei, Taiwan November 2011 Track Editors/ Programme Committee Chair Simon C Lin, Academia Sinica, Taiwan Online Computing Track Y H Chang, National Central University, Taiwan Harry Cheung, Fermilab, USA Niko Neufeld, CERN, Switzerland Event Processing Track Fabio Cossutti, INFN Trieste, Italy Oliver Gutsche, Fermilab, USA Ryosuke Itoh, KEK, Japan Software Engineering, Data Stores, and Databases Track Marco Cattaneo, CERN, Switzerland Gang Chen, Chinese Academy of Sciences, China Stefan Roiser, CERN, Switzerland Distributed Processing and Analysis Track Kai-Feng Chen, National Taiwan University, Taiwan Ulrik Egede, Imperial College London, UK Ian Fisk, Fermilab, USA Fons Rademakers, CERN, Switzerland Torre Wenaus, BNL, USA Computing Fabrics and Networking Technologies Track Harvey Newman, Caltech, USA Bernd Panzer-Steindel, CERN, Switzerland Antonio Wong, BNL, USA Ian Fisk, Fermilab, USA Niko Neufeld, CERN, Switzerland Grid and Cloud Middleware Track Alberto Di Meglio, CERN, Switzerland Markus Schulz, CERN, Switzerland Collaborative Tools Track Joao Correia Fernandes, CERN, Switzerland Philippe Galvez, Caltech, USA Milos Lokajicek, FZU Prague, Czech Republic International Advisory Committee Chair: Simon C. Lin , Academia Sinica, Taiwan Members: Mohammad Al-Turany , FAIR, Germany Sunanda Banerjee, Fermilab, USA Dario Barberis, CERN & Genoa University/INFN, Switzerland Lothar Bauerdick, Fermilab, USA Ian Bird, CERN, Switzerland Amber Boehnlein, US Department of Energy, USA Kors Bos, CERN, Switzerland Federico Carminati, CERN, Switzerland Philippe Charpentier, CERN, Switzerland Gang Chen, Institute of High Energy Physics, China Peter Clarke, University of Edinburgh, UK Michael Ernst, Brookhaven National Laboratory, USA David Foster, CERN, Switzerland Merino Gonzalo, CIEMAT, Spain John Gordon, STFC-RAL, UK Volker Guelzow, Deutsches Elektronen-Synchrotron DESY, Hamburg, Germany John Harvey, CERN, Switzerland Frederic Hemmer, CERN, Switzerland Hafeez Hoorani, NCP, Pakistan Viatcheslav Ilyin, Moscow State University, Russia Matthias Kasemann, DESY, Germany Nobuhiko Katayama, KEK, Japan Milos Lokajícek, FZU Prague, Czech Republic David Malon, ANL, USA Pere Mato Vila, CERN, Switzerland Mirco Mazzucato, INFN CNAF, Italy Richard Mount, SLAC, USA Harvey Newman, Caltech, USA Mitsuaki Nozaki, KEK, Japan Farid Ould-Saada, University of Oslo, Norway Ruth Pordes, Fermilab, USA Hiroshi Sakamoto, The University of Tokyo, Japan Alberto Santoro, UERJ, Brazil Jim Shank, Boston University, USA Alan Silverman, CERN, Switzerland Randy Sobie , University of Victoria, Canada Dongchul Son, Kyungpook National University, South Korea Reda Tafirout , TRIUMF, Canada Victoria White, Fermilab, USA Guy Wormser, LAL, France Frank Wuerthwein, UCSD, USA Charles Young, SLAC, USA
ERIC Educational Resources Information Center
Smith, Christopher, Ed.
Thirty-nine papers from the conference "Discovery '84: Technology for Disabled Persons" are presented. The conference was intended to provide an overview of the areas in which technological advances have been made, including the applications of computers and other related products and services. Conference presenters represented fields of…
Additional Security Considerations for Grid Management
NASA Technical Reports Server (NTRS)
Eidson, Thomas M.
2003-01-01
The use of Grid computing environments is growing in popularity. A Grid computing environment is primarily a wide area network that encompasses multiple local area networks, where some of the local area networks are managed by different organizations. A Grid computing environment also includes common interfaces for distributed computing software so that the heterogeneous set of machines that make up the Grid can be used more easily. The other key feature of a Grid is that the distributed computing software includes appropriate security technology. The focus of most Grid software is on the security involved with application execution, file transfers, and other remote computing procedures. However, there are other important security issues related to the management of a Grid and the users who use that Grid. This note discusses these additional security issues and makes several suggestions as how they can be managed.
Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals
NASA Astrophysics Data System (ADS)
Fleischmann, Kenneth R.
The biggest challenge facing computer security researchers and professionals is not learning how to make ethical decisions; rather it is learning how to recognize ethical decisions. All too often, technology development suffers from what Langdon Winner terms technological somnambulism - we sleepwalk through our technology design, following past precedents without a second thought, and fail to consider the perspectives of other stakeholders [1]. Computer security research and practice involves a number of opportunities for ethical decisions. For example, decisions about whether or not to automatically provide security updates involve tradeoffs related to caring versus user autonomy. Decisions about online voting include tradeoffs between convenience and security. Finally, decisions about routinely screening e-mails for spam involve tradeoffs of efficiency and privacy. It is critical that these and other decisions facing computer security researchers and professionals are confronted head on as value-laden design decisions, and that computer security researchers and professionals consider the perspectives of various stakeholders in making these decisions.
Quality and security - They work together
NASA Technical Reports Server (NTRS)
Carr, Richard; Tynan, Marie; Davis, Russell
1991-01-01
This paper describes the importance of considering computer security as part of software quality assurance practice. The intended audience is primarily those professionals involved in the design, development, and quality assurance of software. Many issues are raised which point to the need ultimately for integration of quality assurance and computer security disciplines. To address some of the issues raised, the NASA Automated Information Security program is presented as a model which may be used for improving interactions between the quality assurance and computer security community of professionals.
78 FR 15734 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0010] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... computer matching program between the Department of Homeland Security/U.S. Citizenship and Immigration...
78 FR 15733 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0008] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... computer matching program between the Department of Homeland Security/U.S. Citizenship and Immigration...
ERIC Educational Resources Information Center
Wisconsin Univ., Madison. Inst. for Research on Poverty.
This volume groups papers discussing indicators of children's well-being into three areas: child health, education, and economic security. Papers concerning child health include: (1) "Prenatal and Infant Health Indicators" (Paula Lantz and Melissa Partin); (2) "Health Indicators for Preschool Children (Ages 1-4)" (Barbara L.…
International Conference on Intelligent Systems for Molecular Biology (ISMB)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Goldberg, Debra; Hibbs, Matthew; Kall, Lukas
The Intelligent Systems for Molecular Biology (ISMB) conference has provided a general forum for disseminating the latest developments in bioinformatics on an annual basis for the past 13 years. ISMB is a multidisciplinary conference that brings together scientists from computer science, molecular biology, mathematics and statistics. The goal of the ISMB meeting is to bring together biologists and computational scientists in a focus on actual biological problems, i.e., not simply theoretical calculations. The combined focus on "intelligent systems" and actual biological data makes ISMB a unique and highly important meeting, and 13 years of experience in holding the conference hasmore » resulted in a consistently well organized, well attended, and highly respected annual conference. The ISMB 2005 meeting was held June 25-29, 2005 at the Renaissance Center in Detroit, Michigan. The meeting attracted over 1,730 attendees. The science presented was exceptional, and in the course of the five-day meeting, 56 scientific papers, 710 posters, 47 Oral Abstracts, 76 Software demonstrations, and 14 tutorials were presented. The attendees represented a broad spectrum of backgrounds with 7% from commercial companies, over 28% qualifying for student registration, and 41 countries were represented at the conference, emphasizing its important international aspect. The ISMB conference is especially important because the cultures of computer science and biology are so disparate. ISMB, as a full-scale technical conference with refereed proceedings that have been indexed by both MEDLINE and Current Contents since 1996, bridges this cultural gap.« less
NASA Astrophysics Data System (ADS)
Fiala, L.; Lokajicek, M.; Tumova, N.
2015-05-01
This volume of the IOP Conference Series is dedicated to scientific contributions presented at the 16th International Workshop on Advanced Computing and Analysis Techniques in Physics Research (ACAT 2014), this year the motto was ''bridging disciplines''. The conference took place on September 1-5, 2014, at the Faculty of Civil Engineering, Czech Technical University in Prague, Czech Republic. The 16th edition of ACAT explored the boundaries of computing system architectures, data analysis algorithmics, automatic calculations, and theoretical calculation technologies. It provided a forum for confronting and exchanging ideas among these fields, where new approaches in computing technologies for scientific research were explored and promoted. This year's edition of the workshop brought together over 140 participants from all over the world. The workshop's 16 invited speakers presented key topics on advanced computing and analysis techniques in physics. During the workshop, 60 talks and 40 posters were presented in three tracks: Computing Technology for Physics Research, Data Analysis - Algorithms and Tools, and Computations in Theoretical Physics: Techniques and Methods. The round table enabled discussions on expanding software, knowledge sharing and scientific collaboration in the respective areas. ACAT 2014 was generously sponsored by Western Digital, Brookhaven National Laboratory, Hewlett Packard, DataDirect Networks, M Computers, Bright Computing, Huawei and PDV-Systemhaus. Special appreciations go to the track liaisons Lorenzo Moneta, Axel Naumann and Grigory Rubtsov for their work on the scientific program and the publication preparation. ACAT's IACC would also like to express its gratitude to all referees for their work on making sure the contributions are published in the proceedings. Our thanks extend to the conference liaisons Andrei Kataev and Jerome Lauret who worked with the local contacts and made this conference possible as well as to the program coordinator Federico Carminati and the conference chair Denis Perret-Gallix for their global supervision. Further information on ACAT 2014 can be found at http://www.particle.cz/acat2014
FAA computer security : concerns remain due to personnel and other continuing weaknesses
DOT National Transportation Integrated Search
2000-08-01
FAA has a history of computer security weaknesses in a number of areas, including its physical security management at facilities that house air traffic control (ATC) systems, systems security for both operational and future systems, management struct...
NASA Technical Reports Server (NTRS)
Ponchak, George E.; Amadjikpe, Arnaud L.; Choudhury, Debabani; Papapolymerou, John
2011-01-01
In this paper, the first measurements of the received radiated power between antennas located on a conference table to simulate the environment of antennas embedded in laptop computers for 60 GHz Wireless Personal Area Network (WPAN) applications is presented. A high gain horn antenna and a medium gain microstrip patch antenna for two linear polarizations are compared. It is shown that for a typical conference table arrangement with five computers, books, pens, and coffee cups, the antennas should be placed a minimum of 5 cm above the table, but that a height of greater than 20 cm may be required to maximize the received power in all cases.
CERN automatic audio-conference service
NASA Astrophysics Data System (ADS)
Sierra Moral, Rodrigo
2010-04-01
Scientists from all over the world need to collaborate with CERN on a daily basis. They must be able to communicate effectively on their joint projects at any time; as a result telephone conferences have become indispensable and widely used. Managed by 6 operators, CERN already has more than 20000 hours and 5700 audio-conferences per year. However, the traditional telephone based audio-conference system needed to be modernized in three ways. Firstly, to provide the participants with more autonomy in the organization of their conferences; secondly, to eliminate the constraints of manual intervention by operators; and thirdly, to integrate the audio-conferences into a collaborative working framework. The large number, and hence cost, of the conferences prohibited externalization and so the CERN telecommunications team drew up a specification to implement a new system. It was decided to use a new commercial collaborative audio-conference solution based on the SIP protocol. The system was tested as the first European pilot and several improvements (such as billing, security, redundancy...) were implemented based on CERN's recommendations. The new automatic conference system has been operational since the second half of 2006. It is very popular for the users and has doubled the number of conferences in the past two years.
78 FR 38724 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-27
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0006] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... Agreement that establishes a computer matching program between the Department of Homeland Security/U.S...
Code of Federal Regulations, 2014 CFR
2014-01-01
... Census Bureau's Foreign Trade Division Computer Security Officer and refrain from using AESDirect until... Bureau's Foreign Trade Division Computer Security Officer that the company's computer systems accessing... threat to national security interests such that its participation in postdeparture filing should be...
Code of Federal Regulations, 2012 CFR
2012-01-01
... Census Bureau's Foreign Trade Division Computer Security Officer and refrain from using AESDirect until... Bureau's Foreign Trade Division Computer Security Officer that the company's computer systems accessing... threat to national security interests such that its participation in postdeparture filing should be...
Code of Federal Regulations, 2013 CFR
2013-01-01
... Census Bureau's Foreign Trade Division Computer Security Officer and refrain from using AESDirect until... Bureau's Foreign Trade Division Computer Security Officer that the company's computer systems accessing... threat to national security interests such that its participation in postdeparture filing should be...
75 FR 18841 - Office for Civil Rights; Privacy Act of 1974, Amended System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-13
... Privacy Act of 1974, Federal Information Security Management Act of 2002, Computer Security Act of 1987... 1974, Federal Information Security Management Act of 2002, Computer Security Act of 1987, the Paperwork... Oversight, the Chair of the Senate Committee on Homeland Security and Governmental Affairs, and the...
Cloud Computing Security Issue: Survey
NASA Astrophysics Data System (ADS)
Kamal, Shailza; Kaur, Rajpreet
2011-12-01
Cloud computing is the growing field in IT industry since 2007 proposed by IBM. Another company like Google, Amazon, and Microsoft provides further products to cloud computing. The cloud computing is the internet based computing that shared recourses, information on demand. It provides the services like SaaS, IaaS and PaaS. The services and recourses are shared by virtualization that run multiple operation applications on cloud computing. This discussion gives the survey on the challenges on security issues during cloud computing and describes some standards and protocols that presents how security can be managed.
Challenges and Security in Cloud Computing
NASA Astrophysics Data System (ADS)
Chang, Hyokyung; Choi, Euiin
People who live in this world want to solve any problems as they happen then. An IT technology called Ubiquitous computing should help the situations easier and we call a technology which makes it even better and powerful cloud computing. Cloud computing, however, is at the stage of the beginning to implement and use and it faces a lot of challenges in technical matters and security issues. This paper looks at the cloud computing security.
ERIC Educational Resources Information Center
Stanley Foundation, Muscatine, IA.
Proceedings are summarized of a conference in which 62 foreign policy professionals met to recommend strategies for peace in the areas of U.S.-Soviet competition in the Third World, space weapons and arms control, objectives of U.S. economic and security assistance, and the United States and UNESCO. Four sections focusing on each of these areas…
ERIC Educational Resources Information Center
STOCKBURGER, CASSANDRA
ONE HUNDRED PARTICIPANTS REPRESENTING FOURTEEN EAST COAST STATES WERE INVITED TO A CONFERENCE ON SERVICES TO CHILDREN IN THE EAST COAST MIGRANT STREAM. THE KEYNOTE SPEAKER EXPRESSED CONCERN FOR THE SOUTHERN WORKERS WHO MIGRATE TO THE EASTERN SEABOARD, AND SUGGESTED A COORDINATION OF SERVICES TO PROVIDE EDUCATION, HEALTH, SECURITY, JOBS, SOCIAL…
ERIC Educational Resources Information Center
Stanley Foundation, Muscatine, IA.
Twenty-eight conference participants, consisting of diplomats, government officials, and scholars, strongly urged the General Assembly to begin preparations for a 1985 meeting of the heads of state of the United Nation's 157 member nations. The purpose of the summit would be to provide an opportunity for the members to reaffirm their support of…
NASA Astrophysics Data System (ADS)
2014-09-01
This volume contains selected papers presented at the 38th National Conference on Theoretical Physics (NCTP-38) and the 1st International Workshop on Theoretical and Computational Physics: Condensed Matter, Soft Matter and Materials Physics (IWTCP-1). Both the conference and the workshop were held from 29 July to 1 August 2013 in Pullman hotel, Da Nang, Vietnam. The IWTCP-1 was a new activity of the Vietnamese Theoretical Physics Society (VTPS) organized in association with the 38th National Conference on Theoretical Physics (NCTP-38), the most well-known annual scientific forum dedicated to the dissemination of the latest development in the field of theoretical physics within the country. The IWTCP-1 was also an External Activity of the Asia Pacific Center for Theoretical Physics (APCTP). The overriding goal of the IWTCP is to provide an international forum for scientists and engineers from academia to share ideas, problems and solution relating to the recent advances in theoretical physics as well as in computational physics. The main IWTCP motivation is to foster scientific exchanges between the Vietnamese theoretical and computational physics community and world-wide scientists as well as to promote high-standard level of research and education activities for young physicists in the country. About 110 participants coming from 10 countries participated in the conference and the workshop. 4 invited talks, 18 oral contributions and 46 posters were presented at the conference. In the workshop we had one keynote lecture and 9 invited talks presented by international experts in the fields of theoretical and computational physics, together with 14 oral and 33 poster contributions. The proceedings were edited by Nguyen Tri Lan, Trinh Xuan Hoang, and Nguyen Ai Viet. We would like to thank all invited speakers, participants and sponsors for making the conference and the workshop successful. Nguyen Ai Viet Chair of NCTP-38 and IWTCP-1
ERIC Educational Resources Information Center
Borden, P. A.; And Others
Summaries are presented of five conference papers on communication, control, and computer access for handicapped individuals. Papers have the following titles and authors: "Accessibility of Graphically Based User Interface Computer Systems for Individuals with Visual Impairments" (Charles Lee and Gregg Vanderheiden); "Data Base vs. Information…
ICCE/ICCAI 2000 Full & Short Papers (Evaluation of Learning and Systems).
ERIC Educational Resources Information Center
2000
This document contains the full and short papers on evaluation of learning and systems from ICCE/ICCAI 2000 (International Conference on Computers in Education/International Conference on Computer-Assisted Instruction) covering the following topics: a new method for efficient study of Kanji using mnemonics and software; a study on the relation…
Sixth New Zealand Computer Conference (Auckland 78). Volume II, The Proceedings.
ERIC Educational Resources Information Center
New Zealand Computer Society, Auckland.
Speeches made by five keynote speakers, summaries of five forum sessions, and one paper are included in this collection of presentations at a conference on the application of computer technology in New Zealand. The keynote addresses include "Analysis of Key Factors for Motivation of Data Processing Professionals," by J. Daniel Couger;…
ERIC Educational Resources Information Center
Armel, Donald, Ed.
Papers from a conference on microcomputers are: "Organizational Leadership through Information Technology" (John A. Anderson); "Multimedia in the Classroom--Rejuvenating the Literacy Course" (Stephen T. Anderson, Sr.); "Something New about Notetaking: A Computer-Based Instructional Experiment" (Donald Armel);…
Educators and the Internet: What's out There, How to Get Some of It.
ERIC Educational Resources Information Center
Rosenbaum, Howard
1994-01-01
Argues that K-12 media educators and librarians should become vocal advocates for Internet connection in their elementary and secondary schools. Topics include K-12 uses of the Internet; Internet resources; FrEdMail (Free Educational Electronic Mail); and a BITNET computer conference. Appendices list computer conferences, networking contracts, and…
Super and parallel computers and their impact on civil engineering
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kamat, M.P.
1986-01-01
This book presents the papers given at a conference on the use of supercomputers in civil engineering. Topics considered at the conference included solving nonlinear equations on a hypercube, a custom architectured parallel processing system, distributed data processing, algorithms, computer architecture, parallel processing, vector processing, computerized simulation, and cost benefit analysis.
ERIC Educational Resources Information Center
San Jose State Coll., CA.
The papers from a conference on computer communication networks are divided into five groups--trends, applications, problems and impairments, solutions and tools, impact on society and education. The impact of such developing technologies as cable television, the "wired nation," the telephone industry, and analog data storage is…
ERIC Educational Resources Information Center
Nixon, Carol, Comp.
This book contains presentations from the 17th annual Computers in Libraries Conference. Topics covered include: chatting with a librarian; verbots for library Web sites; collaborative IT (Information Technology) planning at Montgomery County Public Library (Maryland); designing a local government taxonomy; Weblogs; new roles for librarians in…
Highlights from the ISCB Student Council Symposium 2013
2014-01-01
This report summarizes the scientific content and activities of the annual symposium organized by the Student Council of the International Society for Computational Biology (ISCB), held in conjunction with the Intelligent Systems for Molecular Biology (ISMB) / European Conference on Computational Biology (ECCB) conference in Berlin, Germany, on July 19, 2013. PMID:25077567
ERIC Educational Resources Information Center
Rice, Michael
This report summarizes the presentations and discussions at a conference on the development of new products and services in electronic publishing and computer software for personal use. It is noted that the 26 participants came from a variety of perspectives, including the publishing and computer software industries; the fields of home…
NASA Technical Reports Server (NTRS)
Hyde, Patricia R.; Loftin, R. Bowen
1993-01-01
The volume 2 proceedings from the 1993 Conference on Intelligent Computer-Aided Training and Virtual Environment Technology are presented. Topics discussed include intelligent computer assisted training (ICAT) systems architectures, ICAT educational and medical applications, virtual environment (VE) training and assessment, human factors engineering and VE, ICAT theory and natural language processing, ICAT military applications, VE engineering applications, ICAT knowledge acquisition processes and applications, and ICAT aerospace applications.
20 CFR 229.65 - Initial reduction.
Code of Federal Regulations, 2010 CFR
2010-04-01
... wage (see § 225.2 of this chapter) used to compute the DIB O/M under the Social Security Act rules... that exceed the maximum used in computing social security benefits) for the 5 consecutive years after... earnings that exceed the maximum used in computing social security benefits) for the year of highest...
A Computational Model and Multi-Agent Simulation for Information Assurance
2002-06-01
Podell , Information Security: an Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos, CA, 1994. Brinkley, D. L. and Schell, R...R., “What is There to Worry About? An Introduction to the Computer Security Problem,” ed. Abrams and Jajodia and Podell , Information Security: an
ERIC Educational Resources Information Center
Nunes, Miguel Baptista, Ed.; McPherson, Maggie, Ed.
2016-01-01
These proceedings contain the papers of the International Conference e-Learning 2016, which was organised by the International Association for Development of the Information Society, 1-3 July, 2016. This conference is part of the Multi Conference on Computer Science and Information Systems 2016, 1-4 July. The e-Learning (EL) 2016 conference aims…
Distributed intrusion detection system based on grid security model
NASA Astrophysics Data System (ADS)
Su, Jie; Liu, Yahui
2008-03-01
Grid computing has developed rapidly with the development of network technology and it can solve the problem of large-scale complex computing by sharing large-scale computing resource. In grid environment, we can realize a distributed and load balance intrusion detection system. This paper first discusses the security mechanism in grid computing and the function of PKI/CA in the grid security system, then gives the application of grid computing character in the distributed intrusion detection system (IDS) based on Artificial Immune System. Finally, it gives a distributed intrusion detection system based on grid security system that can reduce the processing delay and assure the detection rates.
ERIC Educational Resources Information Center
Smith, Peter, Ed.
This 2000 Association of Small Computer Users in Education (ASCUE) conference proceedings first highlights keynote speakers and describes the pre-conference workshops. The conference papers and abstracts that follow discuss: strategic planning for faculty, staff, and student development; a network lab; the Blackboard course delivery system;…
ERIC Educational Resources Information Center
Smith, Peter, Ed.
This 2002 Association of Small Computer Users in Education (ASCUE) conference proceedings briefly describes ASCUE and its listserv, lists board members, and provides abstracts of the pre-conference workshops. The conference papers and abstracts that follow cover: principles of visual communication in Web design; Blackboard 5--Web-based course…
Selected Papers Presented at MODSIM World 2009 Conference and Expo
NASA Technical Reports Server (NTRS)
Pinelli, Thomas E. (Editor)
2010-01-01
Selected papers from MODSIM World 2009 Conference and Expo are contained in this NASA Conference Publication (CP). MODSIM World 2009 was held in Virginia Beach, Virginia, October 14-16, 2009, at the Virginia Beach Convention Center. The theme of the 2009 conference and expo was "21st Century Decision-Making: The Art of Modeling & Simulation." The 79 submitted papers were peer-reviewed and 64 were accepted for presentation at MODSIM World 2009. As a condition of acceptance, the first author was responsible for securing/obtaining all permissions associated with the general release and public availability of the paper. Further, the first authors also had to grant NASA the right to include their papers in the NASA CP. There are 53 papers in this NASA CP.
A Lightweight Protocol for Secure Video Streaming
Morkevicius, Nerijus; Bagdonas, Kazimieras
2018-01-01
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988
A Lightweight Protocol for Secure Video Streaming.
Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis
2018-05-14
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.
PREFACE: High Performance Computing Symposium 2011
NASA Astrophysics Data System (ADS)
Talon, Suzanne; Mousseau, Normand; Peslherbe, Gilles; Bertrand, François; Gauthier, Pierre; Kadem, Lyes; Moitessier, Nicolas; Rouleau, Guy; Wittig, Rod
2012-02-01
HPCS (High Performance Computing Symposium) is a multidisciplinary conference that focuses on research involving High Performance Computing and its application. Attended by Canadian and international experts and renowned researchers in the sciences, all areas of engineering, the applied sciences, medicine and life sciences, mathematics, the humanities and social sciences, it is Canada's pre-eminent forum for HPC. The 25th edition was held in Montréal, at the Université du Québec à Montréal, from 15-17 June and focused on HPC in Medical Science. The conference was preceded by tutorials held at Concordia University, where 56 participants learned about HPC best practices, GPU computing, parallel computing, debugging and a number of high-level languages. 274 participants from six countries attended the main conference, which involved 11 invited and 37 contributed oral presentations, 33 posters, and an exhibit hall with 16 booths from our sponsors. The work that follows is a collection of papers presented at the conference covering HPC topics ranging from computer science to bioinformatics. They are divided here into four sections: HPC in Engineering, Physics and Materials Science, HPC in Medical Science, HPC Enabling to Explore our World and New Algorithms for HPC. We would once more like to thank the participants and invited speakers, the members of the Scientific Committee, the referees who spent time reviewing the papers and our invaluable sponsors. To hear the invited talks and learn about 25 years of HPC development in Canada visit the Symposium website: http://2011.hpcs.ca/lang/en/conference/keynote-speakers/ Enjoy the excellent papers that follow, and we look forward to seeing you in Vancouver for HPCS 2012! Gilles Peslherbe Chair of the Scientific Committee Normand Mousseau Co-Chair of HPCS 2011 Suzanne Talon Chair of the Organizing Committee UQAM Sponsors The PDF also contains photographs from the conference banquet.
Guidelines for computer security in general practice.
Schattner, Peter; Pleteshner, Catherine; Bhend, Heinz; Brouns, Johan
2007-01-01
As general practice becomes increasingly computerised, data security becomes increasingly important for both patient health and the efficient operation of the practice. To develop guidelines for computer security in general practice based on a literature review, an analysis of available information on current practice and a series of key stakeholder interviews. While the guideline was produced in the context of Australian general practice, we have developed a template that is also relevant for other countries. Current data on computer security measures was sought from Australian divisions of general practice. Semi-structured interviews were conducted with general practitioners (GPs), the medical software industry, senior managers within government responsible for health IT (information technology) initiatives, technical IT experts, divisions of general practice and a member of a health information consumer group. The respondents were asked to assess both the likelihood and the consequences of potential risks in computer security being breached. The study suggested that the most important computer security issues in general practice were: the need for a nominated IT security coordinator; having written IT policies, including a practice disaster recovery plan; controlling access to different levels of electronic data; doing and testing backups; protecting against viruses and other malicious codes; installing firewalls; undertaking routine maintenance of hardware and software; and securing electronic communication, for example via encryption. This information led to the production of computer security guidelines, including a one-page summary checklist, which were subsequently distributed to all GPs in Australia. This paper maps out a process for developing computer security guidelines for general practice. The specific content will vary in different countries according to their levels of adoption of IT, and cultural, technical and other health service factors. Making these guidelines relevant to local contexts should help maximise their uptake.
76 FR 81477 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-28
... sessions will be open to the public. The ISPAB was established by the Computer Security Act of 1987 (Pub. L... Secure Mobile Devices, --Panel Discussion on cyber R&D Strategy, and --Update of NIST Computer Security... of the Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and...
Analyzing the security of an existing computer system
NASA Technical Reports Server (NTRS)
Bishop, M.
1986-01-01
Most work concerning secure computer systems has dealt with the design, verification, and implementation of provably secure computer systems, or has explored ways of making existing computer systems more secure. The problem of locating security holes in existing systems has received considerably less attention; methods generally rely on thought experiments as a critical step in the procedure. The difficulty is that such experiments require that a large amount of information be available in a format that makes correlating the details of various programs straightforward. This paper describes a method of providing such a basis for the thought experiment by writing a special manual for parts of the operating system, system programs, and library subroutines.
Is It Time To Consider Global Sharing of Integral Physics Data?
DOE Office of Scientific and Technical Information (OSTI.GOV)
Harold F. McFarlane
The innocent days of the Atoms for Peace program vanished with the suicide attack on the World Trade Center in New York City that occurred while the GLOBAL 2001 international nuclear fuel cycle conference was convened in Paris. Today’s reality is that maintaining an inventory of unirradiated highly enriched uranium or plutonium for critical experiments requires a facility to accept substantial security cost and intrusion. In the context of a large collection of benchmark integral experiments collected over several decades and the ongoing rapid advances in computer modeling and simulation, there seems to be ample incentive to reduce both themore » number of facilities and material inventory quantities worldwide. As a result of ongoing nonproliferation initiatives, there are viable programs that will accept highly enriched uranium for down blending into commercial fuel. Nevertheless, there are formidable hurdles to overcome before national institutions will voluntarily give up existing nuclear research capabilities. GLOBAL 2005 was the appropriate forum to begin fostering a new spirit of cooperation that could lead to improved international security and better use of precious research and development resources, while ensuring access to existing and future critical experiment data.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Bing; Huang, Yufei; McDermott, Jason E.
The 2013 International Conference on Intelligent Biology and Medicine (ICIBM 2013) was held on August 11-13, 2013 in Nashville, Tennessee, USA. The conference included six scientific sessions, two tutorial sessions, one workshop, two poster sessions, and four keynote presentations that covered cutting-edge research topics in bioinformatics, systems biology, computational medicine, and intelligent computing. Here, we present a summary of the conference and an editorial report of the supplements to BMC Genomics and BMC Systems Biology that include 19 research papers selected from ICIBM 2013.
2013-01-01
The 2013 International Conference on Intelligent Biology and Medicine (ICIBM 2013) was held on August 11-13, 2013 in Nashville, Tennessee, USA. The conference included six scientific sessions, two tutorial sessions, one workshop, two poster sessions, and four keynote presentations that covered cutting-edge research topics in bioinformatics, systems biology, computational medicine, and intelligent computing. Here, we present a summary of the conference and an editorial report of the supplements to BMC Genomics and BMC Systems Biology that include 19 research papers selected from ICIBM 2013. PMID:24564388
Discussion on the Technology and Method of Computer Network Security Management
NASA Astrophysics Data System (ADS)
Zhou, Jianlei
2017-09-01
With the rapid development of information technology, the application of computer network technology has penetrated all aspects of society, changed people's way of life work to a certain extent, brought great convenience to people. But computer network technology is not a panacea, it can promote the function of social development, but also can cause damage to the community and the country. Due to computer network’ openness, easiness of sharing and other characteristics, it had a very negative impact on the computer network security, especially the loopholes in the technical aspects can cause damage on the network information. Based on this, this paper will do a brief analysis on the computer network security management problems and security measures.
2011-09-01
unknown • Assumed to be bigger than Legitimate Market • Security firms pay for security flaws • Example: Netragard (a cybersecurity firm) pays between... RESEARCE Does this research involve Human Subject Research? Y fl N X If yes, list protocol number(s) here and in blook l1 of Form 298, in thesis If yes, have
2010-09-01
genetic relationships between kin.33 Regardless of the underlying mechanism, individual symbiotic relationships can confer multiple benefits to the...allocation guidelines for homeland security and emergency management policymakers. The framework provides an operationally relevant rubric for...S. Wells, The Journey of Man: A Genetic Odyssey (Princeton, NJ: Princeton University Press, 2002). 4 A. Jakubowicz, “Anglo-multiculturalism
2008 Homeland Security S and T Stakeholders Conference West. Volume 4. Wednesday
2008-01-16
www.npia.police.uk Polonium 210 Interoperability - lessons Major Incident - CBRN Images courtesy of BBC www.npia.police.uk Boscastle 2007...Washington Training Session 37: Preparing First Responders for Food Systems Disasters Jerry Gillespie, DVM, PhD Director, Western Institute for... Food Safety and Security Training Session 39: Technology Adoption & Innovation 1 Dr. Neal Thornberry, Innovation Chair Graduate School of
Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.
Caruso, Ronald D
2003-01-01
Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-01
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2009-0043] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match Number 1308 AGENCY: Social Security Administration (SSA). ACTION: Notice of renewal of an existing...
A Semantic Based Policy Management Framework for Cloud Computing Environments
ERIC Educational Resources Information Center
Takabi, Hassan
2013-01-01
Cloud computing paradigm has gained tremendous momentum and generated intensive interest. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this dissertation, we mainly focus on issues related to policy management and access…
ERIC Educational Resources Information Center
Dalton, David W., Ed.; And Others
This collection of conference presentations contains 48 papers and 122 abstracts (for which there are no formal papers). The papers and abstracts are presented in two separate sections, but both are categorized by special interest groups: (1) Academic Computing (SIGAC, 1 paper, 9 abstracts); (2) Computer-Based Training (SIGCBT, 8 papers, 12…
ERIC Educational Resources Information Center
Patterson, Janice H.; Smith, Marshall S.
This report presents a national agenda for research on the learning of thinking skills via computer technology which was developed at a National Academy of Sciences conference on educational, methodological, and practical issues involved in the use of computers to promote complex thought in grades K-12. The discussion of research topics agreed…
Computer Security: the Achilles’ Heel of the Electronic Air Force?
2013-02-01
commercials not enough. In the Pentagon a General Electric system called “GCOS” provided classified (secret) com- putation for the Air Staff and others...necessary computer function. January–February 2013 Air & Space Power Journal | 169 Historical Highlight Government designers not perfect. After the Pentagon ...laboratory computer to evaluate Multics as a potential multilevel secure computer for the Pentagon . Although it had the best security design of any system
Change Detection Algorithms for Information Assurance of Computer Networks
2002-01-01
original document contains color images. 14. ABSTRACT see report 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18...number of computer attacks increases steadily per year. At the time of this writing the Internet Security Systems’ baseline assessment is that a new...across a network by exploiting security flaws in widely-used services offered by vulnerable computers. In order to locate the vulnerable computers, the
Computer Applications in Dental Education. A Conference Report.
ERIC Educational Resources Information Center
National Institutes of Health (DHEW), Bethesda, MD. Div. of Dental Health.
In the first section of this book, seven papers are presented which were given at the working conference on Computer Applications in Dental Education held in San Francisco in October 1969. Three of the papers are statements by educators (Lawrence M. Stolurow, Ralph E. Grubb, and John A. Starkweather) who have been active for several years in the…
ERIC Educational Resources Information Center
Brubaker, Thomas, A., Ed.; And Others
These conference proceedings address the capabilities of technology in education. Papers and summaries of presentations are provided on the following topics: programs for special needs students; virtual realities; funding opportunities; videodiscs; future programs and perspectives; telecomputing; computer networks in the classroom; human…
Interaction and Critical Inquiry in Asynchronous Computer-Mediated Conferencing: A Research Agenda
ERIC Educational Resources Information Center
Hopkins, Joseph; Gibson, Will; Ros i. Sole, Cristina; Savvides, Nicola; Starkey, Hugh
2008-01-01
This paper reviews research on learner and tutor interaction in asynchronous computer-mediated (ACM) conferences used in distance learning. The authors note claims made for the potential of ACM conferences to promote higher-order critical inquiry and the social construction of knowledge, and argue that there is a general lack of evidence regarding…
ERIC Educational Resources Information Center
Wisconsin Univ., Madison. Trace Center.
This document brings together eight papers presented at a rehabilitation technology conference, authored by individuals affiliated with the Trace R & D Center on Communication, Control and Computer Access for Handicapped Individuals. Titles and authors of the papers are as follows: "Current Initiatives in Accessible Computing" (Jane Berliss);…
ICCE/ICCAI 2000 Full & Short Papers (Virtual Reality in Education).
ERIC Educational Resources Information Center
2000
This document contains the full text of the following full and short papers on virtual reality in education from ICCE/ICCAI 2000 (International Conference on Computers in Education/International Conference on Computer-Assisted Instruction): (1) "A CAL System for Appreciation of 3D Shapes by Surface Development (C3D-SD)" (Stephen C. F. Chan, Andy…
ERIC Educational Resources Information Center
National Educational Computing Conference.
This document contains the proceedings of the National Educational Computing Conference (NECC) 2000. It includes the advance program and registration materials for the NECC. Major themes of NECC 2000 include: connecting technology to teaching and learning; staying connected with professional development; moving beyond the crossroads; teachers as…
Case of Computer Conference at California College Pits Free Speech against Civil-Rights Protection.
ERIC Educational Resources Information Center
DeLoughry, Thomas J.; Wilson, David L.
1994-01-01
Santa Rosa Junior College (California) is in dispute with the Department of Education's Office of Civil Rights over comments about women students, termed sexual harassment, made in a men-only computer conference. The college is negotiating with the federal agency over what it must do to respond to student complaints. (MSE)
Conference room 211, adjacent to commander's quarters, with vault door ...
Conference room 211, adjacent to commander's quarters, with vault door at right. Projection area at center is equipped with automatic security drapes. Projection room uses a 45 degree mirror to reflect the image onto the frosted glass screen. Door on far left leads to display area senior battle staff viewing bridge, and the commander's quarters - March Air Force Base, Strategic Air Command, Combat Operations Center, 5220 Riverside Drive, Moreno Valley, Riverside County, CA
NASA Technical Reports Server (NTRS)
Fujikawa, Gene (Compiler)
2005-01-01
Contents includes papers on the following: JPDO: Inter-Agency Cooperation for the Next Generation ATS; R&T Programs; Integrated CNS Systems and Architectures; Datalink Communication Systems; Navigation, System Demonstrations and Operations; Safety and Security Initiatives Impacting CNS; Global Communications Initiatives; Airborne Internet; Avionics for System-Level Enhancements; SWIM (System Wide Information Management); Weather Products and Data Dissemination Technologies; Airsapce Communication Networks; Surveillance Systems; Workshop Breakouts Sessions and ; ICNS Conference Information.
Computer Security: The Human Element.
ERIC Educational Resources Information Center
Guynes, Carl S.; Vanacek, Michael T.
1981-01-01
The security and effectiveness of a computer system are dependent on the personnel involved. Improved personnel and organizational procedures can significantly reduce the potential for computer fraud. (Author/MLF)
75 FR 13258 - Announcing a Meeting of the Information Security and Privacy Advisory Board
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-19
.../index.html/ . Agenda: --Cloud Computing Implementations --Health IT --OpenID --Pending Cyber Security... will be available for the public and media. --OpenID --Cloud Computing Implementations --Security...
ERIC Educational Resources Information Center
Whitney, Michael; Lipford, Heather Richter; Chu, Bill; Thomas, Tyler
2018-01-01
Many of the software security vulnerabilities that people face today can be remediated through secure coding practices. A critical step toward the practice of secure coding is ensuring that our computing students are educated on these practices. We argue that secure coding education needs to be included across a computing curriculum. We are…
ERIC Educational Resources Information Center
Georgia State Dept. of Human Resources, Atlanta. Div. of Rehabilitation Services.
This packet of materials was originally intended for participants in a 1991 conference on assistive technology for the disabled. After a detailed listing of the conference schedule, individual sections provide abstracts, biographical sketches, and summaries concerning the following conference topics: blending, computer labs, family, grants and…
ERIC Educational Resources Information Center
Smith, Peter, Ed.
This 2001 Association of Small Computer Users in Education (ASCUE) conference proceedings briefly describes ASCUE and its listserver, lists the 2000-2001 ASCUE Board Members, and provides abstracts of the pre-conference workshops. The conference papers and abstracts of papers that follow include: "Microsoft Project 2000--Keeping Projects on Time…
Multimedia in Education: Thought Pieces.
ERIC Educational Resources Information Center
Nicol, Anne; And Others
1986-01-01
The six "thought pieces" presented in this document summarize the personal perspectives of conference participants on issues raised in formal or information discussions, but not part of the central themes of the conference or conference papers. They include: (1) "Assuming That..." (Anne Nicol, Apple Computer, Inc.); (2) "A…
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2010 CFR
2010-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-18
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0055] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM))--Match Number 1307 AGENCY: Social Security Administration. ACTION: Notice of a renewal of an existing...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2014 CFR
2014-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2012 CFR
2012-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2013 CFR
2013-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2011 CFR
2011-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
Computer-Based Testing: Test Site Security.
ERIC Educational Resources Information Center
Rosen, Gerald A.
Computer-based testing places great burdens on all involved parties to ensure test security. A task analysis of test site security might identify the areas of protecting the test, protecting the data, and protecting the environment as essential issues in test security. Protecting the test involves transmission of the examinations, identifying the…
1988-03-01
Mechanism; Computer Security. 16. PRICE CODE 17. SECURITY CLASSIFICATION IS. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. UMrrATION OF ABSTRACT...denial of service. This paper assumes that the reader is a computer science or engineering professional working in the area of formal specification and...recovery from such events as deadlocks and crashes can be accounted for in the computation of the waiting time for each service in the service hierarchy
Attribute based encryption for secure sharing of E-health data
NASA Astrophysics Data System (ADS)
Charanya, R.; Nithya, S.; Manikandan, N.
2017-11-01
Distributed computing is one of the developing innovations in IT part and information security assumes a real part. It includes sending gathering of remote server and programming that permit the unified information and online access to PC administrations. Distributed computing depends on offering of asset among different clients are additionally progressively reallocated on interest. Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. The reasons for security and protection issues, which rise on the grounds that the health information possessed by distinctive clients are put away in some cloud servers rather than under their own particular control”z. To deal with security problems, various schemes based on the Attribute-Based Encryption have been proposed. In this paper, in order to make ehealth data’s more secure we use multi party in cloud computing system. Where the health data is encrypted using attributes and key policy. And the user with a particular attribute and key policy alone will be able to decrypt the health data after it is verified by “key distribution centre” and the “secure data distributor”. This technique can be used in medical field for secure storage of patient details and limiting to particular doctor access. To make data’s scalable secure we need to encrypt the health data before outsourcing.
Cost Considerations in Nonlinear Finite-Element Computing
NASA Technical Reports Server (NTRS)
Utku, S.; Melosh, R. J.; Islam, M.; Salama, M.
1985-01-01
Conference paper discusses computational requirements for finiteelement analysis using quasi-linear approach to nonlinear problems. Paper evaluates computational efficiency of different computer architecturtural types in terms of relative cost and computing time.
Cognitive Computing for Security.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Debenedictis, Erik; Rothganger, Fredrick; Aimone, James Bradley
Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.
Analysis on the security of cloud computing
NASA Astrophysics Data System (ADS)
He, Zhonglin; He, Yuhua
2011-02-01
Cloud computing is a new technology, which is the fusion of computer technology and Internet development. It will lead the revolution of IT and information field. However, in cloud computing data and application software is stored at large data centers, and the management of data and service is not completely trustable, resulting in safety problems, which is the difficult point to improve the quality of cloud service. This paper briefly introduces the concept of cloud computing. Considering the characteristics of cloud computing, it constructs the security architecture of cloud computing. At the same time, with an eye toward the security threats cloud computing faces, several corresponding strategies are provided from the aspect of cloud computing users and service providers.
2010 Plant Molecular Biology Gordon Research Conference
DOE Office of Scientific and Technical Information (OSTI.GOV)
Michael Sussman
The Plant Molecular Biology Conference has traditionally covered a breadth of exciting topics and the 2010 conference will continue in that tradition. Emerging concerns about food security have inspired a program with three main themes: (1) genomics, natural variation and breeding to understand adaptation and crop improvement, (2) hormonal cross talk, and (3) plant/microbe interactions. There are also sessions on epigenetics and proteomics/metabolomics. Thus this conference will bring together a range of disciplines, will foster the exchange of ideas and enable participants to learn of the latest developments and ideas in diverse areas of plant biology. The conference provides anmore » excellent opportunity for individuals to discuss their research because additional speakers in each session will be selected from submitted abstracts. There will also be a poster session each day for a two-hour period prior to dinner. In particular, this conference plays a key role in enabling students and postdocs (the next generation of research leaders) to mingle with pioneers in multiple areas of plant science.« less
"Loops and Legs in Quantum Field Theory", 12th DESY Workshop on Elementary Particle Physics
NASA Astrophysics Data System (ADS)
The bi-annual international conference "Loops and Legs in Quantum Field Theory" has been held at Weimar, Germany, from April 27 to May 02, 2014. It has been the 12th conference of this series, started in 1992. The main focus of the conference are precision calculations of multi- loop and multi-leg processes in elementary particle physics for processes at present and future high-energy facilities within and beyond the Standard Model. At present many physics questions studied deal with processes at the LHC and future facilities like the ILC. A growing number of contributions deals with important developments in the field of computational technologies and algorithmic methods, including large-scale computer algebra, efficient methods to compute large numbers of Feynman diagrams, analytic summation and integration methods of various kinds, new related function spaces, precise numerical methods and Monte Carlo simulations. The present conference has been attended by more than 110 participants from all over the world, presenting more than 75 contributions, most of which have been written up for these pro- ceedings. The present volume demonstrates in an impressive way the enormous development of the field during the last few years, reaching the level of 5-loop calculations in QCD and a like- wise impressive development in massive next-to-leading order and next-to-next-to-leading order processes. Computer algebraic and numerical calculations require terabyte storage and many CPU years, even after intense parallelization, to obtain state-of-the-art theoretical predictions. The city of Weimar gave a suitable frame to the conference, with its rich history, especially in literature, music, arts, and architecture. Goethe, Schiller, Wieland, Herder, Bach and Liszt lived there and created many of their masterpieces. The many young participants signal that our field is prosperous and faces an exciting future. The conference hotel "Kaiserin Augusta" offered a warm hospitality and excellent working conditions. We would like to thank Martina Mende for all her work in helping to organize this conference. Details of the conference can be found under: https://indico.desy.de/conferenceDisplay.py?confId=8107
Enhancing Security by System-Level Virtualization in Cloud Computing Environments
NASA Astrophysics Data System (ADS)
Sun, Dawei; Chang, Guiran; Tan, Chunguang; Wang, Xingwei
Many trends are opening up the era of cloud computing, which will reshape the IT industry. Virtualization techniques have become an indispensable ingredient for almost all cloud computing system. By the virtual environments, cloud provider is able to run varieties of operating systems as needed by each cloud user. Virtualization can improve reliability, security, and availability of applications by using consolidation, isolation, and fault tolerance. In addition, it is possible to balance the workloads by using live migration techniques. In this paper, the definition of cloud computing is given; and then the service and deployment models are introduced. An analysis of security issues and challenges in implementation of cloud computing is identified. Moreover, a system-level virtualization case is established to enhance the security of cloud computing environments.
Computer Network Security- The Challenges of Securing a Computer Network
NASA Technical Reports Server (NTRS)
Scotti, Vincent, Jr.
2011-01-01
This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.
NASA Astrophysics Data System (ADS)
Pathak, Rohit; Joshi, Satyadhar
Within a span of over a decade, India has become one of the most favored destinations across the world for Business Process Outsourcing (BPO) operations. India has rapidly achieved the status of being the most preferred destination for BPO for companies located in the US and Europe. Security and privacy are the two major issues needed to be addressed by the Indian software industry to have an increased and long-term outsourcing contract from the US. Another important issue is about sharing employee’s information to ensure that data and vital information of an outsourcing company is secured and protected. To ensure that the confidentiality of a client’s information is maintained, BPOs need to implement some data security measures. In this paper, we propose a new protocol for specifically for BPO Secure Multi-Party Computation (SMC). As there are many computations and surveys which involve confidential data from many parties or organizations and the concerned data is property of the organization, preservation and security of this data is of prime importance for such type of computations. Although the computation requires data from all the parties, but none of the associated parties would want to reveal their data to the other parties. We have proposed a new efficient and scalable protocol to perform computation on encrypted information. The information is encrypted in a manner that it does not affect the result of the computation. It uses modifier tokens which are distributed among virtual parties, and finally used in the computation. The computation function uses the acquired data and modifier tokens to compute right result from the encrypted data. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have given a probabilistic security analysis of hacking the protocol and shown how zero hacking security can be achieved. Also we have analyzed the specific case of Indian BPO.
Comments on the Development of Computational Mathematics in Czechoslovakia and in the USSR.
1987-03-01
ACT (COusduMe an reverse .eld NE 4040604W SWi 1410011 6F 660" ambe The talk is an Invited lecture at Ale Conference on the History of Scientific and...Numeric Computations, May 13-15, 1987, Princeton, New Jersey. It present soon basic subjective observations about the history of numerical methods in...invited lecture at ACH Conference on the History of Scientific and Numeric Computations, May 13’-15, 1987, Princeton, New Jersey. It present some basic
NASA Computational Fluid Dynamics Conference. Volume 1: Sessions 1-6
NASA Technical Reports Server (NTRS)
1989-01-01
Presentations given at the NASA Computational Fluid Dynamics (CFD) Conference held at the NASA Ames Research Center, Moffett Field, California, March 7-9, 1989 are given. Topics covered include research facility overviews of CFD research and applications, validation programs, direct simulation of compressible turbulence, turbulence modeling, advances in Runge-Kutta schemes for solving 3-D Navier-Stokes equations, grid generation and invicid flow computation around aircraft geometries, numerical simulation of rotorcraft, and viscous drag prediction for rotor blades.
EMRlog method for computer security for electronic medical records with logic and data mining.
Martínez Monterrubio, Sergio Mauricio; Frausto Solis, Juan; Monroy Borja, Raúl
2015-01-01
The proper functioning of a hospital computer system is an arduous work for managers and staff. However, inconsistent policies are frequent and can produce enormous problems, such as stolen information, frequent failures, and loss of the entire or part of the hospital data. This paper presents a new method named EMRlog for computer security systems in hospitals. EMRlog is focused on two kinds of security policies: directive and implemented policies. Security policies are applied to computer systems that handle huge amounts of information such as databases, applications, and medical records. Firstly, a syntactic verification step is applied by using predicate logic. Then data mining techniques are used to detect which security policies have really been implemented by the computer systems staff. Subsequently, consistency is verified in both kinds of policies; in addition these subsets are contrasted and validated. This is performed by an automatic theorem prover. Thus, many kinds of vulnerabilities can be removed for achieving a safer computer system.
EMRlog Method for Computer Security for Electronic Medical Records with Logic and Data Mining
Frausto Solis, Juan; Monroy Borja, Raúl
2015-01-01
The proper functioning of a hospital computer system is an arduous work for managers and staff. However, inconsistent policies are frequent and can produce enormous problems, such as stolen information, frequent failures, and loss of the entire or part of the hospital data. This paper presents a new method named EMRlog for computer security systems in hospitals. EMRlog is focused on two kinds of security policies: directive and implemented policies. Security policies are applied to computer systems that handle huge amounts of information such as databases, applications, and medical records. Firstly, a syntactic verification step is applied by using predicate logic. Then data mining techniques are used to detect which security policies have really been implemented by the computer systems staff. Subsequently, consistency is verified in both kinds of policies; in addition these subsets are contrasted and validated. This is performed by an automatic theorem prover. Thus, many kinds of vulnerabilities can be removed for achieving a safer computer system. PMID:26495300
1981-03-01
Research Instructor of Computer Scienr-. Reviewed by: Released by: WILLIAM M. TOLLES Department puter Science Dean of Research 4c t SECURITY...Lyle A. Cox, Roger R. Schell, and Sonja L. Perdue 9. PERFORMING ORGANIZATION NAME ANO ADDRESS 10. PROGRAM ELEMENT. PROJECT. TASK AREA A WORK UNIT... Computer Networks, Operating Systems, Computer Security 20. AftUrCT (Cnthm, w v re eae old* It n..*p and idm 0 F W blk ..m.m.o’) ",A_;he security
Private quantum computation: an introduction to blind quantum computing and related protocols
NASA Astrophysics Data System (ADS)
Fitzsimons, Joseph F.
2017-06-01
Quantum technologies hold the promise of not only faster algorithmic processing of data, via quantum computation, but also of more secure communications, in the form of quantum cryptography. In recent years, a number of protocols have emerged which seek to marry these concepts for the purpose of securing computation rather than communication. These protocols address the task of securely delegating quantum computation to an untrusted device while maintaining the privacy, and in some instances the integrity, of the computation. We present a review of the progress to date in this emerging area.
Secure or Insure: An Economic Analysis of Security Interdependencies and Investment Types
ERIC Educational Resources Information Center
Grossklags, Jens
2009-01-01
Computer users express a strong desire to prevent attacks, and to reduce the losses from computer and information security breaches. However, despite the widespread availability of various technologies, actual investments in security remain highly variable across the Internet population. As a result, attacks such as distributed denial-of-service…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-25
... a computing environment that has adequate computer security controls in place to prevent... NRC intends to issue a security Order to this Licensee in the near future. The Order will require compliance with specific Additional Security Measures to enhance the security for certain radioactive...
78 FR 89 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-02
... Management and Budget, and the Director of NIST on security and privacy issues pertaining to federal computer... Computer Security Division. Note that agenda items may change without notice because of possible unexpected... of the Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and...
Gruber, T
1996-01-01
The author presents guidelines to help a security department select a computer system to track security activities--whether it's a commercial software product, an in-house developed program, or a do-it-yourself designed system. Computerized security activity reporting, he believes, is effective and beneficial.
Aviation security : vulnerabilities still exist in the aviation security system
DOT National Transportation Integrated Search
2000-04-06
The testimony today discusses the Federal Aviation Administration's (FAA) efforts to implement and improve security in two key areas: air traffic control computer systems and airport passenger screening checkpoints. Computer systems-and the informati...
Air Traffic Control: Weak Computer Security Practices Jeopardize Flight Safety
DOT National Transportation Integrated Search
1998-05-01
Given the paramount importance of computer security of Air Traffic Control (ATC) systems, Congress asked the General Accounting Office to determine (1) whether the Fedcral Aviation Administration (FAA) is effectively managing physical security at ATC...
Motivating Contributions for Home Computer Security
ERIC Educational Resources Information Center
Wash, Richard L.
2009-01-01
Recently, malicious computer users have been compromising computers en masse and combining them to form coordinated botnets. The rise of botnets has brought the problem of home computers to the forefront of security. Home computer users commonly have insecure systems; these users do not have the knowledge, experience, and skills necessary to…
Proposal for founding mistrustful quantum cryptography on coin tossing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kent, Adrian; Hewlett-Packard Laboratories, Filton Road, Stoke Gifford, Bristol BS34 8QZ,
2003-07-01
A significant branch of classical cryptography deals with the problems which arise when mistrustful parties need to generate, process, or exchange information. As Kilian showed a while ago, mistrustful classical cryptography can be founded on a single protocol, oblivious transfer, from which general secure multiparty computations can be built. The scope of mistrustful quantum cryptography is limited by no-go theorems, which rule out, inter alia, unconditionally secure quantum protocols for oblivious transfer or general secure two-party computations. These theorems apply even to protocols which take relativistic signaling constraints into account. The best that can be hoped for, in general, aremore » quantum protocols which are computationally secure against quantum attack. Here a method is described for building a classically certified bit commitment, and hence every other mistrustful cryptographic task, from a secure coin-tossing protocol. No security proof is attempted, but reasons are sketched why these protocols might resist quantum computational attack.« less
Drugs in Afghanistan: The Challenges With Implementing U.S. Strategy
2008-03-13
governance, allow Islamic extremists to turn a poisonous ideology into a global movement. —Robert M . Gates1 The U.S. National Security Strategy...detoxify the country of Afghanistan and sever its ties to the insurgency. Endnotes 1 Robert M . Gates, “Munich Conference on Security Policy...State, “Background Note: Afghanistan.” 8 Antonio Donini , Humanitarian Agenda 2015 Afghanistan Country Study, Briefing Paper (Medford, MA: Feinstein
The Energy and Security Nexus: A Strategic Dilemma
2012-11-01
constructive criticism where it was most needed. ix Joseph Caddell also provided crucial guidance in framing the conference proposal. Finally, my thanks...conflict. Critics of biofuels further claim that diversion of land for fuel in the United States has driven up world food prices and arguably triggered...recycle and consume all actinides may provide a solution. But they arguably carry a proliferation risk. Steps can be taken to safeguard and secure
1980-01-01
years. The Bible , in both the Old and New Testaments, is generally regarded as written by authors inspired by God but with only those passages so...Northwestern, Stanford, the University of Amsterdam, and annually for 6 years at the Hebrew Univer- sity of Jerusalem. He has lectured throughout Europe
ERIC Educational Resources Information Center
Machi, Ethel
2009-01-01
From October 21 to 23, 2008, The Heritage Foundation, supported by the McCormick Tribune Foundation, convened leading education and national security experts as well as private-sector representatives to discuss methods for strengthening America's competitiveness by improving its performance in science, technology, engineering, and mathematics…
USSR Report, International Affairs
1987-01-23
not exceeded by one iota the limit set by the SALT II Treaty, Its nuclear testing ranges have been silent since the imposition of the moratorium...the state’s security , and in the nuclear age this can only be built on reciprocity. In its far-reaching initiatives our country has been...proposal on amending the mandate of the Conference on Confidence and Security Building Measures and Disarmament in Europe. The essence of the
Frontiers in Human Information Processing Conference
2008-02-25
Frontiers in Human Information Processing - Vision, Attention , Memory , and Applications: A Tribute to George Sperling, a Festschrift. We are grateful...with focus on the formal, computational, and mathematical approaches that unify the areas of vision, attention , and memory . The conference also...Information Processing Conference Final Report AFOSR GRANT # FA9550-07-1-0346 The AFOSR Grant # FA9550-07-1-0346 provided partial support for the Conference
Translations on Telecommunications Policy, Research and Development, Number 56
1978-10-18
conference to discuss the future of computer communications and their social impacts. The Fourth Inter- national Computer Communications Conference...standards, applications of light or satellite communications, international distribution of infor- mation and their political and social impacts...Berlin, September 25, TASS—A symposium devoted to the task of the mass media at the present stage of struggle for the economic independence, social
Analysis of Global Properties of Shapes
2010-06-01
Conference on Computer Vision (ICCV) ( Bejing , China , 2005), IEEE. [113] Thrun, S., and Wegbreit, B. Shape from symmetry. In Proceedings of the...International Conference on Computer Vision (ICCV) ( Bejing , China , 2005), IEEE. [114] Toshev, A., Shi, J., and Daniilidis, K. Image matching via saliency...applications ranging from sampling points to finding correspondences to shape simplification. Discrete variants of the Laplace-Beltrami opera - tor [108] and
ERIC Educational Resources Information Center
Ryan, William C., Ed.
The papers presented at the 1989 National Educational Computing Conference focused on ways of using technology to improve educational quality. Topics of the 50 papers and more than 120 abstracts provided in these proceedings include applications of artificial intelligence and the development of expert systems; authoring systems; using the computer…
NASA Astrophysics Data System (ADS)
Wang, Tianmin; Gao, Fei; Hu, Wangyu; Lai, Wensheng; Lu, Guang-Hong; Zu, Xiaotao
2009-09-01
The Ninth International Conference on Computer Simulation of Radiation Effects in Solids (COSIRES 2008) was hosted by Beihang University in Beijing, China from 12 to 17 October 2008. Started in 1992 in Berlin, Germany, this conference series has been held biennially in Santa Barbara, CA, USA (1994); Guildford, UK (1996); Okayama, Japan (1998); State College, PA, USA (2000); Dresden, Germany (2002); Helsinki Finland (2004); and Richland, WA USA (2006). The COSIRES conferences are the foremost international forum on the theory, development and application of advanced computer simulation methods and algorithms to achieve fundamental understanding and predictive modeling of the interaction of energetic particles and clusters with solids. As can be noticed in the proceedings of the COSIRES conferences, these computer simulation methods and algorithms have been proven to be very useful for the study of fundamental radiation effect processes, which are not easily accessible by experimental methods owing to small time and length scales. Moreover, with advance in computing power, they have remarkably been developed in the different scales ranging from meso to atomistic, and even down to electronic levels, as well as coupling of the different scales. They are now becoming increasingly applicable for materials processing and performance prediction in advance engineering and energy-production technologies.
OS friendly microprocessor architecture: Hardware level computer security
NASA Astrophysics Data System (ADS)
Jungwirth, Patrick; La Fratta, Patrick
2016-05-01
We present an introduction to the patented OS Friendly Microprocessor Architecture (OSFA) and hardware level computer security. Conventional microprocessors have not tried to balance hardware performance and OS performance at the same time. Conventional microprocessors have depended on the Operating System for computer security and information assurance. The goal of the OS Friendly Architecture is to provide a high performance and secure microprocessor and OS system. We are interested in cyber security, information technology (IT), and SCADA control professionals reviewing the hardware level security features. The OS Friendly Architecture is a switched set of cache memory banks in a pipeline configuration. For light-weight threads, the memory pipeline configuration provides near instantaneous context switching times. The pipelining and parallelism provided by the cache memory pipeline provides for background cache read and write operations while the microprocessor's execution pipeline is running instructions. The cache bank selection controllers provide arbitration to prevent the memory pipeline and microprocessor's execution pipeline from accessing the same cache bank at the same time. This separation allows the cache memory pages to transfer to and from level 1 (L1) caching while the microprocessor pipeline is executing instructions. Computer security operations are implemented in hardware. By extending Unix file permissions bits to each cache memory bank and memory address, the OSFA provides hardware level computer security.
Recommendations for bridge and tunnel security
DOT National Transportation Integrated Search
2000-02-01
This guide identifies worldwide document delivery suppliers who provide, upon request and usually a service fee, copies of research reports, journal articles, conference proceedings, standards and regulations, gray papers, and other types of document...
Defense.gov Special Report: Travels with Panetta - April 2012
Afghanistan beyond 2014 in remarks opening a conference of the alliance's defense and foreign ministers in and foreign ministers are scheduled to discuss Afghanistan security transition and alliance
Writing Conferences Using the Microcomputer.
ERIC Educational Resources Information Center
Pufahl, John
1986-01-01
Describes a teaching strategy using Apple IIe computers in a sequence of individual conferences. Includes asking questions while scrolling through the paper, showing students how to elaborate ideas by entering suggested changes and prompts in capital letters during the conference, and using a spelling checker to prompt revision (e.g., by compiling…
Network gateway security method for enterprise Grid: a literature review
NASA Astrophysics Data System (ADS)
Sujarwo, A.; Tan, J.
2017-03-01
The computational Grid has brought big computational resources closer to scientists. It enables people to do a large computational job anytime and anywhere without any physical border anymore. However, the massive and spread of computer participants either as user or computational provider arise problems in security. The challenge is on how the security system, especially the one which filters data in the gateway could works in flexibility depends on the registered Grid participants. This paper surveys what people have done to approach this challenge, in order to find the better and new method for enterprise Grid. The findings of this paper is the dynamically controlled enterprise firewall to secure the Grid resources from unwanted connections with a new firewall controlling method and components.
PREFACE: Euro-TMCS I: Theory, Modelling and Computational Methods for Semiconductors
NASA Astrophysics Data System (ADS)
Gómez-Campos, F. M.; Rodríguez-Bolívar, S.; Tomić, S.
2015-05-01
The present issue contains a selection of the best contributed works presented at the first Euro-TMCS conference (Theory, Modelling and Computational Methods for Semiconductors, European Session). The conference was held at Faculty of Sciences, Universidad de Granada, Spain on 28st-30st January 2015. This conference is the first European edition of the TMCS conference series which started in 2008 at the University of Manchester and has always been held in the United Kingdom. Four previous conferences have been previously carried out (Manchester 2008, York 2010, Leeds 2012 and Salford 2014). Euro-TMCS is run for three days; the first one devoted to giving invited tutorials, aimed particularly at students, on recent development of theoretical methods. On this occasion the session was focused on the presentation of widely-used computational methods for the modelling of physical processes in semiconductor materials. Freely available simulation software (SIESTA, Quantum Espresso and Yambo) as well as commercial software (TiberCad and MedeA) were presented in the conference by members of their development team, offering to the audience an overview of their capabilities for research. The second part of the conference showcased prestigious invited and contributed oral presentations, alongside poster sessions, in which direct discussion with authors was promoted. The scope of this conference embraces modelling, theory and the use of sophisticated computational tools in semiconductor science and technology. Theoretical approaches represented in this meeting included: Density Functional Theory, Semi-empirical Electronic Structure Methods, Multi-scale Approaches, Modelling of PV devices, Electron Transport, and Graphene. Topics included, but were not limited to: Optical Properties of Quantum Nanostructures including Colloids and Nanotubes, Plasmonics, Magnetic Semiconductors, Photonic Structures, and Electronic Devices. The Editors Acknowledgments: We would like to thank all participants for making this a very successful meeting and for their contribution to the conference programme and these proceedings. We would also like to acknowledge the financial support from Universidad de Granada, the CECAM UK-Hartree Node, project TEC2013-47283-R of Ministerio de Economía y Competitividad, and the company Materials Design (distributors of MedeA Software). Conference Organising Committee: Francisco M. Gómez-Campos (Co-chair, Universidad de Granada) Salvador Rodríguez-Bolívar (Co-chair, Universidad de Granada) Stanko Tomić (Co-chair, University of Salford)
A Test-Bed of Secure Mobile Cloud Computing for Military Applications
2016-09-13
searching databases. This kind of applications is a typical example of mobile cloud computing (MCC). MCC has lots of applications in the military...Release; Distribution Unlimited UU UU UU UU 13-09-2016 1-Aug-2014 31-Jul-2016 Final Report: A Test-bed of Secure Mobile Cloud Computing for Military...Army Research Office P.O. Box 12211 Research Triangle Park, NC 27709-2211 Test-bed, Mobile Cloud Computing , Security, Military Applications REPORT
Computer network security for the radiology enterprise.
Eng, J
2001-08-01
As computer networks become an integral part of the radiology practice, it is appropriate to raise concerns regarding their security. The purpose of this article is to present an overview of computer network security risks and preventive strategies as they pertain to the radiology enterprise. A number of technologies are available that provide strong deterrence against attacks on networks and networked computer systems in the radiology enterprise. While effective, these technologies must be supplemented with vigilant user and system management.
OSIRIS-REx Prelaunch News Conference
2016-09-06
In the Kennedy Space Center’s Press Site auditorium, Scott Messer, program manager for NASA missions at United Launch Alliance in Centennial, Colorado; Michael Donnelly, OSIRIS-REx project manager at NASA’s Goddard Space Flight Center in Greenbelt, Maryland; and Rich Kuhns, OSIRIS-REx program manager for Lockheed Martin Space Systems in Denver; speak to members of the media at a prelaunch news conference for the agency’s Origins, Spectral Interpretation, Resource Identification, Security-Regolith Explorer, or OSIRIS-REx spacecraft.
Southern Africa Development Coordinating Conference and Its Security Implications
1989-04-03
CLASSIFICATION OF THIS PAGE (When Data lintered) REPORT DOCUMENTATION PAGE ;READ INSTRUCTIONS R TP BEFORE COMPLETING FORM I. REPORT NUMBER 12. GOVT...ACCESSION NO., RECIPIENT’S CATALOG NUMBER . TITLE (an1d Su~btile) TYPE OF REPORT , PERIOD COVERED Southern Africa Development Coordinating Conference and...OFFICE NAME AND ADn1PE-c 12. RCPOr,7 DATE 3 April 1989 f3. NUMBER OF PAGE.3 55 14. MONITORING AGENCY NAME & AODRESS(If different from Controlling Office
ERIC Educational Resources Information Center
Buckman, Joel; Gold, Stephanie
2012-01-01
This article outlines privacy and data security compliance issues facing postsecondary education institutions when they utilize cloud computing and concludes with a practical list of do's and dont's. Cloud computing does not change an institution's privacy and data security obligations. It does involve reliance on a third party, which requires an…
Case Study: Creation of a Degree Program in Computer Security. White Paper.
ERIC Educational Resources Information Center
Belon, Barbara; Wright, Marie
This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an…
... share personal information let your kids spend real money — even if the app is free include ads link to social media What’s more, ... Money & Credit Homes & Mortgages Health & Fitness Jobs & Making ... Security "Free" Security Scans Computer Security Disposing of Old Computers ...
Code of Federal Regulations, 2011 CFR
2011-04-01
... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...
Code of Federal Regulations, 2013 CFR
2013-04-01
... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...
Code of Federal Regulations, 2012 CFR
2012-04-01
... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...
Code of Federal Regulations, 2014 CFR
2014-04-01
... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...
A Trusted Portable Computing Device
NASA Astrophysics Data System (ADS)
Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang
A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.
Health care information infrastructure: what will it be and how will we get there?
NASA Astrophysics Data System (ADS)
Kun, Luis G.
1996-02-01
During the first Health Care Technology Policy [HCTPI conference last year, during Health Care Reform, four major issues were brought up in regards to the underway efforts to develop a Computer Based Patient Record (CBPR)I the National Information Infrastructure (NIl) as part of the High Performance Computers & Communications (HPCC), and the so-called "Patient Card" . More specifically it was explained how a national information system will greatly affect the way health care delivery is provided to the United States public and reduce its costs. These four issues were: Constructing a National Information Infrastructure (NIl); Building a Computer Based Patient Record System; Bringing the collective resources of our National Laboratories to bear in developing and implementing the NIl and CBPR, as well as a security system with which to safeguard the privacy rights of patients and the physician-patient privilege; Utilizing Government (e.g. DOD, DOE) capabilities (technology and human resources) to maximize resource utilization, create new jobs and accelerate technology transfer to address health care issues. During the second HCTP conference, in mid 1 995, a section of this meeting entitled: "Health Care Technology Assets of the Federal Government" addressed benefits of the technology transfer which should occur for maximizing already developed resources. Also a section entitled:"Transfer and Utilization of Government Technology Assets to the Private Sector", looked at both Health Care and non-Health Care related technologies since many areas such as Information Technologies (i.e. imaging, communications, archival I retrieval, systems integration, information display, multimedia, heterogeneous data bases, etc.) already exist and are part of our National Labs and/or other federal agencies, i.e. ARPA. These technologies although they are not labeled under "Health Care" programs they could provide enormous value to address technical needs. An additional issue deals with both the technical (hardware, software) and human expertise that resides within these labs and their possible role in creating cost effective solutions.
NASA Astrophysics Data System (ADS)
Kun, Luis G.
1995-10-01
During the first Health Care Technology Policy conference last year, during health care reform, four major issues were brought up in regards to the efforts underway to develop a computer based patient record (CBPR), the National Information Infrastructure (NII) as part of the high performance computers and communications (HPCC), and the so-called 'patient card.' More specifically it was explained how a national information system will greatly affect the way health care delivery is provided to the United States public and reduce its costs. These four issues were: (1) Constructing a national information infrastructure (NII); (2) Building a computer based patient record system; (3) Bringing the collective resources of our national laboratories to bear in developing and implementing the NII and CBPR, as well as a security system with which to safeguard the privacy rights of patients and the physician-patient privilege; (4) Utilizing government (e.g., DOD, DOE) capabilities (technology and human resources) to maximize resource utilization, create new jobs, and accelerate technology transfer to address health care issues. This year a section of this conference entitled: 'Health Care Technology Assets of the Federal Government' addresses benefits of the technology transfer which should occur for maximizing already developed resources. This section entitled: 'Transfer and Utilization of Government Technology Assets to the Private Sector,' will look at both health care and non-health care related technologies since many areas such as information technologies (i.e. imaging, communications, archival/retrieval, systems integration, information display, multimedia, heterogeneous data bases, etc.) already exist and are part of our national labs and/or other federal agencies, i.e., ARPA. These technologies although they are not labeled under health care programs they could provide enormous value to address technical needs. An additional issue deals with both the technical (hardware, software) and human expertise that resides within these labs and their possible role in creating cost effective solutions.
ERIC Educational Resources Information Center
Clarke, Marlon
2011-01-01
As organizations have become more dependent on networked information systems (IS) to conduct their business operations, their susceptibility to various threats to information security has also increased. Research has consistently identified the inappropriate security behavior of the users as the most significant of these threats. Various factors…
21 CFR 1311.08 - Incorporation by reference.
Code of Federal Regulations, 2010 CFR
2010-04-01
... of Standards and Technology, Computer Security Division, Information Technology Laboratory, National... standards are available from the National Institute of Standards and Technology, Computer Security Division... 140-2, Security Requirements for Cryptographic Modules, May 25, 2001, as amended by Change Notices 2...
ERIC Educational Resources Information Center
Nunes, Miguel Baptista, Ed.; McPherson, Maggie, Ed.; Kommers, Piet, Ed.; Isaias, Pedro, Ed.
2017-01-01
These proceedings contain the papers of the International Conference e-Learning 2017, which was organised by the International Association for Development of the Information Society, 20-22 July, 2017. This conference is part of the Multi Conference on Computer Science and Information Systems 2017, 20-23 July, which had a total of 652 submissions.…
ERIC Educational Resources Information Center
Nunes, Miguel Baptista, Ed.; McPherson, Maggie, Ed.
2013-01-01
These proceedings contain the papers of the International Conference e-Learning 2013, which was organised by the International Association for Development of the Information Society and is part of the Multi Conference on Computer Science and Information Systems (Prague, Czech Republic, July 23-26, 2013). The e-Learning 2013 conference aims to…
NASA Technical Reports Server (NTRS)
Harrington, James L., Jr.; Brown, Robin L.; Shukla, Pooja
1998-01-01
Seventh annual conference proceedings of the Minority University-SPace Interdisciplinary Network (MU-SPIN) conference. MU-SPIN is cosponsored by NASA Goddard Space Flight Center and the National Science Foundation, and is a comprehensive educational initiative for Historically Black Colleges and Universities, and minority universities. MU-SPIN focuses on the transfer of advanced computer networking technologies to these institutions and their use for supporting multidisciplinary research.
Program Bytes - Satellite Meetings, SIGs, and AKEs at ISMB 2016
Fogg, Christiana
2016-01-01
The International Society for Computational Biology (ISCB) is gearing up for its flagship meeting, ISMB. The conference is the world’s largest gathering of computational biology and bioinformatics researchers. The ISMB 2016 pre-conference program will feature 17 special interest group and satellite meetings over the course of two days. This article previews those special meetings at ISCB’s flagship meeting, ISMB. PMID:27347388
NASA Astrophysics Data System (ADS)
Caturla, M. J.; Abril, I.; Denton, C.; Martín-Bragado, I.
2015-06-01
The 12th edition of the International Conference on Computer Simulation of Radiation Effects in Solids (COSIRES2014) was held in Alicante (Alacant), Spain on June 8-13, organized by the University of Alacant. This conference series, which started in 1992 in Berlin, Germany, and that is held every two years, is now a well-established meeting where the latest developments in computer modeling of all forms of irradiation of materials are discussed.
ERIC Educational Resources Information Center
Harbusch, Karin; Itsova, Gergana; Koch, Ulrich; Kuhner, Christine
2009-01-01
We built a natural language processing (NLP) system implementing a "virtual writing conference" for elementary-school children, with German as the target language. Currently, state-of-the-art computer support for writing tasks is restricted to multiple-choice questions or quizzes because automatic parsing of the often ambiguous and fragmentary…
ERIC Educational Resources Information Center
Mote, F.W., Ed.
The two Chinese Linguistics Conferences held at Princeton in October 1966 and 1967 treated respectively (1) the relevance and specific application of computer methods to the problems of Chinese Linguistics and (2) a series of interrelated problems in teaching Chinese--dictionaries, courses in classical Chinese, and methods of teaching and…
Interactive Synthesis of Code Level Security Rules
2017-04-01
Interactive Synthesis of Code-Level Security Rules A Thesis Presented by Leo St. Amour to The Department of Computer Science in partial fulfillment...of the requirements for the degree of Master of Science in Computer Science Northeastern University Boston, Massachusetts April 2017 DISTRIBUTION...Abstract of the Thesis Interactive Synthesis of Code-Level Security Rules by Leo St. Amour Master of Science in Computer Science Northeastern University
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hansmann, Ulrich H.E.
2012-07-02
This report summarizes the outcome of the international workshop From Computational Biophysics to Systems Biology (CBSB12) which was held June 3-5, 2012, at the University of Tennessee Conference Center in Knoxville, TN, and supported by DOE through the Conference Support Grant 120174. The purpose of CBSB12 was to provide a forum for the interaction between a data-mining interested systems biology community and a simulation and first-principle oriented computational biophysics/biochemistry community. CBSB12 was the sixth in a series of workshops of the same name organized in recent years, and the second that has been held in the USA. As in previousmore » years, it gave researchers from physics, biology, and computer science an opportunity to acquaint each other with current trends in computational biophysics and systems biology, to explore venues of cooperation, and to establish together a detailed understanding of cells at a molecular level. The conference grant of $10,000 was used to cover registration fees and provide travel fellowships to selected students and postdoctoral scientists. By educating graduate students and providing a forum for young scientists to perform research into the working of cells at a molecular level, the workshop adds to DOE's mission of paving the way to exploit the abilities of living systems to capture, store and utilize energy.« less
Summary Report - Strategic Weapons on the 21st Century Conference
DOE Office of Scientific and Technical Information (OSTI.GOV)
Roberts, B.
2017-04-21
This 11th annual event focused on changes in the security environment and their implications for the U.S. approach to deterrence, with special attention to extended deterrence in Europe and East Asia.
78 FR 4138 - Chief of Engineers Environmental Advisory Board; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-18
... ``Caf[eacute] Conference Room'' on the second floor of the Sandra Day O'Connor United States Courthouse... presentations during this meeting will focus on energy and water security and sustainability, and flow...
Stop Wasteful Federal Bonuses and Conferences Act of 2012
Sen. McCaskill, Claire [D-MO
2012-08-02
Senate - 08/02/2012 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Conference Offers Girls Opportunity to Expand Career Horizons
math, science, technology and non-traditional occupations. The conference will take place Saturday of computers, math, engineering, natural sciences, medical sciences, public service and the
Peer-Selected “Best Papers”—Are They Really That “Good”?
Wainer, Jacques; Eckmann, Michael; Rocha, Anderson
2015-01-01
Background Peer evaluation is the cornerstone of science evaluation. In this paper, we analyze whether or not a form of peer evaluation, the pre-publication selection of the best papers in Computer Science (CS) conferences, is better than random, when considering future citations received by the papers. Methods Considering 12 conferences (for several years), we collected the citation counts from Scopus for both the best papers and the non-best papers. For a different set of 17 conferences, we collected the data from Google Scholar. For each data set, we computed the proportion of cases whereby the best paper has more citations. We also compare this proportion for years before 2010 and after to evaluate if there is a propaganda effect. Finally, we count the proportion of best papers that are in the top 10% and 20% most cited for each conference instance. Results The probability that a best paper will receive more citations than a non best paper is 0.72 (95% CI = 0.66, 0.77) for the Scopus data, and 0.78 (95% CI = 0.74, 0.81) for the Scholar data. There are no significant changes in the probabilities for different years. Also, 51% of the best papers are among the top 10% most cited papers in each conference/year, and 64% of them are among the top 20% most cited. Discussion There is strong evidence that the selection of best papers in Computer Science conferences is better than a random selection, and that a significant number of the best papers are among the top cited papers in the conference. PMID:25789480
Peer-selected "best papers"-are they really that "good"?
Wainer, Jacques; Eckmann, Michael; Rocha, Anderson
2015-01-01
Peer evaluation is the cornerstone of science evaluation. In this paper, we analyze whether or not a form of peer evaluation, the pre-publication selection of the best papers in Computer Science (CS) conferences, is better than random, when considering future citations received by the papers. Considering 12 conferences (for several years), we collected the citation counts from Scopus for both the best papers and the non-best papers. For a different set of 17 conferences, we collected the data from Google Scholar. For each data set, we computed the proportion of cases whereby the best paper has more citations. We also compare this proportion for years before 2010 and after to evaluate if there is a propaganda effect. Finally, we count the proportion of best papers that are in the top 10% and 20% most cited for each conference instance. The probability that a best paper will receive more citations than a non best paper is 0.72 (95% CI = 0.66, 0.77) for the Scopus data, and 0.78 (95% CI = 0.74, 0.81) for the Scholar data. There are no significant changes in the probabilities for different years. Also, 51% of the best papers are among the top 10% most cited papers in each conference/year, and 64% of them are among the top 20% most cited. There is strong evidence that the selection of best papers in Computer Science conferences is better than a random selection, and that a significant number of the best papers are among the top cited papers in the conference.
Confchem: Ensuring the Future through Education
ERIC Educational Resources Information Center
Jones, Loretta L.
2007-01-01
An online conference sponsored by the Executive Committee of the ACS Division of Chemical Education (DivCHED) was held on October 13-30, 2006. The conference is one of the CONFCHEM (CONFerences on CHEMistry) offerings of the Division's Committee on Computers in Chemical Education. Robert Belford (University of Arkansas at Little Rock) served as…
1996-10-25
been demonstrated that steganography is ineffective 195 when images are stored using this compression algorithm [2]. Difficulty in designing a general...Despite the relative ease of employing steganography to covertly transport data in an uncompressed 24-bit image , lossy compression algorithms based on... image , the security threat that steganography poses cannot be completely eliminated by application of a transform-based lossy compression algorithm
Dissent in Numbers: Making Strong Anonymity Scale
2012-10-01
40,56,57,59], as an AAAS conference in 1997 concluded: “Anonymous Communication Should Be Re- garded as a Strong Human Right ; In the United States It...Is Also a Constitutional Right ” [56] The Arab Spring underscored the importance of this right , as organizers used pseudonymous Facebook and Twitter...with strong security requirements, might find a few extra seconds per Web page a reasonable price for local-area security. 6 Conclusion This paper has