Search results for "Computer security"

showing 10 items of 433 documents

The think aloud method in studying the translation process

2019

This paper presents a theoretical description of the process-oriented research method in translation studies known as the think aloud method and a case study of an experimental application of think-aloud protocols (TAP). The article begins with a brief description of the relevance of its topic, taking into account the state of current researches in the field of translation studies. A literature review of recent publications where the think aloud method and think-aloud protocols as the principal introspective and retrospective method in different translation studies is given. The shortcomings and advantages of applying the think aloud method are discussed and the ways to optimise the use of …

Data collectionProcess (engineering)media_common.quotation_subjectlcsh:PG1-9665Principal (computer security)Lautes DenkenField (computer science)verbale Daten.lcsh:Slavic languages. Baltic languages. Albanian languagesMathematics educationTranslation studiesIntrospectionRelevance (information retrieval)prozessorientierte ForschungsmethodenProtokolle des Lauten DenkensThink aloud protocolPsychologyTAPmedia_commonІноземні мови
researchProduct

A Rule-Based Multi-agent System for Local Traffic Management

2009

Road Traffic presents a high dynamism which makes necessary the development of traffic management and control strategies to improve traffic flows and more important, road safety. So it is needed the use of intelligent systems to support traffic organizations and road operators to cope with incidents. In this paper we introduce a local autonomous system for traffic management. This way, though there could be a breakdown in the communications between the local system and the TCC, the local system will be able to warn the road users in case of incidents. The system uses multiagent technology to work with the specific characteristics of traffic domain. The expert MAS system is ruled-based that …

Database Managementtraffic management systemComputer sciencebusiness.industryMulti-agent systemControl (management)multiagent systemIntelligent decision support systemRule-based systemVehicle Information and Communication SystemComputer securitycomputer.software_genreAdvanced Traffic Management SystemTraffic engineeringComputerSystemsOrganization_MISCELLANEOUSbusinessAutonomous system (mathematics)computer
researchProduct

Not a Target. A Deep Learning Approach for a Warning and Decision Support System to Improve Safety and Security of Humanitarian Aid Workers

2019

Humanitarian aid workers who try to provide aid to the most vulnerable populations in the Middle East or Africa are risking their own lives and safety to help others. The current lack of a collaborative real-time information system to predict threats prevents responders and local partners from developing a shared understanding of potentially threatening situations, causing increased response times and leading to inadequate protection. To solve this problem, this paper presents a threat detection and decision support system that combines knowledge and information from a network of responders with automated and modular threat detection. The system consists of three parts. It first collects te…

Decision support systemComputer scienceHumanitarian aidbusiness.industryDeep learningSystem testing02 engineering and technologyComputer securitycomputer.software_genreClassified information020204 information systems0202 electrical engineering electronic engineering information engineeringInformation systemCollaborative intelligence020201 artificial intelligence & image processingSocial mediaArtificial intelligencebusinesscomputerIEEE/WIC/ACM International Conference on Web Intelligence
researchProduct

Trust-aware RBAC

2012

Published version of a chapter in the book: Computer Network Security. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-33704-8_9 In this paper we propose a trust-aware enhancement of RBAC (TA-RBAC) that takes trustworthiness of users into consideration explicitly before granting access. We assume that each role in the framework is associated with an expression that describe trustworthiness of subjects required to be able to activate the role, and each subject (user) has assigned trustworthiness level in the system. By adding trustworthiness constraints to roles we enhance system, for example, with more flexible ability to delegate roles, to control reading/updating…

DelegateTrustworthinessComputer scienceReading (process)media_common.quotation_subjectControl (management)Role-based access controlVDP::Technology: 500::Information and communication technology: 550Computer securitycomputer.software_genrecomputerExpression (mathematics)media_common
researchProduct

Combining Haar Wavelet and Karhunen Loeve Transforms for Medical Images Watermarking

2014

This paper presents a novel watermarking method, applied to the medical imaging domain, used to embed the patient’s data into the corresponding image or set of images used for the diagnosis. The main objective behind the proposed technique is to perform the watermarking of the medical images in such a way that the three main attributes of the hidden information (i.e., imperceptibility, robustness, and integration rate) can be jointly ameliorated as much as possible. These attributes determine the effectiveness of the watermark, resistance to external attacks, and increase the integration rate. In order to improve the robustness, a combination of the characteristics of Discrete Wavelet and K…

Diagnostic ImagingArticle SubjectComputer scienceWavelet Analysislcsh:Medicine02 engineering and technologyGeneral Biochemistry Genetics and Molecular BiologyWaveletRobustness (computer science)[ INFO.INFO-TI ] Computer Science [cs]/Image Processing0202 electrical engineering electronic engineering information engineeringDigital watermarkingComputer SecurityBlock (data storage)Karhunen–Loève theoremGeneral Immunology and Microbiologybusiness.industryVisibility (geometry)lcsh:RReproducibility of Results020207 software engineeringPattern recognitionWatermarkGeneral MedicineHaar wavelet[INFO.INFO-TI] Computer Science [cs]/Image Processing [eess.IV][INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV]020201 artificial intelligence & image processingArtificial intelligencebusinessAlgorithmsResearch Article
researchProduct

Institutional Dynamics in International Organizations: Lessons from the Recruitment Procedures of the European External Action Service

2014

Author's version of an article in the journal: Organization Studies. Also available from the publisher at: http://dx.doi.org/10.1177/0170840614544558 This article examines how organizational designs develop by proposing a novel theoretical framework that views organizational change as resulting from a dialectic process between interpretive agents. The key claim is that existing formal procedures (such as recruitment processes, our empirical focal point) are subject to involved actors’ interpretive efforts. This results in a bargaining situation based on the interpretations of the principal actors, which may induce a feedback loop whereby the original procedures are amended. The empirical re…

DialecticOrganizational Behavior and Human Resource ManagementProcess managementbusiness.industryStrategy and Managementmedia_common.quotation_subjectPrincipal (computer security)Subject (philosophy)translationbargainingPublic relationsAction (philosophy)ArgumentDynamics (music)Management of Technology and InnovationService (economics)institutional entrepreneurshipRelevance (law)VDP::Social science: 200::Political science and organizational theory: 240SociologybusinessEuropean External Action ServiceEuropean diplomacymedia_common
researchProduct

SHAPES secure cloud platform for healthcare solutions and services

2020

The SHAPES project is an ambitious endeavour that gathers stakeholders from across Europe to create, deploy and pilot at large-scale a EU-standardised open platform incorporating and integrating a broad range of solutions, including technological, organisational, clinical, educational and societal, to enable the ageing population of Europe to remain healthy, active and productive, as well as to maintain a high quality of life and sense of wellbeing for the longest time possible. Not only each digital solution will be ethical, legal and appropriate for users, but also the results will align with the full and ethically responsible end-to-end exploitation of the new functionalities empowered b…

EHealthhyvinvointiteknologiabusiness.industryComputer scienceCloud computingComputingMilieux_LEGALASPECTSOFCOMPUTINGComputer securitycomputer.software_genreSHAPES projectcloud servicespilvipalvelutcross-border healthcarehealthy agingwell-beingHealth careteleterveydenhuoltobusinesskyberturvallisuuscomputer
researchProduct

The Theory of the Flying Geese Pattern of Development and Its Interpretations

1994

An interpretation is made of Akamatsu Kaname's theory of the flying geese pattern of development, launched in Japan during the 1930s. This theory explains how an undeveloped country can become developed relatively quickly. The undeveloped country adopts suitable labour-intensive industries from more developed countries. It produces first for the home market, but starts to export as soon as the industries have grown strong enough. Initially, products are simple, crude and cheap, but gradually the level of quality is elevated. The procedure is repeated over and over again, leading to a rapid process of national economic development. In Japanese postwar industrial policy, certain industries w…

Economic integrationEngineeringSociology and Political Sciencemedia_common.quotation_subject0211 other engineering and technologiesPoison control02 engineering and technologyInternational tradeComputer securitycomputer.software_genreIndustrial policyState (polity)050602 political science & public administrationComparative advantagemedia_common021110 strategic defence & security studiesbusiness.industryInterpretation (philosophy)05 social sciences0506 political scienceInternational free trade agreementPolitical Science and International RelationsbusinessSafety ResearchcomputerDeveloped countryJournal of Peace Research
researchProduct

Selection by committee: Anonymity and gratitude

2018

Abstract What kind of candidate is selected into a job when the principal has to appoint a committee to measure the candidates’ ability and select a winner? We find that if the committee takes into account the candidate’s gratitude towards them, a candidate with less than first best ability will be selected. A relevant exception may occur if the first best is the overall best candidate. First best selection is always achieved if the committee is anonymous to the candidates. If the committee is not detached enough from the candidates then delegation fares even worse than random selection.

Economics and EconometricsActuarial scienceDelegationmedia_common.quotation_subject05 social sciencesPrincipal (computer security)Principal–agent problemExpert appointment0502 economics and businessGratitudeEconomicsGratitude and reciprocity050207 economicsCandidate selection050203 business & managementSelection (genetic algorithm)media_commonAnonymity
researchProduct

CO2 Prices, Energy and Weather

2007

One of the main objectives of the European Union Emission Trading Scheme is the establishment of a market price level for allowances that show to European CO 2 emitting installations the environmental impact of their polluting activities. The aim of this paper is to focus on the daily price changes during 2005 in an attempt to examine the underlying rationality of pricing behaviour. Specifically, we study the effect of those weather and non-weather variables that academic and market agents consider as the major determinants of the of CO 2 price levels. The results show that the energy sources are the principal factors in the determination of CO 2 price levels, and that only extreme temperat…

Economics and EconometricsFocus (computing)Natural resource economicsPrincipal (computer security)RationalityEuropean Union Emission Trading SchemeGeneral EnergyEconomyEconomicsMarket pricePrice levelEnvironmental impact assessmentKyoto ProtocolEnergy sourceIndustrial organizationEnergy (signal processing)SSRN Electronic Journal
researchProduct