Highlights

From Passwords to Biometrics - In Pursuit of a Panacea

From Passwords to Biometrics - In Pursuit of a Pan, Prof. Steven Furnell
Achieving effective and acceptable means of user authentication has been a long-recognised challenge of IT security. While passwords are still dominant, today's implementations (...)


Privacy in Social Networks - Existing Challenges and Proposals for Solution

Privacy in Social Networks - Existing Challenges a, Prof. Günther Pernul
Social Networks play an increasingly important role for social interaction, allowing their users to bridge spatial and temporal communication boundaries. However, through their rising (...)


Current Research Topics in Information Security

Current Research Topics in Information Security, Prof. Edgar Weippl
Over the last years, there is an increasing number of descriptive works observing and describing complex phenomena, e.g., the efficiency of different spam campaigns, the distribution of bots, or the likelihood (...)


Hiding in a Panopticon - Grand Challenges in Internet Anonymity

Bryan Ford, Hiding in a Panopticon - Grand Challenges in Inter
Many people have legitimate needs to avoid their online activities being tracked and linked to their real-world identities - from citizens of authoritarian regimes, to everyday victims of domestic abuse (...)


European Project Space - BIOSTEC 2015

European Project Space - BIOSTEC 2015, Ana Fred, Alexandra Veiga, Marta Bienkiewicz, Justyna Maculewicz, Mohamed Oussama Ben Salem
The European Project Space on Biomedical Engineering, chaired by Prof. Ana Fred, from IST – Instituto de Telecomunicações was held in Lisbon, Portugal on January 13th. (...)


How to Cross the Border from R to D? - The Example of Conception of New Medical Devices

How to Cross the Border from R to D? - The Example, Lionel Pazart
The border between Research and Development for a new medical device is often unclear since the process of its development remains non linear and requires feedback (...)


Enchanted Objects - Design, Human Desire and the Internet of Things

Enchanted Objects - Design, Human Desire and the Internet of Things, David Rose
Some believe the future will look like more of the same—more smartphones, tablets, screens embedded in every conceivable surface. (...)


On Human-Agent Collectives

On Human-Agent Collectives, Nick Jennings
As computation increasingly pervades the world around us, it will profoundly change the ways in which we work with computers. (...)


Computational Logic as an Intelligent Agent’s Language of Thought

Computational Logic as an Intelligent Agent’s Lang, Robert Kowalski
Research in AI builds upon the tools and techniques of many different disciplines, including formal logic. However, the application (...)


First 3456789101112 Last
ICINCO 2017
29-31 July, Madrid
MAR
2017
2
14th Int. Conf. on Informatics in Control, Automation and Robotics
DATA 2017
26-28 July, Madrid
MAR
2017
2
6th Int. Conf. on Data Science, Technology and Applications
ICSOFT 2017
26-28 July, Madrid
MAR
2017
2
12th Int. Conf. on Software Technologies
PhyCS 2017
28-29 July, Madrid
MAR
2017
2
4th Int. Conf. on Physiological Computing Systems
SIMULTECH 2017
29-31 July, Madrid
MAR
2017
6
7th Int. Conf. on Simulation and Modeling Methodologies, Technologies and Applications