• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 745
Next 10 →

Decentralizing Privacy: Using Blockchain to Protect Personal Data

by Guy Zyskind , Oz Nathan , Alex ' Sandy' Pentland
"... Abstract-The recent increase in reported incidents of surveillance and security breaches compromising users' privacy call into question the current model, in which third-parties collect and control massive amounts of personal data. Bitcoin has demonstrated in the financial space that trusted, ..."
Abstract - Add to MetaCart
Abstract-The recent increase in reported incidents of surveillance and security breaches compromising users' privacy call into question the current model, in which third-parties collect and control massive amounts of personal data. Bitcoin has demonstrated in the financial space that trusted

Learning from imbalanced data

by Haibo He, Edwardo A. Garcia - IEEE Trans. on Knowledge and Data Engineering , 2009
"... Abstract—With the continuous expansion of data availability in many large-scale, complex, and networked systems, such as surveillance, security, Internet, and finance, it becomes critical to advance the fundamental understanding of knowledge discovery and analysis from raw data to support decision-m ..."
Abstract - Cited by 260 (6 self) - Add to MetaCart
Abstract—With the continuous expansion of data availability in many large-scale, complex, and networked systems, such as surveillance, security, Internet, and finance, it becomes critical to advance the fundamental understanding of knowledge discovery and analysis from raw data to support decision

Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. IACR: 2015/675

by Ahmed Kosba, Andrew Miller, Elaine Shi, Zikai Wen, Charalampos Papamanthou
"... Emerging smart contract systems over decentralized cryp-tocurrencies allow mutually distrustful parties to transact safely with each other without trusting a third-party inter-mediary. In the event of contractual breaches or aborts, the decentralized blockchain ensures that other honest parties obta ..."
Abstract - Cited by 4 (2 self) - Add to MetaCart
obtain commesurate remuneration. Existing systems, how-ever, lack transactional privacy. All transactions, including flow of money between pseudonyms and amount trasacted, are exposed in the clear on the blockchain. We present Hawk, a decentralized smart contract system that does not store financial

Financial Sector Surveillance and the IMF

by Timor Leste, Prepared Carlo Gola, Francesco Spadafora , 2009
"... The global financial crisis has magnified the role of Financial Sector Surveillance (FSS) in the Fund’s activities. This paper surveys the various steps and initiatives through which the Fund has increasingly deepened its involvement in FSS. Overall, this process can be characterized by a preliminar ..."
Abstract - Add to MetaCart
” with the coverage of other traditional core areas of surveillance, and of integrating financial analysis into the Fund’s analytical macroeconomic framework. By urging the Fund to give greater attention to its member countries ’ financial systems, the international community’s response to the global crisis may mark

Privacy and Security in Video Surveillance

by Thomas Winkler , Bernhard Rinner , Thomas Winkler , Bernhard Rinner
"... Abstract Video surveillance systems are usually installed to increase the safety and security of people or property in the monitored areas. Typical threat scenarios are robbery, vandalism, shoplifting or terrorism. Other application scenarios are more intimate and private such as home monitoring or ..."
Abstract - Add to MetaCart
Abstract Video surveillance systems are usually installed to increase the safety and security of people or property in the monitored areas. Typical threat scenarios are robbery, vandalism, shoplifting or terrorism. Other application scenarios are more intimate and private such as home monitoring

Surveillance, security and social sorting emerging research priorities

by David Lyon - International criminal justice review , 2007
"... Security requirements have been raised to a high level in nation-states around the world follow-ing the 9/11 attacks. The resulting increase in routine surveillance of citizens, and especially of travelers, raises questions of sociological interest regarding the intensified means of technology-depen ..."
Abstract - Cited by 7 (0 self) - Add to MetaCart
-dependent governance common to many countries. The quality of social existence in a glob-alizing world is directly affected by the automated identification and social sorting systems proliferating especially at borders but also in everyday life. This article addresses two aspects of post-9/11 security and surveillance

Events detection for an audio-based surveillance system

by C. Clavel, T. Ehrette, G. Richard - in in Proc. ICME’05 , 2005
"... The present research deals with audio events detection in noisy environments for a multimedia surveillance application. In surveillance or homeland security most of the systems aiming to automatically detect abnormal situations are only based on visual clues while, in some situations, it may be easi ..."
Abstract - Cited by 42 (3 self) - Add to MetaCart
The present research deals with audio events detection in noisy environments for a multimedia surveillance application. In surveillance or homeland security most of the systems aiming to automatically detect abnormal situations are only based on visual clues while, in some situations, it may

Liquidity Shortages and Banking Crises

by Douglas W. Diamond, Raghuram G. Rajan - Journal of Finance, Vol LX , 2005
"... Banks are known to fail either because they are intrinsically insolvent or because an aggregate shortage of liquidity renders them insolvent. We show that the reverse can also happen: bank failures can shrink the common pool of liquidity, leading to a contagion of failures and a possible total meltd ..."
Abstract - Cited by 101 (7 self) - Add to MetaCart
and participants at the NBER Economic Fluctuations meetings in February 2001 for helpful suggestions. We are grateful for financial support from the National Science Foundation and the Center for Research on Security Prices. Rajan also thanks the Center for the Study of the State and the Economy for financial

Advanced Virtual Reality Technologies for Surveillance and Security Applications

by Renaud Ott, Epfl Vrlab, Mario Gutiérrez, Daniel Thalmann, Epfl Vrlab, Frédéric Vexo, Epfl Vrlab
"... We present a system that exploits advanced Virtual Reality technologies to create a surveillance and security system. Surveillance cameras are carried by a mini Blimp which is tele-operated using an innovative Virtual Reality interface with haptic feedback. An interactive control room (CAVE) receive ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
We present a system that exploits advanced Virtual Reality technologies to create a surveillance and security system. Surveillance cameras are carried by a mini Blimp which is tele-operated using an innovative Virtual Reality interface with haptic feedback. An interactive control room (CAVE

Financialization of Life Systems

by Elisabeth Abergel, Jamie Magnusson
"... Our paper examines the complex relations between bioart and the financialization of life itself through the bioeconomic apparatus of biosurveillance. Briefly, the bio-economy, or the relocation of genetic, microbial and cellular productive processes within capitalism (see Melinda Cooper 2008), invol ..."
Abstract - Add to MetaCart
the increasing importance of financial markets within the biotech-nology industry and post-genomic technologies (synthetic biology). The concept of biosurveillance, originally developed for disease surveillance and monitoring, is now, in the era of the post-terror state, strongly linked to national security
Next 10 →
Results 1 - 10 of 745
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University