Results 1 - 10
of
745
Decentralizing Privacy: Using Blockchain to Protect Personal Data
"... Abstract-The recent increase in reported incidents of surveillance and security breaches compromising users' privacy call into question the current model, in which third-parties collect and control massive amounts of personal data. Bitcoin has demonstrated in the financial space that trusted, ..."
Abstract
- Add to MetaCart
Abstract-The recent increase in reported incidents of surveillance and security breaches compromising users' privacy call into question the current model, in which third-parties collect and control massive amounts of personal data. Bitcoin has demonstrated in the financial space that trusted
Learning from imbalanced data
- IEEE Trans. on Knowledge and Data Engineering
, 2009
"... Abstract—With the continuous expansion of data availability in many large-scale, complex, and networked systems, such as surveillance, security, Internet, and finance, it becomes critical to advance the fundamental understanding of knowledge discovery and analysis from raw data to support decision-m ..."
Abstract
-
Cited by 260 (6 self)
- Add to MetaCart
Abstract—With the continuous expansion of data availability in many large-scale, complex, and networked systems, such as surveillance, security, Internet, and finance, it becomes critical to advance the fundamental understanding of knowledge discovery and analysis from raw data to support decision
Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. IACR: 2015/675
"... Emerging smart contract systems over decentralized cryp-tocurrencies allow mutually distrustful parties to transact safely with each other without trusting a third-party inter-mediary. In the event of contractual breaches or aborts, the decentralized blockchain ensures that other honest parties obta ..."
Abstract
-
Cited by 4 (2 self)
- Add to MetaCart
obtain commesurate remuneration. Existing systems, how-ever, lack transactional privacy. All transactions, including flow of money between pseudonyms and amount trasacted, are exposed in the clear on the blockchain. We present Hawk, a decentralized smart contract system that does not store financial
Financial Sector Surveillance and the IMF
, 2009
"... The global financial crisis has magnified the role of Financial Sector Surveillance (FSS) in the Fund’s activities. This paper surveys the various steps and initiatives through which the Fund has increasingly deepened its involvement in FSS. Overall, this process can be characterized by a preliminar ..."
Abstract
- Add to MetaCart
” with the coverage of other traditional core areas of surveillance, and of integrating financial analysis into the Fund’s analytical macroeconomic framework. By urging the Fund to give greater attention to its member countries ’ financial systems, the international community’s response to the global crisis may mark
Privacy and Security in Video Surveillance
"... Abstract Video surveillance systems are usually installed to increase the safety and security of people or property in the monitored areas. Typical threat scenarios are robbery, vandalism, shoplifting or terrorism. Other application scenarios are more intimate and private such as home monitoring or ..."
Abstract
- Add to MetaCart
Abstract Video surveillance systems are usually installed to increase the safety and security of people or property in the monitored areas. Typical threat scenarios are robbery, vandalism, shoplifting or terrorism. Other application scenarios are more intimate and private such as home monitoring
Surveillance, security and social sorting emerging research priorities
- International criminal justice review
, 2007
"... Security requirements have been raised to a high level in nation-states around the world follow-ing the 9/11 attacks. The resulting increase in routine surveillance of citizens, and especially of travelers, raises questions of sociological interest regarding the intensified means of technology-depen ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
-dependent governance common to many countries. The quality of social existence in a glob-alizing world is directly affected by the automated identification and social sorting systems proliferating especially at borders but also in everyday life. This article addresses two aspects of post-9/11 security and surveillance
Events detection for an audio-based surveillance system
- in in Proc. ICME’05
, 2005
"... The present research deals with audio events detection in noisy environments for a multimedia surveillance application. In surveillance or homeland security most of the systems aiming to automatically detect abnormal situations are only based on visual clues while, in some situations, it may be easi ..."
Abstract
-
Cited by 42 (3 self)
- Add to MetaCart
The present research deals with audio events detection in noisy environments for a multimedia surveillance application. In surveillance or homeland security most of the systems aiming to automatically detect abnormal situations are only based on visual clues while, in some situations, it may
Liquidity Shortages and Banking Crises
- Journal of Finance, Vol LX
, 2005
"... Banks are known to fail either because they are intrinsically insolvent or because an aggregate shortage of liquidity renders them insolvent. We show that the reverse can also happen: bank failures can shrink the common pool of liquidity, leading to a contagion of failures and a possible total meltd ..."
Abstract
-
Cited by 101 (7 self)
- Add to MetaCart
and participants at the NBER Economic Fluctuations meetings in February 2001 for helpful suggestions. We are grateful for financial support from the National Science Foundation and the Center for Research on Security Prices. Rajan also thanks the Center for the Study of the State and the Economy for financial
Advanced Virtual Reality Technologies for Surveillance and Security Applications
"... We present a system that exploits advanced Virtual Reality technologies to create a surveillance and security system. Surveillance cameras are carried by a mini Blimp which is tele-operated using an innovative Virtual Reality interface with haptic feedback. An interactive control room (CAVE) receive ..."
Abstract
-
Cited by 5 (1 self)
- Add to MetaCart
We present a system that exploits advanced Virtual Reality technologies to create a surveillance and security system. Surveillance cameras are carried by a mini Blimp which is tele-operated using an innovative Virtual Reality interface with haptic feedback. An interactive control room (CAVE
Financialization of Life Systems
"... Our paper examines the complex relations between bioart and the financialization of life itself through the bioeconomic apparatus of biosurveillance. Briefly, the bio-economy, or the relocation of genetic, microbial and cellular productive processes within capitalism (see Melinda Cooper 2008), invol ..."
Abstract
- Add to MetaCart
the increasing importance of financial markets within the biotech-nology industry and post-genomic technologies (synthetic biology). The concept of biosurveillance, originally developed for disease surveillance and monitoring, is now, in the era of the post-terror state, strongly linked to national security
Results 1 - 10
of
745