SEARCH RESULTS:

Search: security - Matches: 226


Curriculums:


 curriculum• ACTIVE - Training programme for academia
back to ACTIVE training project The goal of training activities in ACTIVE is to achieve the transfer of knowledge and best practices within the project as well as (principally) outside the project. ACTIVE training program is aimed at training individuals ...
 curriculumACTIVE - Training programme for industries
back to ACTIVE training project The goal of training activities in ACTIVE is to achieve the transfer of knowledge and best practices within the project as well as (principally) outside the project. ACTIVE training program is aimed at training individuals ...
 curriculumACTIVE - Training programme for multipliers
back to ACTIVE training project The goal of training activities in ACTIVE is to achieve the transfer of knowledge and best practices within the project as well as (principally) outside the project. ACTIVE training program is aimed at training individuals ...
 curriculum Davor Orlič: COIN - Academia training section
back to COIN training project These videolectures describe the technologies being used and developed in COIN, and some of the applications of those technologies in the project. The lectures are given by COIN researchers and by other researchers working in ...
 curriculum Davor Orlič: COIN - Industry training section
back to COIN training project These videolectures describe the technologies being used and developed in COIN, and some of the applications of those technologies in the project. The lectures are given by COIN researchers and by other researchers working in ...

Referenced courses:


 referenced course Mitja Jermol, Davor Orlič: Course Syllabus- Collaborative Networks
back to Collaborative Networks curriculum 1. Motivation for the Paradigm Practical examples of collaborative networks Historic overview. Technological and organizational trends. Discussion of the usefulness / benefits and current limitations of CNs. This first unit aims at creating a motivation ...
 referenced course Mitja Jermol, Davor Orlič: Course Syllabus - Open Source Enterprise Resource Planning and Order Management System
.:> go to all documents <:. 1. MOTIVATION FOR THE PARADIGM This first course aims at creating a motivation for the course through a brief presentation of application areas, illustrated by concrete examples in industry, services, government, etc. A brief ...
 referenced courseThe ACTIVE Project - Technologies and Application
back to ACTIVE training project The goal of training activities in ACTIVE is to achieve the transfer of knowledge and best practices within the project as well as (principally) outside the project. ACTIVE training program is aimed at training individuals ...

Event section:


 event sectionSlovenian ICT and Security companies

Events:


 event26th Annual Conference on Learning Theory (COLT), Princeton 2013
The conference is a single track meeting that includes invited talks as well as oral presentations of all refereed papers. We invited submissions of papers addressing theoretical aspects of machine learning and related topics. We strongly support a broad definition ...
 event27th Annual Conference on Learning Theory (COLT), Barcelona 2014
The conference strongly supports a broad definition of learning theory, including, but not limited to: • Design and analysis of learning algorithms and their generalization ability • Computational complexity of learning • Optimization procedures for learning • Unsupervised, semi-supervised learning, ...
 event2nd European Conference on ICT for Transport Logistics (ECITL), Venice 2009
As organizers of the 1st ECITL conference in Lucerne, in November 2008, we were happy and even a bit surprised by the outcome of last year’s event regarding the response and acceptance received from industry users in the logistics sector ...
 event3rd Annual European Semantic Web Conference (ESWC), Budva 2006
Topics of interest to the conference include (but are not restricted to): Ontology Management (e.g. creation, evolution, evaluation) Ontology Alignment (e.g. mapping, matching, merging, mediation and reconciliation) Ontology Learning and Metadata Generation (including e.g. HLT and ML approaches) Multimedia and ...
 event3rd European Conference on ICT for Transport Logistics (ECITL), Bremen 2010
The organizers of the last conferences in Lucerne and Venice are happy and even a bit surprised by the outcome of the events regarding the response and acceptance received from industry users in the logistics sector and the high awareness ...
 event5th International Conference on Information Technologies and Information Society (ITIS), Dolenjske Toplice 2013
The key scientific scope of our meeting is frontiers in information and knowledge technologies, emphasizing their role in social sciences. We also cover topics such as cloud computing, decision support systems, process management and ICT security. This year’s ITIS additionally ...
 eventeChallenges e-2010 Workshops, Warsaw 2010
The eChallenges e-2010 Conference & Exhibition takes place 27 – 29 October in Warsaw, Poland, coinciding with Chopin's 200th Anniversary. This is the twentieth in a series of annual conferences supported by the European Commission, which bring together over 650 ...
 eventEnvironmental Information Systems and Services (ENVIP): Infrastructures and Platforms Workshop, Bonn 2010
The Shared Environmental Information System (SEIS) is one of three major initiatives along with the INSPIRE Directive and the Global Monitoring for Environment and Security (GMES) undertaken by Europe to collect and share environmental information for the benefit of the ...
 eventEuropean Data Forum (EDF), Copenhagen 2012
The European Data Forum 2012 (EDF2012) is a meeting place for industry, research, policymakers and community initiatives to discuss the challenges of Big Data and the emerging Data Economy and to develop suitable action plans for addressing these challenges. Of ...
 eventFirst ACM International Conference on Web Search and Data Mining - WSDM 2008
WSDM (pronounced “wisdom”) is a brand new ACM conference intended to be complementary to the World Wide Web Conference tracks in search and data mining. The pace of innovation in these areas has reached a level that requires more than ...
 eventFIRST Industrial Workshop, Milano 2012
The FIRST project is proud to announce the upcoming FIRST Industrial Workshop co-allocated in the plenary session of the ABI LAB Forum 2012, in Milan, Italy. The ABI Lab Forum is the most important annual meeting of the ABI Lab ...
 eventFuture Of The Internet - Perspectives emerging from R&D in Europe, Bled 2008
This Conference is hosted by the Slovenian Government, with an objective to offer a first opportunity to understand what is being researched in EU and worldwide in the area of Future Internet, to identify common problems and propose solutions to ...
 eventInternational seminar on business & human rights
The International Seminar on Business and Human Rights was organized to mark the 60th Anniversary of the Universal Declaration of Human Rights. It was held in the Palais de Chaillot in Paris, where the Declaration was signed by the United ...
 eventMIT 6.033 Computer System Engineering - Spring 2005
This course covers topics on the engineering of computer software and hardware systems: techniques for controlling complexity; strong modularity using client-server design, virtual memory, and threads; networks; atomicity and coordination of parallel activities; recovery and reliability; privacy, security, and encryption; ...
 eventMIT Energy Short Course
(MITEI), established in September 2006, is an Institute-wide initiative designed to help transform the global energy system to meet the needs of the future and to help build a bridge to that future by improving today's energy systems. MIT President ...
 eventMIT World Series: Second International Engineering Systems Symposium
The term “engineering systems” can have two key meanings: 1. A class of systems characterized by a high degree of technical complexity, social intricacy, and elaborate processes, aimed at fulfilling important functions in society. 2. An emerging field of scholarship ...
 eventMIT World Series: Solutions that Scale to Meet the Energy Challenge: Technology, Policy and Entrepreneurship
The MIT Energy Conference is an annual student-run conference that brings together leaders in the fields of technology, policy, industry, and finance to develop solutions for the the world’s most pressing energy challenges. Environmental and security concerns have created an ...
 eventMIT World Series: The Technology and Policy Program - Homeland Security Technology and Policy Seminar
The Technology and Policy Program (TPP) educates men and women for leadership on the important technological issues confronting society. Our program prepares our graduates to excel in their technical fields, and to develop and implement effective strategies for dealing with ...
 eventNATO Advanced Study Institute on Mining Massive Data Sets for Security
This Workshop brings together scientists and engineers interested in recent developments in exploiting Massive Data Sets. Emphasis is placed on available techniques and their application to security-critical applications. Today our world is awash in data and we live in an ...
 eventSecurity and Technology @ Carnegie Council
As technology develops at an unprecedented speed, it has the potential to effect our security in many ways. From questions of Internet privacy to the development of weapons for use in outer space, these technological changes present unique challenges--and opportunities--in ...
 eventThe Academic Council on the United Nations System 23rd Annual Meeting
Citizens, governments and international organizations are confronted with an array of security challenges, including new forms of terrorism and international criminal activity; security implications of environmental degradation; instability in the financial system; militarization of space; unregulated flows of small arms; ...
 eventTransnational ICT and Security Technology Opportunities, Ljubljana 2007
 eventYALE - EVST 255 - Environmental Politics and Law
Can law change human behavior to be less environmentally damaging? Law will be examined through case histories including: environmental effects of national security, pesticides, air pollution, consumer products, plastics, parks and protected area management, land use, urban growth and sprawl, ...

Project:


 projectCentre for eGovernance Development for South East Europe
The CeGD is one of the first Public-Private-Partnerships (PPPs) established in the SEE region to address the needs of the specific, but nevertheless broad field, of eGovernance . The rationale behind the establishment of the CeGD and its location in ...

Best paper:


 best paper Metka Ule Novak, Urša Manček: Winner Announcement: Facing 21st Century Disasters Challenge
Winners of the Facing 21st Century Disasters Challenge: Muhd Ibnur Rashad - Sustainable Living Lab (SL2) Zeev Trembovler - Agricultural land deficiency Alexander She - Social Security Disaster

Debates:


 debate Bob "Brutus" Charette, Jr., Philip H. Cullom, Peter A. DeLuca, Jonathan Powers: Leading by Example
: "Leading By Example" will explore how the U.S. military is on the forefront of efforts to develop and implement renewable and clean energy sources both to power our forces and to combat climate change. Our speakers each are leaders ...
 debate Mike Honda, Barney Frank, Merrie Najimy, Margie Yamamoto, Kenneth Oye: National Security and Civil Liberties
Merrie Najimy’s father told her that “making the right decision isn’t always popular but making the popular decision isn’t always right.” Each of the speakers on this panel has taken an unpopular stand following September 11th. Najimy believes that the ...
 debate Robert Metcalfe, Ann Winblad, Guy Kawasaki: Placing Your Bets: Where Will the Smart Money Land?
In this freewheeling conversation, three veterans of the IT and venture capital worlds describe the current state of technology investing, and make a stab at predicting the next hot markets. Ann Winblad points to wireless as a sector that is ...
 debate Daniel Benjamin, Steven Simon, Gary Hart: Report Card on the War on Terror
Gary Hart wields his national security expertise to query these two authors in detail on their latest collaboration. Benjamin summarizes the book this way: “By pursuing the policies we have, we are hastening the next attack. I’m not talking about ...
 debate Rajiv Chandrasakaran, George Packer, Barbara Bodine: Reporter’s Notebook: The U.S. in Iraq
As viewed through the eyes of two well-informed journalists and an experienced Middle East diplomat, the U.S. invasion of Iraq demonstrated a unique combination of arrogance and ignorance, and the “reconstruction” period appears a fiasco with no end in sight. ...
 debate David Cleevely, Tim Kindberg, Derek McAuley, Rachel Jones: Security and Privacy: Is It only a Matter of Time before a Massive Loss of Personal Data or Identity theft Happens on a Smart Mobile Platform?
We have a growing number of smart platforms that are becoming established, each with its own market place for applications (Blackberry RIM, Nokia Ovi, Apple iPhone, Google g2, Vodafone 360) but we don’t have a security architecture that actually makes ...
 debate Wolfgang Busch, Christopher Regenhardt, Frank Arendt: Security and Visibility Discussion
 debate Suzanne DiMaggio, Jim Walsh, Stephen B. Heintz, Barry R. Posen: U.S.-Iran Relations
While Barack Obama has rejected the Bush administration’s harsh stance toward Iran, panelists warn that we’re far from the start of fruitful relations, and that achieving real diplomacy will paradoxically require both patience and a sense of urgency. Suzanna DiMaggio ...

Demonstration video:


 demonstration videoSDAG pilot case
In this video the EURIDICE Intelligent Cargo (IC) system is presented in the case of a cargo delivery from a supplier plant in Milan to a customer destination in Ljubljana. At the supplier plant, IC identifies itself through RFID technology ...

Introductions:


 introduction Frank Arendt: Introduction to Security & Visibility
 introduction Marc Najork, Andrei Broder: Welcome & Introductions at the WSDM 2008
WSDM (pronounced “wisdom”) is a brand new ACM conference intended to be complementary to the World Wide Web Conference tracks in search and data mining. The pace of innovation in these areas has reached a level that requires more than ...

Invited talks:


 invited talk Qiang Yang: From Low-level Sensors to High-level Intelligence: Activity Recognition Links the Knowledge Food Chain
Sensors provide computer systems with a window to the outside world. Activity recognition "sees" what is in the window to predict the locations, trajectories, actions, goals and plans of humans and objects. Building an activity recognition system requires a full ...
 invited talk Nigel Shadbolt: Garlik: Semantic Technology for the Consumer
In under a decade the internet has changed our lives. Now we can shop, bank, date, research, learn and communicate online and every time we do we leave behind a trail of personal information. Organisations have a wealth of structured ...
 invited talk Joachim M. Buhmann: Information Theoretic Model Validation by Approximate Optimization
Model selection in pattern recognition requires (i) to specify a suitable cost function for the data interpretation and (ii) to control the degrees of freedom depending on the noise level in the data. We advocate an information theoretic perspective where ...
 invited talk Pascal Van Hentenryck: Last-Mile Disaster Preparedness and Recovery
Every year, natural disasters cause infrastructure damages and power outages that have considerable impacts on both quality of life and economic welfare. Mitigating the effects of disasters is an important but challenging task, given the underlying uncertainty, the need for ...
 invited talk Tuomas Sandholm: Poker AI: Algorithms for Creating Game-Theoretic Strategies for Large Incomplete-Information Games
Incomplete-information games - such as most auctions, negotiations, and future (cyber)security settings - cannot be solved using minimax search even in principle. Completely different algorithms were needed. A dramatic scalability leap has occurred in our ability to solve such games ...
 invited talk Christopher W. Geib: Using Combinatory Categorial Grammars for Probabilistic Plan Recognition and Planning
Disclaimer: VideoLectures.NET emphasizes we are not the authors of this recording. Building intelligent systems that are capable of recognizing the actions of their human users in terms of high level plans and goals continues to gain importance as automated systems ...
 invited talk Margaret Anstee: What Price Security?

Interview:


 interview Davor Orlič, Joao Schwarz da Silva: Interview
In this interview for the Videolectures.Net team Joao Schwarz da Silva speaks about the problems of terrorism, internet security, wifi and gives an overlook about the future of the Internet. He later continues with the Internet's relation to Science, Education ...

Keynotes:


 keynote Chang Wen Chen: Mobile Multimedia Meet Cloud: Challenges and Future Directions
Smart phones and tablets are becoming the most desired platforms for ubiquitous multimedia services. When this contemporary trend of mobile media meets the increasing availability of public Clouds, a new technical paradigm, Cloud Mobile Media, is now emerging. This new ...
 keynote Danilo Türk: New Security Challenges
English: In a special address titled "New Security Challenges", the President responded to the invitation of the Academic Council to talk about the global security situation, the main challenges and certain institutional solutions influencing further development of the United Nations. ...
 keynote Pertti Huuskonen: The End of the Ubicomp World is Near, My Friend
We live in the golden age of ubiquitous computing. Many elements of Weiser’s bold vision are today commonplace in the lives of billions of people. Without even thinking about it, we today routinely search the web, reach out to people ...
 keynote Knut Sebastian Tungland: We need to understand our data
Statoil is an international energy company. This talk will highlight some important business challenges and issues related to data utilization. Analysing seismic reflections is the main exploration tool for an oil company, this is largest data volume in the company. ...

Lectures:


 lecture Willem Robert van Hage: A case study on automated risk assessment of ships using newspaper-based event extraction
In this paper we describe an event-type extractor on top of a distributed search engine. We apply this event-type extractor in a case study concerned with assisting maritime security operators to assess potential risk factors of ships. Based on a ...
 lecture Joan Feigenbaum: Accountability and Deterrence in Online Life
The standard technical approach to privacy and security in online life is preventive: Before someone can access confidential data or take any other action that implicates privacy or security, he should be required to prove that he is authorized to ...
 lecture Robert Malone: Achieving U.S. Energy Security Through Energy Diversity
“We’ve been spoiled as a nation,” says Bob Malone. For decades, energy was inexpensive and abundant, and most Americans took it for granted. Recently “we’ve seen the world change around us.” Successive presidential administrations have failed to free the nation ...
 lecture Ravi K. Iyer: A Configurable Hardware Framework for a Trusted Computing Base: Application to the Power Grid
Objectives: Develop enabling technology to provide customizable level of trust to a significant critical infrastructure as exemplified by the Power Grid computing and communication systems. The focus is on design methods and runtime techniques to achieve application-specific level of reliability ...
 lecture Andreas Kasten: A Framework for Iterative Signing of Graph Data on the Web
Existing algorithms for signing graph data typically do not cover the whole signing process. In addition, they lack distinctive features such as signing graph data at different levels of granularity, iterative signing of graph data, and signing multiple graphs. In ...
 lecture Arnold I. Barnett: Airline Safety and the Electoral College
Somehow Arnold Barnett manages to massage the subject of airline accidents into a breezy and sometimes comforting talk on statistical probabilities. In decades of research, he has taken firm hold of the metrics of measuring mortality in flight. While there ...
 lecture Arnold I. Barnett: Airline Security: Where are We?
The events of 9/11 unleashed a flood of security measures across all dimensions of daily life, many of them aimed at averting repeat attacks on aircraft. So you might imagine that the risks of flying have been much reduced. You’d ...
 lecture Giorgio Giacinto: Analysis of Patterns for Computer Security
 lecture Richard Wheeler: An overview of artificial immune systems
Artificial immune systems are a newly emerging paradigm for distributed machine learning that takes its organisational and representational cues from the human immune system and applies it to difficult error and anomaly detection across a variety of problems. The talk ...
 lecture Paulo Salles: Assessing the Ecological Impacts of Agriculture Intensification Through Qualitative Reasoning
How to feed the world without loosing what is left of biodiversity? Two answers for this question are found in the literature. On the one hand, the “Land Sparing” paradigm suggests that increasing yield by means of intensive agricultural systems ...
 lecture Robert Dukarić: A unified architecture of IaaS cloud solutions
Infrastructure as a Service (IaaS) is one of the most important layers of Cloud Computing. However, there is an evident deficiency of mechanisms for analysis, comparison and evaluation of IaaS cloud implementations, since no unified reference architecture is available. In ...
 lecture Walter M. Bugnar: Austria as Europe’s leader in eGovernance: Austrian e‐Card Project
In January 2004, the Federation of Austrian Social Insurance Institutions commissioned Siemens IT Solutions and Services with implementing the TP1 subproject of the e-card project (operations center and terminal equipment software). Siemens was in charge of developing the customer specific ...
 lecture Ahmed Rashid: Behind the Headlines: Pakistan
With its mix of militants, nuclear weapons, and chronic domestic unrest, Pakistan's problems have implications for the entire world. Prize-winning author and journalist Ahmed Rashid gives a chilling account of the situation in his homeland.
 lecture Joseph Cirincione: Bomb Scare: The History and Future of Nuclear Weapons
Joseph Cirincione delivers an energetic and at times impassioned primer on the standoff with Iran on its nuclear program, drawn in part from his latest book, The History and Future of Nuclear Weapons (Columbia University Press, Spring 2007). He offers ...
 lecture Peter Reichstaedter: Can eGovernment work in the Cloud? Some examples from Digital Austria
The IT industry is pushing cloud computing with the use of new paradigms. The keyword cloud means highly complex and standardized provisioning. Cloud especially change the legal environment - direct control is replaced with contractual agreements (who is responsible for ...
 lecture Matthew Bunn, Marvin Miller, Geoff Forden, Owen Coté Jr.: Can Nuclear Energy and Non-Proliferation Co-Exist?
If nuclear energy becomes a central tool in addressing climate change, will nuclear weapons proliferation inevitably follow? In the words of Matthew Bunn, “The horse ain’t entirely out of the barn—there are still things to do.” He and fellow panelists ...
 lecture Jere Van Dyk: Captive: My Time as a Prisoner of the Taliban
Journalist Jere Van Dyk tells of his decades-long involvement with Afghanistan, and gives a harrowing account of his 2008 kidnapping and imprisonment by the Taliban in the no-man's land between Afghanistan and Pakistan.
 lecture José Ramos-Horta: Challenges in Nation Building
At times humorous and other times defiant, José Ramos-Horta describes nurturing the 21st century’s first sovereign state through its formative years. The journey of East Timor from brutal Indonesian rule to fragile self-governance has involved Ramos-Horta in conflict and debate ...
 lecture Noam Chomsky: Chomsky on Gaza
While he admits to no surprise about events in Gaza, Noam Chomsky does consider “the latest U.S.-Israeli attack on helpless Palestinians” a step beyond terrorism and aggression. He says “some new term is needed for the sadistic and cowardly torture ...
 lecture David Lo: Classification of Software Behaviors for Failure Detection: A Discriminative Pattern Mining Approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs and anomalies are prevalent. Bugs have caused billions of dollars loss, ...
 lecture Wilfried Grommen: Cloud computing: A productivity opportunity, a policy challenge!?
Cloud computing, or software services on the internet are “the” new wave in computing. This is the natural evolution of ICT towards a utility service. Our societies do depend on ICT for most of its instances. This new wave will ...
 lecture Primož Cigoj: Cloud security and OpenStack
Provided security is one of the key requirements of cloud computing users. In our presentation we will give a short overview of the current state of security in cloud computing, introduce security mechanisms that are part of the latest OpenStack ...
 lecture Dalibor Baškovč: Cloud Standardization, Compliance and Certification
Security and compliance are two the most important issues that stand out from the many that exist within cloud computing. By working out the fundamentals of the legal background, EuroCloud Europe has started important projects to improve the general framework ...
 lecture Bin Yang: Collusion-Resistant Privacy-Preserving Data Mining
Recent research in privacy-preserving data mining (PPDM) has become increasingly popular due to the wide application of data mining and the increased concern regarding the protection of private and personal information. Lately, numerous methods of privacy-preserving data mining have been ...
 lecture Noah Feldman, Kanan Makiya: Consolidating Iraqi Democracy: The Institutional Context
Can constitutional democracy unfold in Iraq? Noah Feldman details a hybrid model of democracy-building currently under way in Iraq whose outcome is far from certain. Iraqi exiles, selected by the U.S. occupation force, formed a governing council to help draft ...
 lecture Robert E. Looney, John Tirman: Constructing a New Liberal Iraq
Iraq’s oil reserves are the second largest in the world, yet according to both colloquium speakers, the country’s economic prospects are quite dim. They also agree that bungled U.S. reforms share some of the blame for Iraq’s bleak outlook. Robert ...
 lecture Thomas Keating: Contemplative Dimensions of Human Experience
In a mind-stretching talk covering the history of the planet, development of higher-order consciousness, and East-West religious practices, Trappist monk Thomas Keating claims that humanity is poised to take its next evolutionary step, to the “furthest levels of human understanding.” ...
 lecture Piyush Harsh: Contrail - facts, objectives and current results
Contrail (http://contrail-project.eu/) develops an integrated approach to virtualization. It offers smart provisioning of resources over IaaS clouds through Virtual Execution Platform (http://vep.gforge.inria.fr/), provides services for federating IaaS clouds and Contrail Platform as a Service (ConPaaS) (http://www.conpaas.eu/) stack on top of ...
 lecture John Reed, Denis Cortese, Steven E. Koonin, Irving Wladawsky-Berger, James A. Champy: Critical Issues and Grand Challenges
These panelists use the lens of systems engineering to focus sharply on some signature global challenges in finance, healthcare, energy and IT. The system failure that undid the small but influential financial services industry was a few decades in the ...
 lecture Zala Herga: cycLearning: Cyc and Currious Cat as learning companion
Answering questions, solving problems, or achieving goals requires both knowledge and reasoning. Some of the required knowledge is about the specific domain in question, say banking or medicine or network security. Some of it is more general than that, such ...
 lecture Georges Hebrail: Data stream management and mining
The course provides an introduction to the data stream management and mining field. The following points are treated: (1) applications which motivated these new developments (telecommunications, computer networks, stock market, security, ...), (2) new concepts related to data streams (structure ...
 lecture Yanchang Zhao: Debt Detection in Social Security by Sequence Classification Using Both Positive and Negative Patterns
Debt detection is important for improving payment accuracy in social security. Since debt detection from customer transactional data can be generally modelled as a fraud detection problem, a straightforward solution is to extract features from transaction sequences and build a ...
 lecture Jerome I. Friedman, Phillip A. Sharp: Defining the Boundaries: Homeland Security and Its Impact on Scientific Research
In August 2001, MIT launched a review of the university’s commitment to unclassified research on campus. One month later, the events of September 11th gave this review a harsh immediacy, and transformed the discussion. New government policies that constrain the ...
 lecture Oliver Hidalgo: Democratic Antinomies: Freedom and Security, Liberty and Equality, Individual and Collective Claims
 lecture Miha Mohorčič: Department of Communication Systems
The Department of Communication Systems is concerned mainly with the research, development and design of next generation networks and wireless access systems, and the development of new algorithms for parallel and distributed computing and computer simulations. Other research activities include ...
 lecture Matjaž Gams: Department of Intelligent Systems
Development of methods and techniques of intelligent computer systems, with applications in the areas of event-driven security and supervisory systems for near-real-time and mission critical operation and network communication systems.
 lecture Craig Barrett: Digital Evolution
The world is counting on the fulfillment of (Intel co-founder) Gordon Moore’s Law for at least another half century. In Craig Barrett’s view, solutions to the crucial challenges of our time depend on improving on already nano-sized microprocessors every few ...
 lecture Alexandre Lung-Yut-Fong: Distributed Detection and Localization of Network Anomalies using Rank Tests
We propose an efficient and decentralized method for detecting change-points in high-dimensional data. This issue is of growing concern to the network security community since, in this context, network anomalies such as denial of service (DoS) attacks are likely to ...
 lecture Ian Hutchinson, Dwight Williams, Jeffrey Coderre, Alan Jasanoff, David Kaiser: Diverse Applications of Nuclear Technology
This session goes a long way toward demonstrating the “happy face of the atom,” as moderator David Kaiser puts it, replacing the mushroom cloud image with a multidimensional picture of the uses of nuclear technology. As a plasma physicist, Ian ...
 lecture Jenn Wortman Vaughan: Efficient Market Making via Convex Optimization & Connection to Online Learning
A prediction market is a financial market designed to aggregate information. To facilitate trades, prediction markets are often operated by automated market makers. The market maker trades a set of securities with payoffs that depend on the outcome of a ...
 lecture Claudio Sabia: Emaze Networks S.p.A.
Emaze Networks is an innovative provider of services and products in the Information Security field. Emaze customers are Financial and Insurance institutes, Industry and Services companies, R&amp;D departments, Telecommunication and Utility companies.
 lecture Jeffrey Immelt: Energy 2.0
Forget Energy 2.0, counsels Jeffrey Immelt-- “We never had Energy 1.0.” Unlike the health care business, he says, “we still sell some products in the energy sector that sold 25 years ago.” This relative torpor, Immelt explains, results from a ...
 lecture Robert Sraka: eSecurity & eHealth
 lecture Alenka Žužek Nemec: European Dimension of e-Government Development: Results of the 5th Ministerial e-Government Conference
Information and communication technology (ICT) now permeates virtually all aspects of our lives. ICT is inextricably linked with our desire for a prosperous and competitive economy, for the preservation of our environment, and for a more democratic, open, inclusive society. ...
 lecture Jernej Bule: Fingerprint verification as a Service in KC Class
The aim of our work is the implementation of biometric verification based on fingerprints in a cloud platform. Within this work we 1) develop own system for verification of persons based on fingerprint, 2) integrate system in a cloud platform, ...
 lecture Daniel Pauly: Fisheries and Global Warming: Impacts on Marine Ecosystems and Food Security
Downward swooping lines on the graphs say it all: The world’s fish populations, and hence its fisheries, are collapsing. Daniel Pauly has analyzed reams of data -- including number of boats fishing, their reported catch, the amount of fish thrown ...
 lecture Mario Nemirovsky: Fog computing
"Fog computing" is a new paradigm that exploits the benefits of virtualized IT infrastructures closer to end-users. In a nutshell, Fog computing offers an appealing combination of computational power, storage capacity, and networking services at the edge of the networks. ...
 lecture Barry R. Posen, Carol Saivetz, M. Taylor Fravel: Foreign Policy and the Next U.S. Administration
After tuning in closely to the presidential campaign, these panelists don’t discern worlds of difference in the candidates’ approaches to foreign policy. But the speakers convey key concerns and offer words of advice to the next U.S. president. Barry Posen ...
 lecture Danilo Türk: From Helsinki Final Act to an OSCE Charter: A Case for a New Security Architecture
 lecture Bruce Denby: Geolocalisation in Cellular Telephone Networks
Cellular telephone operators are currently required to provide caller localisation information for use by emergency services. Localisation fields appended to Call Detail Records can now also be exploited for commercial purposes, such as: new network services; subscription fraud detection; customer ...
 lecture Mortimer Downey, Pao Chuen Lui, Joseph Bordogna, Mary Good, Granger Morgan: Government Perspectives on Engineering Systems
Panelists share their diverse experiences, enthusiasm, and occasional frustrations involving complex, government-based engineering projects. Mortimer Downey outlines several expensive, new undertakings – from air traffic control modernization to a total revamping of the Coast Guard – in which an “ESD ...
 lecture Tomaž Vincek: Grid Computing
As network performance has outpaced computational power and storage capacity, a new paradigm has evolved to enable the sharing and coordinated use of geographically distributed resources. Grid computing provides scalable and secure remote access to computing, data, and other resources ...
 lecture Kenneth Oye, Richard C. Larson, Yossi Sheffi: How Can We Improve Disaster Response?
Even if the U.S. draws the right lessons from Hurricane Katrina, panelists suggest, the nation may still be caught short in the next disaster. In some areas of government, Kenneth Oye points out, “weaknesses can go on for a long ...
 lecture Anat Biletzki, Jeff Halper: Human Rights and Politics in Israel-Palestine
Human rights are central to the fraught politics between Israelis and Palestinians, these two panelists argue. Any conceivable solution to such an endless conflict must begin by acknowledging the current bleak realities of Palestinian life under Israeli rule, they say. ...
 lecture John Shattuck: Human Rights & the US State Department
Ambassador Shattuck provides insights from his experiences as Assistant Secretary of State for Human Rights in the Clinton Administration. Highlights include his analysis of the global events in the post-Cold War period which he states foreshadowed the attacks of September ...
 lecture Yanfang Ye: IMDS: Intelligent Malware Detection System
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, previously unseen malicious executables. In this paper, resting on the analysis of Windows API execution ...
 lecture Charlotta Johansson: Improved Mobility, Security and Safety of Pedestrians and Bicyclists on Roads through Small Towns and Villages
 lecture William H. Green Jr., Mujid S. Kazimi, Ahmed F. Ghoniem, Robert D. van der Hilst, Paul L. Joskow, Stephen Ansolabehere: Improving Today's Energy Systems
William Green frames this round-up of near-term pressing issues in energy research with a sobering observation: global demand for energy will increase 50% by 2025, because “most of the world wants to live like us.” The panel reports on five ...
 lecture Aleksander Šinigoj: Information Security Policies the Primary Building Blocks For Our Security Strategies
 lecture Naftali Tishby: Information Theo-retic and Alge-braic Methods for Network Anomaly Detection
The tutorial will discuss two central issues: (i) Information Theoretic principles and algorithms for extracting predictive statistics in distributed networks and (ii) algebraic and spectral methods for network anomaly detection. The first part will deal with the concept of predictive ...
 lecture Rayid Ghani: Interactive Data Mining and Its Business Applications
A lot of practical data mining applications deal with settings where the goal is to help human experts find rare cases that are of interest to them. Fraud Detection, Intrusion Detection, Surveillance for security applications, Information Filtering, Recommender Systems are ...
 lecture Michael Nielsen: International cooperation on Road Transport leading to improved mobility, safety, security and prosperity
 lecture Juan Cole, Ivo Daalder, Stephen Van Evera: Iraq: What Now?
The gloves come off in this biting review of Bush Administration policy in “post-war Iraq.” Juan Cole believes the administration acted on a fundamental misunderstanding, imagining that by toppling the Hussein regime, all Iraqis “would be happy.” After the U.S. ...
 lecture Sören Sonnenburg, Vojtech Franc: Large Scale Learning - Challenge
With the exceptional increase in computing power, storage capacity and network bandwidth of the past decades, ever growing datasets are collected in fields such as bioinformatics (Splice Sites, Gene Boundaries, etc), IT-security (Network traffic) or Text-Classification (Spam vs. Non-Spam), to ...
 lecture Marshall Carter: Leading with Information Technology
Marshall Carter leads an MIT class through a case study on corporate transformation, highlighting tips he believes are as salient for engineering students as for those focused on business services. Don’t turn to the best-seller lists for advice on change, ...
 lecture Hristo Tanev: Learning to Extract Security-related Event Information from Large News Collections
Automatic Event Extraction from texts emerges as an im- portant and complex text mining task. Its goal is to detect description of events of a speci¯c type described in the text. For each event the Event Extraction system is expected ...
 lecture John Geanakoplos: Lecture 10 - Dynamic Present Value
In this lecture we move from present values to dynamic present values. If interest rates evolve along the forward curve, then the present value of the remaining cash flows of any instrument will evolve in a predictable trajectory. The fastest ...
 lecture John Geanakoplos: Lecture 11 - Social Security
This lecture continues the analysis of Social Security started at the end of the last class. We describe the creation of the system in 1938 by Franklin Roosevelt and Frances Perkins and its current financial troubles. For many Democrats, Social ...
 lecture John Geanakoplos: Lecture 12 - Overlapping Generations Models of the Economy
In order for Social Security to work, people have to believe there's some possibility that the world will last forever, so that each old generation will have a young generation to support it. The overlapping generations model, invented by Allais ...
 lecture Steven B. Smith: Lecture 12 - The Sovereign State: Hobbes, Leviathan
This is an introduction to the political views of Thomas Hobbes, which are often deemed paradoxical. On the one hand, Hobbes is a stern defender of political absolutism. The Hobbesian doctrine of sovereignty dictates complete monopoly of power within a ...
 lecture John Geanakoplos: Lecture 13 - Demography and Asset Pricing: Will the Stock Market Decline when the Baby Boomers Retire?
In this lecture, we use the overlapping generations model from the previous class to see, mathematically, how demographic changes can influence interest rates and asset prices. We evaluate Tobin's statement that a perpetually growing population could solve the Social Security ...
 lecture Samuel Madden: Lecture 21: Security Introduction
 lecture John Geanakoplos: Lecture 24 - Risk, Return, and Social Security
This lecture addresses some final points about the CAPM. How would one test the theory? Given the theory, what's the right way to think about evaluating fund managers' performance? Should the manager of a hedge fund and the manager of ...
 lecture John Merriman: Lecture 2 - Absolutism and the State
The rise of absolutism in Europe must be understood in the context of insecurity attending the religious wars of the first half of the seventeenth century, and the Thirty Years' War in particular. Faced with the unprecedented brutality and devastation ...
 lecture Iván Szelényi: Lecture 2 - Hobbes: Authority, Human Rights and Social Order
An examination of Hobbes's lifetime reveals that the uncertainty of the British monarchy during his life (1588-1679) inspires Hobbes's social and political thought, especially regarding the role of the sovereign to provide for the security of his subjects. We consider ...
 lecture John Wargo: Lecture 3 - Nuclear Experiments
To illustrate the linkages among national security, secrecy, and environmental quality, Professor Wargo describes the Atomic Energy Commission's nuclear tests in the 1950s. The Atomic Energy Commission collected data on the spread of radionuclides from the nuclear tests, and discovered ...
 lecture Robert J. Shiller: Lecture 3 - Technology and Invention in Finance
Technology and innovation underlie finance. In order to manage risks successfully, particularly long-term, we must pool large amounts of risk among many, diverse people and overcome barriers such as moral hazard and erroneous framing. Inventions such as insurance contracts and ...
 lecture Robert Wyman: Lecture 5 - Why Is Africa Different?
In addition to cultural controls acting to maximize fertility, there are important, and often competing, interests of individual families to limit fertility. Unwanted births are dealt with by infanticide in many cultures. Additionally, fertility is regularly controlled by limiting marriage ...
 lecture David F. Swensen: Lecture 9 - Guest Lecture by David Swensen
David Swensen, Yale's Chief Investment Officer and manager of the University's endowment, discusses the tactics and tools that Yale and other endowments use to create long-term, positive investment returns. He emphasizes the importance of asset allocation and diversification and the ...
 lecture Lewis M. Branscomb: Living with Catastrophic Terrorism: Can Science and Technology Make the U.S. Safer?
After the terrorists attack of September 11, three Academies-the National Academy of Sciences, the National Academy of Engineering, and the Institute of Medicine-sponsored a major study of the role that science and technology might play in countering the threat of ...
 lecture Pavel Laskov: Machine Learning for Intrusion Detection
Intrusion detection is one of core technologies of computer security. The goal of intrusion detection goal is identi cation of malicious activity in a stream of monitored data which can be network trac, operating system events or log entries. A ...
 lecture Keith Henderson: Metric Forensics: A Multi-Level Approach for Mining Volatile Graphs
Advances in data collection and storage capacity have made it increasingly possible to collect highly volatile graph data for analysis. Existing graph analysis techniques are not appropriate for such data, especially in cases where streaming or near-real-time results are required. ...
 lecture Françoise Fogelman Soulié: Mining Massive Data Sets
Today, the amount of data coming from all possible sources is enormous and growing at a fast pace due, in large part, to the ubiquitous Web and its increasing presence in our everyday life; but also to emails, cell phones, ...
 lecture Mario Frank: Multi-Assignment Clustering for Boolean Data
Conventional clustering methods typically assume that each data item belongs to a single cluster. This assumption does not hold in general. In order to overcome this limitation, we propose a generative method for clustering vectorial data, where each object can ...
 lecture Evgeny Morozov: Net Delusion: The Dark Side of Internet Freedom
By falling for the supposedly democratizing nature of the Internet, Western do-gooders may have missed how it also entrenches dictators, threatens dissidents, and makes it harder—not easier—to promote democracy. Buzzwords like "21st-century statecraft" sound good in PowerPoint presentations, but the ...
 lecture Mitja Žnidarič: NOMEN d.o.o.
CORE BUSINESS: BIOMETRIC SECURITY * Other Security Fields: video&amp;audio surveliance, close protection, education * Trainings for security personnel, border security guards, anti terror seminars…
 lecture Mohamed ElBaradei: Nuclear Technology in a Changing World: Have We Reached a Turning Point?
We stand at a crossroads, states Mohamed ElBaradei: We can either employ nuclear energy to achieve global security, or watch nuclear technology lead to a global cataclysm. This stark analysis emerges from ElBaradei’s broad vision of a world of haves ...
 lecture Sergio Martínez: OCW (OpenCourseWare) and MOOC (Open Course Where?)
From the beginning, Open Educational Resources have had a clear and easy definition. Hewlett’s updated OER definition begins: “OER are teaching, learning, and research resources that reside in the public domain or have been released under an intellectual property license ...
 lecture Ernest J. Moniz, Dean Kamen: Oil, Security, Environment, Technology - The Segway Alternative
Oil, Security, Environment, Technology As an energy source, oil is hard to beat. In spite of reports to the contrary, there’s still lots of it available—1 trillion barrels—and the cost of extracting and harnessing it for use in transportation and ...
 lecture Simon Chesterman: One Nation Under Surveillance: A New Social Contract to Defend Freedom Without Sacrificing Liberty
Advances in technology make it impractical to distinguish between "foreign" and "local" communications. What limits, if any, should be placed on a government's efforts to spy on its citizens in the name of national security?
 lecture Susan Hockfield, Ernest J. Moniz: Opening Remarks Overview of the Energy Research Report
President Susan Hockfield unveils MIT’s grand-scale initiative to confront “the urgent challenge of our time: clean, affordable energy to power the world.” In much the same way that MIT “played a decisive role in the Allied victory in World War ...
 lecture Clive Best: Open Source Intelligence
Open Source Intelligence can be defined as the retrieval, extraction and analysis of information from publicly available sources. Each of these three processes is the subject of ongoing research resulting in specialised techniques. Today the largest source of open source ...
 lecture Erich Leitgeb: Optical Wireless Technologies for Broadband Communications
Today's information exchange depends on the transmission of data, voice and multimedia across the telecommunication networks. Optical wireless broadband communication represents one of the most promising approaches for addressing the emerging broadband access market. It offers low start-up and operational ...
 lecture Samuel W. Bodman: Our Energy Future: Why American Science and Engineering Must Lead the Way
The set of challenges for the U.S. posed by global economic competition and dependence on foreign oil are precisely those that must galvanize the scientific and engineering community in coming years, says Samuel Bodman. The Bush Administration, he claims, has ...
 lecture Samuel W. Bodman: Our Energy Future: Why American Science and Engineering Must Lead the Way
The set of challenges for the U.S. posed by global economic competition and dependence on foreign oil are precisely those that must galvanize the scientific and engineering community in coming years, says Samuel Bodman. The Bush Administration, he claims, has ...
 lecture Paul Farmer: Partners in Heath-Global Health Equity
Don’t foolishly advise Paul Farmer that his bold projects can’t succeed. For the past 20 years, Farmer’s been toppling orthodoxies concerning the delivery of health care to people of developing nations, and to our country’s inner city poor. In a ...
 lecture Thomas Schildhauer: Personal data ecosystem – How is the handling of personal user data on the internet going to change?
In the context of the research and experts discussion group Personal Data vs. Economy (September 2011), experts from the internet community, economy, and research have discussed the use of personal data, taking into account the three key stakeholders of the ...
 lecture Keng-Pei Lin: Privacy-Preserving Outsourcing Support Vector Machines with Random Transformation
Outsourcing the training of support vector machines (SVM) to external service providers benefits the data owner who is not familiar with the techniques of the SVM or has limited computing resources. In outsourcing, the data privacy is a critical issue ...
 lecture Kenneth Laidler: Professionalism in Design - Is it Possible?
My seminar will first establish my credentials, by explanation of who I am and what my company has been doing for the past 30 years, including 2 video walkthroughs of a hotel and a disco. My seminar will cover education ...
 lecture Yingpeng Sang: Reconstructing Data Perturbed by Random Projections when the Mixing Matrix is Known
Random Projection (RP) has drawn great interest from the research of privacy-preserving data mining due to its high efficiency and security. It was proposed in \cite{Liu} where the original data set composed of $m$ attributes, is multiplied with a mixing ...
 lecture Pinar Oezden Wennerberg: Security Applications of Web mining
 lecture Istvan Mezgar: Security infrastructures for CNs
 lecture Andre Groll: Security issues related to the use of cooperative systems - eSecurity WG of eSafety
 lecture Kenneth Starr, Nadine Strossen, Charles Stuckey, Lewis M. Branscomb, Steven Levy: Security, Privacy and Technology
New technologies allow individuals, corporations and government entities to monitor, track and identify employees, customers and the general public. This panel provides a forum to discuss security and privacy in today's global economy.
 lecture Carole Goble: Semantic Grid: A love match? or A marriage of convenience?
This is a one-hour video recording of the presentation of Carole Goble at the KnowledgeWeb summer school 2005. It comprises either the video synchronized with the slides (but requires Quicktime, hence Windows or MacOS, otherwise the slides have to be ...
 lecture Tadej Pukl: SETCCE – Security Technology Competence Centre
E-commerce products and services (globally used and W3C-compliant digital signature components; products for electronic invoicing process management, and outsourced services; products and services for trusted electronic archiving; CA’s) IT consulting services (company-wide business process de-materialization and optimization; PKI-related security policies; ...
 lecture Brian Keegan: Sic Transit Gloria Mundi Virtuali? Promise and Peril in the Computational Social Science of Clandestine Organizing
Massively multiplayer online games (MMOGs) maintain archival databases of all player actions and attributes including activity by accounts engaged in illicit behavior. If individuals in online worlds operate under similar social and psychological motivations and constraints as the offline world, ...
 lecture Walter Schmitz: Simulation Experiments: Emerging Instruments for CIP
Critical infrastructures (CIs) have undergone drastic changes in the last decades. The ubiquitous use of ICT has pervaded all traditional infrastructures, rendering them more intelligent, increasingly interconnected, complex, interdependent, and therefore more vulnerable. Critical infrastructures are vital backbones of modern ...
 lecture Gorazd Meško: Slovenian Criminology: Its Beginnings, Development and State of the Art
The early beginnings of the literature on Slovenian Criminology go back to the early 1920s when Fran Milčinski, a judge with enough literary talent to depict complex issues of law and crime, published the first Slovenian novel on juvenile delinquency. ...
 lecture William H. Gates: Software Breakthroughs: Solving the Toughest Problems in Computer Science
Bill Gates’ talk at MIT provided an optimistic view of the next generation of computer science, now that the “rough draft” is done. Gates finds a paradox today in that computer science is poised to transform work and home life, ...
 lecture Brad Feld: Software Innovation—Do You Think the Last 20 Years Were Exciting? The Next 20 Years Will Blow Your Mind
In a trip down memory lane, Brad Feld regales us with the pre- and recent history of electronic innovation, with a rapid-fire delivery that achieves vaudevillian pitch. Via a slide-laden PowerPoint presentation -- and, by the way, Feld claims to ...
 lectureSowing the Seeds for a More Creative Society
A few years ago, the government of Singapore summoned Mitch Resnick to help crack a problem. Although thousands of schoolchildren in that country were designing and building robots using the Lego Mindstorm kits Resnick helped invent, Singapore businesses complained that ...
 lecture Inger Ultvedt: Swedish Experience in Adopting Action Plan 1325 [UN S/RES 1325 (2000) on Women, Peace and Security]
 lecture William Wulf: Symposium Luncheon Address
Not too long ago, William Wulf had what he calls an “inter-ocular event—a 2x4 between the eyes.” After returning to academia from the trenches of Washington, D.C., Wulf noted that colleagues focused almost exclusively, and serenely, on analysis. In his ...
 lecture John Elder: Text Mining to Fast-Track Deserving Disability Applicants
If your health and finances are sufficiently poor, the Social Security Administration will send you taxpayer dollars to help out. But, applying and qualifying can be a long and frustrating process - sometimes taking up to two years! In the ...
 lecture John A. Fallon, Rory Stewart: The Afghan Challenge
Rebuilding Afghanistan will be a long process, says Rory Stewart, and so our presence there needs to be much lighter. It's inconceivable that for the next 30-40 years we can sustain investments of $85 billion and up and maintain 90,000 ...
 lecture Kerry Emanuel, Ernest J. Moniz: The Challenge: Meeting Global Energy Demands Sustainably
Despite their calm demeanors, Kerry Emanuel and Ernie Moniz impart grave and pressing concerns about global warming to this Museum gathering. Emanuel admits that he was still a skeptic 20 years ago, but that detailed analysis of the earth’s climate ...
 lecture Kerry Emanuel, Ernest J. Moniz: The Challenge: Meeting Global Energy Demands Sustainably
Despite their calm demeanors, Kerry Emanuel and Ernie Moniz impart grave and pressing concerns about global warming to this Museum gathering. Emanuel admits that he was still a skeptic 20 years ago, but that detailed analysis of the earth’s climate ...
 lecture Laurence J. Kotlikoff: The Coming Generational Storm: What You Need to Know about America’s Economic Future
A word of advice to baby boomers: be very kind to your children. They will quite likely be paying a steep price for your happy golden years. Laurence Kotlikoff says the future is dark indeed for the Social Security system. ...
 lecture Noam Chomsky: The Current Crisis in the Middle East
True to form, Noam Chomsky makes a sweeping and copiously detailed indictment of U.S. Middle East policy, brooking no contrary or alternate views. His history-filled lecture (interrupted by occasional applause) focuses on four crises, involving the Palestinians, the Lebanon invasion, ...
 lecture Noam Chomsky: The Emerging World Order: Its Roots, Our Legacy
Starting by saying "Perhaps it is the sign of my age, perhaps something else, but I cannot help thinking, more and more, about what kind of a world we are leaving for our children, grandchildren, and it’s not a very ...
 lecture Kanan Makiya: The End of Saddam and the Future of Iraq
Saddam Hussein left a very visible legacy from 30 bloody years in power: countless victims and a broken nation. But there is also a more obscure inheritance, literally mountains of documents left by the Ba’ath Party and security groups. Kanan ...
 lecture Jim Cooling: The engineering of real‐time embedded systems: Why software needs to be developed using rigorous engineering-based methods?
The microprocessor arrived circa 1970 and initially, was a very expensive device. However, by the end of that decade its cost had fallen dramatically, thanks mainly to improvements in design and fabrication methods. Suddenly cost was no longer a barrier ...
 lecture Katherine Brown, Robert Diamond: The Ethics of Exit from Afghanistan
Katherine Brown and Robert Diamond, Truman Fellows with first-hand experience in Afghanistan, discuss just how and when--both ethically and pragmatically--the U.S. can leave that troubled country. Their prediction? Not for a long time.
 lecture Ken Ducatel: The European Way to Cloud Computing Leadership
The European Commission is making a strategic plan to promote the take-up of cloud in the EU. The actions in the plan provide a basis for tackling some of the key issues that stakeholders have identified as major barriers such ...
 lecture Joseph Mariani: The Future European Multilingual Information Society
This vision of a European Multilingual Information Society at the 2020 horizon, made possible by the availability of enabling Language Technologies (LTs), results from the thoughts of 3 Vision Groups on Translation and Localization, Information Services and Media and Interactive ...
 lecture Cristina Martinez: The Future Internet: a vision from European Research
The infrastructure of the Internet has and will continually evolve to support and enable new services, trends and businesses. Europe is committed to take a leading role in exploring the emerging visions for the Future Internet that will drive the ...
 lecture Yves Punie: The Impact of Social Computing: Challenges and Opportunities for Europe
Apart from the unexpected and impressive growth of social computing applications there are two fundamental aspects of SC that are expected to lead to major impacts on society and the economy: (1) the fact that users are taking the lead ...
 lecture Charles H. Townes, Shirley Ann Jackson: The Importance of Basic Research in Physics and of MIT
The Importance of Basic Research in Physics and of MIT Two science luminaries pay tribute to MIT’s new Green Center for Physics in this first session of the symposium. Nobel laureate Charles Townes makes a case for the centrality of ...
 lecture Gülgûn Üçel-Aybet: The Influence of the Ottoman Regional Policy on the Cultural and Economic Life in Slovenia
The Ottoman State applied various economic and social policies in every province even in certain districts in the boundaries of those provinces according to their local social and economic structures. It would be proper to name this policy as ‘regional ...
 lecture Mark Klein: The MIT deliberatorium: Enabling large-scale deliberation about complex problems
Humanity now finds itself faced with highly complex challenges – ranging from climate change, and the spread of disease to international security and scientific collaborations - that require effective collective multi-disciplinary decision making with large communities that are distributed in ...
 lecture Charles B. Perrow: The Next Catastrophe: Reducing Our Vulnerabilities to Natural, Industrial, and Terrorist Disasters
It’s time to trade in the Department of Homeland Security for a Department of Homeland Vulnerabilities, says Charles Perrow. At its peril, our nation “privileges terrorism over natural and industrial disasters.” From Perrow’s perspective, the U.S. landscape is riddled with ...
 lecture Guro Katharina Helwig Vikør: The Norwegian experience
The Norwegian Ambassador, Ms. Guro Vikør, spoke about the UN resolution 1325 on Women, Peace and Security and the Action Plan based on the resolution 1325 before Prof. Dr. Jelušič talked about Slovenian efforts regarding peace building and gender equality. ...
 lecture John Chambers: The Power of the Network to Change the Way We Work, Live, Play, and Learn
John Chambers provides rich evidence of the way Cisco Systems has leveraged its core philosophy into a durable high tech success story. Chambers’ basics: catching market transitions; supply an educated workforce capable of teamwork; providing the appropriate infrastructure; and supportive ...
 lecture John Browne: The Purpose of Business
One common view of business makes a sharp distinction between making money and doing good in society. This is a “limited and distorted” perspective, according to John Browne. Business that focuses just on money doesn’t invest in the future -- ...
 lecture Michael E. O’Hanlon: The Science of War: Defense Budgeting, Military Technology, Logistics, and Combat Outcomes
Michael O'Hanlon explains how military modeling and planning are done, taking as examples Desert Storm, the Iraq War, and the decisions to be made now about Afghanistan.
 lecture Wiesiek Pawlowski: The Security of Mobile Agent Systems
In [2] a model for mobility, called Petri hypernets, was presented. Hypernets offer a visual formalism to describe hierarchically structured dynamic agents. The agents take the form of Petri nets, which manipulate other agents as resources. In [4] a logic ...
 lecture Wolfgang Wahlster: The Semantic Product Memory: An Interactive Black Box for Smart Objects
A semantic product memory stores a diary of an individual physical object in a persistent way on an embedded sensor system that is networked by wireless communication to a smart environment. The product monitors itself and its environment. Semantic technologies ...
 lecture Eric Foner: The Story of American Freedom: 1776-2005
Although the idea of freedom is nearly ubiquitous in American public discourse -- and perhaps no more so than today – it has been subject to a remarkable degree of flux over the course of the nation’s history. Eric Foner ...
 lecture Joan Susan Antokol: The widespread use of cloud computing in the US and where it is heading
This panel will explore the widespread use of cloud computing by organizations in the US. In particular, the panel will discuss: 1) The evolving cloud computing landscape in the US—where it stands now and where it is heading; 2) The ...
 lecture Arnold I. Barnett: Three More For The Road
In a trio of mini-talks, Arnold Barnett applies statistical analysis to some of society’s most confounding challenges. He first takes up the minority achievement gap -- the apparent under-performance of black and Hispanic students on standardized tests in comparison to ...
 lecture Arnold I. Barnett: Two More Things to Worry About
In customary, loose-limbed form, Arnold Barnett reprises two of his favorite themes: improvements to the U.S. Electoral College, and aviation safety. First up, Barnett’s suggested fix for national elections, which through the “fun-house mirror” of the Electoral College, permit winner-take-all ...
 lecture Malcolm Wicks: UK Minister of State for Energy - Energy Security and Market Liberalisation
 lecture Danai Koutra: Unifying Guilt-by-Association Approaches: Theorems and Fast Algorithms
If several friends of Smith have committed petty thefts, what would you say about Smith? Most people would not be surprised if Smith is a hardened criminal. Guilt-by-association methods combine weak signals to derive stronger ones, and have been extensively ...
 lecture Yosef Jabareen, Charles N. Patterson, David J. Nash, Harvey M. Sapolsky: U.S. Planning and Realities of Post-War Iraq
Judging from these panelists, the more intimate your experience of Iraq, the more optimistic you are likely to be. David J. Nash was fully immersed. He organized the multi-billion dollar reconstruction effort of Iraq’s infrastructure in 45 days. His 2800 ...
 lecture Pawan Sinha: Vision: Challenges and Prospects
In a fraction of a second, most of us can recognize a face in a crowd, or make out a face from a blurry image. Pawan Sinha focuses on our uncanny ability to recognize faces as a way of getting ...
 lecture Mark Little: Vision of the cloud computing from the Red Hat / JBOSS perspective
Platform as a Service has gained great popularity over the past two years. Many vendors have rewritten their middleware handbooks, and discarded existing investments in Java EE. With the rapid growth in interest around mobile, we're starting to hear the ...
 lecture Niko Neufeld: Welcome Presentation/ Computer Security/ Workshops presentation
 lecture Andrew Parece, Tamsin S. Randlett, Stephen M. Sammut, Scott Sarazen: What Can We Learn From Related Industries?
In some ways, the pharmaceutical industry is unique from other industries, its upfront R&D costs, for instance are extremely high. But these panelists see some commonalities with other business sectors, and offer observations and counsel to drug manufacturers. Andrew Parece ...
 lecture Peter W. Singer: Wired for War: The Robotics Revolution and Conflict in the 21st Century
Science fiction is fast becoming reality on the battlefield and robotics are already changing the way wars are being fought. How will they affect the politics, economics, laws, and ethics of warfare?
 lecture Dimitrij Najdovski: Wireless sensor network measurements of high density wind dynamics in the region Vipavska dolina, Slovenia with embedded real-time algorithm for prediction of the wind conditions
We will demonstrate case of intelligent wireless sensor network algorithm for prediction of wind conditions in the region of Vipavska dolina. The system was developed for traffic security on the highway during the periods of evolution of high density wind ...
 lecture Vittorio Rosato: Workshop Introduction
A “Critical Infrastructure” (CI) is a large scale infrastructure which if degraded, disrupted or destroyed, would have a serious impact on health, safety, security or well-beings of citizens or the effective functioning of governments and/or economy. (W. Schmitz, 2006)

Opening:


 opening James Wells, Dale Myers, Niko Neufeld, Ingrid Schmid: Welcome presentation/ Computer security/ Workshop presentation

Panels:


 panel Maria Esther Vidal: Panel on Data Protection and Security on the Web
"The EU’s current ethical focus on personal data protection is unbalanced." "It favours too much the protection of an individual’s privacy and right to be forgotten." "It entirely ignores the need to protect personal data when whole groups are in ...
 panel Evelyne Viegas: Panel on Data Protection and Security on the Web
 panel Luciano Floridi: Panel on Data Protection and Security on the Web
"The EU’s current ethical focus on personal data protection is unbalanced." "It favours too much the protection of an individual’s privacy and right to be forgotten." "It entirely ignores the need to protect personal data when whole groups are in ...
 panel Fabien Gandon: Panel on Data Protection and Security on the Web
"Semantics are a double-edged weapon for security." "Deployment requires security on every floor." "Security is much more than a technical problem."
 panel Valentina Presutti, Harith Alani, Aldo Gangemi, Fabien Gandon, Evelyne Viegas, Steffen Staab, Casanovas Romeu Pompeu, Luciano Floridi, Maria Esther Vidal: Panel on Data Protection and Security on the Web
On March 12th, in occasion of the 25th birthday of the World Wide Web, Sir Tim Berners-Lee made an open call for a “Magna Carta” to protect Web users. He said: "It's time for us to make a big communal ...
 panel Valentina Presutti: Panel on Data Protection and Security on the Web
On March 12th, in occasion of the 25th birthday of the World Wide Web, Sir Tim Berners-Lee made an open call for a “Magna Carta” to protect Web users. He said: "It's time for us to make a big communal ...
 panel Aldo Gangemi: Panel on Data Protection and Security on the Web
"A little semantics goes a long way to both granting and harming a trade-off between privacy and security." "The trade-off between privacy and security is a suq-like issue, where the attempts to cleanly control it may create more harm than ...
 panel Casanovas Romeu Pompeu: Panel on Data Protection and Security on the Web
"Security and privacy (data protection) are two faces of the same coin." "Principles of fair information practices (FIPs) and "privacy by design" (PbD) deal also with metadata and the so-called "identity meta-system" layer of the Internet." "Implementation of security by ...
 panel Steffen Staab: Panel on Data Protection and Security on the Web
"Data protection and security is not an issue to be solved once and for all, but an enduring issue like traffic safety." "Data protection and security is and will remain inconvenient, even if the kind of inconvenience should (and will) ...
 panel Harith Alani: Panel on Data Protection and Security on the Web
Many projects, papers, and businesses, are centred around social media data, but how many comply fully with EU data protection directives and regulations?" "Do we even know how to translate and embed such laws into our tools and research practices?" ...
 panel Constanze Buchheim, Tamas Locher, Manfred Reichl, Martin Eder, Nikolaus Koller: STARTup Lounge: "The Importance of an Interdisciplinary Team - Challenges of Team Development in Start Ups"
The issue is of existential importance for every innovative STARTup: Without the right team of people, the best business idea will not work. Excellent, entrepreneurial thinking team workers are essential. Moreover, a start up team needs not only great people, ...
 panel Kosta Tsipis, Philip Morrison, Owen Coté Jr., Steven E. Miller: Weapons of Mass Confusion: Assessing the True Risks
Panelists gathered for this discussion agree that when setting weapons policy it is counterproductive to lump weapons together. The dangers from nuclear, biological, and chemical weapons need to understood individually. Owen Cote says nuclear weapons, with their large-scale production process ...

Tutorials:


 tutorial Aleksandar Lazarevic, Jaideep Srivastava, Vipin Kumar, Arindam Banerjee, Varun Chandola: Data Mining for Anomaly Detection
Anomaly detection corresponds to discovery of events that typically do not conform to expected normal behavior. Such events are often referred to as anomalies, outliers, exceptions, deviations, aberrations, surprise, peculiarities or contaminants in different application domains Detection of anomalies is ...
 tutorial Milind Tambe, Christopher Kiekintveld: Game Theory for Security: Lessons learned from deployed applications
Security at infrastructure of economic, political, or symbolic importance is a key concern around the world. Game theory is well-suited to adversarial reasoning for security resource allocation and scheduling problems, and allows us to generate security strategies that are unpredictable, ...
 tutorial Pedro Domingos: Statistical Modeling of Relational Data
KDD has traditionally been concerned with mining data from a single relation. However, most applications involve multiple interacting relations, either explicitly (in relational databases) or implicitly (in semi-structured and multimodal data). Examples include link analysis, social networks, bioinformatics, information extraction, ...
 tutorial Marie-Francine Moens: Text Mining, Information and Fact Extraction (TMIFE)
communities (medical informatics, security, blog and news analysis, business information analysis, legal informatics, etc.). ?Still, today it is a somewhat fragmented subfield of human language technologies and information retrieval where the themes of (often forgotten) old-style pattern-based IE and more ...