Search: security


Events

country_flag Security and Technology @ Carnegie Council
  • Security and Technology @ Carnegie Council
  • As technology develops at an unprecedented speed, it has the potential to effect our security in

country_flag Transnational ICT and Security Technology Opportunities, Ljubljana 2007
  • Transnational ICT and Security Technology Opportunities, Ljubljana 2007

country_flag MIT World Series: The B&K Securities MIT India Forum
  • MIT World Series: The B&K Securities MIT India Forum

country_flag MIT World Series: The Technology and Policy Program - Homeland Security Technology and Policy Seminar
  • MIT World Series: The Technology and Policy Program - Homeland Security Technology and Policy

country_flag NATO Advanced Study Institute on Mining Massive Data Sets for Security
  • The Security of Mobile Agent Systems
  • Learning to Extract Security-related Event Information from Large News Collections
  • Security Applications of Web mining
  • NATO Advanced Study Institute on Mining Massive Data Sets for Security
  • exploiting Massive Data Sets. Emphasis is placed on available techniques and their application to security
  • search,users communitiee...), these technologies can also be used for security-critical applications
  • & posters to help building a scientific community aware of security issues and techniques to solve them.

country_flag The Academic Council on the United Nations System 23rd Annual Meeting
  • What Price Security?
  • New Security Challenges
  • Citizens, governments and international organizations are confronted with an array of security
  • challenges, including new forms of terrorism and international criminal activity; security implications of
  • small arms; nuclear technologies and illicit goods; and fragile and failing states. These security
  • dilemmas require innovative thinking beyond traditional national security approaches. Our conference brings

Lectures

country_flag eSecurity & eHealth
Robert Sraka, 2010   (69 views)
@ 11th Forum on Europe: Foresight Conference "The Future of Information Society and Challenges for Good Governance" and Preparatory Workshop "Western Balkan Futures: Foresight 2020 Project", Bled 2010

  • eSecurity & eHealth
  • -- Issues of storage and security

country_flag Introduction to Security & Visibility
Frank Arendt, 2010   (45 views)
@ 3rd European Conference on ICT for Transport Logistics (ECITL), Bremen 2010

  • Introduction to Security & Visibility

country_flag Security and Visibility Discussion
Frank Arendt, Wolfgang Busch, Christopher Regenhardt, 2010   (31 views)
@ 3rd European Conference on ICT for Transport Logistics (ECITL), Bremen 2010

  • Security and Visibility Discussion

country_flag Security, Privacy and Technology
Steven Levy, Kenneth Starr, Nadine Strossen, Charles Stuckey, Lewis M. Branscomb, 2002   (31 views)
@ MIT World Series - 2002 TR100 Symposium

  • Security, Privacy and Technology
  • --  identify employees, customers and the general public. This panel provides a forum to discuss security and

country_flag Lecture 21: Security Introduction
Samuel Madden, 2005   (961 views)
@ MIT 6.033 Computer System Engineering - Spring 2005

  • Lecture 21: Security Introduction

country_flag Lecture 11 - Social Security
John Geanakoplos, 2009   (51 views)
@ YALE - ECON 251 - Financial Theory

  • Lecture 11 - Social Security
  • -- This lecture continues the analysis of Social Security started at the end of the last class. We
  • --  financial troubles. For many Democrats, Social Security is the most successful government program ever
  • --  devised and for many Republicans Social Security is a bankrupt program that needs to be privatized. Is
  • --  approach. Present value analysis reveals the flaws in the three most popular analyses of Social Security
  • --  investors a better return than they anticipate getting from their social security contributions, and that

country_flag What Price Security?
Margaret Anstee, 2010   (101 views)
@ The Academic Council on the United Nations System 23rd Annual Meeting

  • What Price Security?

country_flag New Security Challenges
Danilo Türk, 2010   (68 views)
@ The Academic Council on the United Nations System 23rd Annual Meeting

  • New Security Challenges
  • -- **English:** In a special address titled "New Security Challenges", the President responded to the
  • --  invitation of the Academic Council to talk about the global security situation, the main challenges and

country_flag Security infrastructures for CNs
Istvan Mezgar, 2006   (179 views)
@ 1st ECOLEAD Summer School, Helsinki 2006

  • Security infrastructures for CNs
  • -- Security infrastructures for CNs Dr. István MEZGÁR Hungarian Academy of Sciences mezgar
  • -- What is security?
  • -- Security in practice
  • -- Security Infrastructure
  • -- Connection between trust and security

country_flag Slovenian ICT and Security companies
2007   (0 views)
@ ICT companies from Friuli Venezia Giulia

  • Slovenian ICT and Security companies

country_flag SETCCE – Security Technology Competence Centre
Tadej Pukl, 2007   (186 views)
@ Slovenian ICT and Security companies

  • SETCCE – Security Technology Competence Centre
  • -- -materialization and optimization; PKI-related security policies; application of digital signatures; ambiental

country_flag Airline Security: Where are We?
Arnold I. Barnett, 2004   (24 views)
@ MIT World Series: Back to the Classroom 2004

  • Airline Security: Where are We?
  • -- The events of 9/11 unleashed a flood of security measures across all dimensions of daily life, many
  • --  security regulations, and found them wanting. The cost of another airplane attack, to the airline industry
  • --  alone, would run around $5 billion. Yet, says Barnett, the government has actually cut four security

country_flag National Security and Civil Liberties
Kenneth Oye, Mike Honda, Barney Frank, Merrie Najimy, Margie Yamamoto, 2003   (12 views)
@ MIT World Series - Starr Forum

  • National Security and Civil Liberties

country_flag Security Applications of Web mining
Pinar Oezden Wennerberg, 2007   (929 views)
@ NATO Advanced Study Institute on Mining Massive Data Sets for Security

  • Security Applications of Web mining

country_flag Security issues related to the use of cooperative systems - eSecurity WG of eSafety
Andre Groll, 2008   (89 views)
@ Traffic Safety

  • Security issues related to the use of cooperative systems - eSecurity WG of eSafety
  • -- eSecurity Working Group of the eSafety Forum
  • -- European Strategy of Automotive Security
  • -- Topics of the eSecurity WG

country_flag Analysis of Patterns for Computer Security
Giorgio Giacinto, 2009   (220 views)
@ The Analysis of Patterns, Cagliari 2009

  • Analysis of Patterns for Computer Security

country_flag 4. The Secure Wireless Agent Testbed
Seth Kendall, Arnol Sathe, Evan Sultanik, Michael Sausa, Kristy Pron, William Regli, 2008   (71 views)
@ AAAI 2008: AI Video Competition

  • 4. The Secure Wireless Agent Testbed
  • -- This video presents a high-level overview of the Secure Wireless Agent Testbed, a multi-year

country_flag Welcome presentation/ Computer security/ Workshop presentation
James Wells, Dale Myers, Niko Neufeld, Ingrid Schmid, 2009   (239 views)
@ CERN Summer Student Lecture Program 2009

  • Welcome presentation/ Computer security/ Workshop presentation

country_flag Welcome Presentation/ Computer Security/ Workshops presentation
Niko Neufeld, 2010   (51 views)
@ CERN Summer Student Lecture Program 2010

  • Welcome Presentation/ Computer Security/ Workshops presentation

country_flag Oil, Security, Environment, Technology - The Segway Alternative
Ernest J. Moniz, Dean Kamen, 2004   (89 views)
@ MIT World Series: Technology Day 2004 Shifting Gears

  • Oil, Security, Environment, Technology - The Segway Alternative
  • -- Oil, Security, Environment, Technology As an energy source, oil is hard to beat. In spite of
  • --  serious approaches regarding security and the environment,” concludes Moniz. The Segway Alternative

country_flag Lecture 24 - Risk, Return, and Social Security
John Geanakoplos, 2009   (103 views)
@ YALE - ECON 251 - Financial Theory

  • Lecture 24 - Risk, Return, and Social Security
  • -- , looking back to the lectures on Social Security earlier in the semester, how should the CAPM inform our
  • --  thinking about the role of stocks and bonds in Social Security? Can the views of Democrats and Republicans
  • --  be reconciled? What if Social Security were privatized, but workers were forced to hold their assets

country_flag Cloud security and OpenStack
Primož Cigoj, 2012   (278 views)
@ Cloud Assisted Services in Europe (CLASS) Conference, Bled 2012

  • Cloud security and OpenStack
  • -- Provided security is one of the key requirements of cloud computing users. In our presentation we
  • --  will give a short overview of the current state of security in cloud computing, introduce security
  • --  mechanisms that are part of the latest OpenStack version, and present guidelines for the secure use of
  • -- Cloud security and OpenStack
  • -- Security issues

country_flag The Security of Mobile Agent Systems
Wiesiek Pawlowski, 2007   (436 views)
@ NATO Advanced Study Institute on Mining Massive Data Sets for Security

  • The Security of Mobile Agent Systems
  • --  is to describe how the approach can be used to model, specify and verify some security aspects of
  • -- The Security of Mobile Agent Systems

country_flag Information Security Policies the Primary Building Blocks For Our Security Strategies
Aleksander Šinigoj, 2002   (319 views)
@ 5th International Multiconference on Information Society, Ljubljana 2002

  • Information Security Policies the Primary Building Blocks For Our Security Strategies

country_flag Sevecom Project – Secure of future vehicle communication networks
Antonio Kung, 2008   (280 views)
@ Traffic Safety

  • Sevecom Project – Secure of future vehicle communication networks
  • -- SeVeCom : Secure Vehicle Communication
  • -- Security and Privacy??? - 1
  • -- Security and Privacy??? - 2
  • -- Security Baseline Architecture - 1
  • -- Security Baseline Architecture - 2

country_flag Efficient Secure Query Processing in XML Data Stream
Dong-Chan An, 2007   (161 views)
@ European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), Warsaw 2007

  • Efficient Secure Query Processing in XML Data Stream
  • --  documents, the need for an efficient secure access of XML data in a ubiquitous data stream environment has
  • --  become very important. In this paper, we propose an efficient secure XML query processing method to solve
  • -- . Experimental evaluation clearly demonstrates that our approach is efficient and secure.

country_flag Web Spam Challenge 2007 Track II - Secure Computing Corporation Research
Sven Krasser, 2007   (204 views)
@ European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), Warsaw 2007

  • Web Spam Challenge 2007 Track II - Secure Computing Corporation Research

country_flag Panel on Data Protection and Security on the Web
Harith Alani, 2014   (5 views)
@ 11th Extended Semantic Web Conference (ESWC), Crete 2014

  • Panel on Data Protection and Security on the Web
  • -- Requirements - ethics, privacy, security

country_flag Panel on Data Protection and Security on the Web
Casanovas Romeu Pompeu, 2014   (3 views)
@ 11th Extended Semantic Web Conference (ESWC), Crete 2014

  • Panel on Data Protection and Security on the Web
  • -- "Security and privacy (data protection) are two faces of the same coin." "Principles of fair
  • --  meta-system" layer of the Internet." "Implementation of security by design implies a democratic

country_flag Panel on Data Protection and Security on the Web
Aldo Gangemi, 2014   (4 views)
@ 11th Extended Semantic Web Conference (ESWC), Crete 2014

  • Panel on Data Protection and Security on the Web
  • --  security." "The trade-off between privacy and security is a suq-like issue, where the attempts to

country_flag Panel on Data Protection and Security on the Web
Maria Esther Vidal, 2014   (5 views)
@ 11th Extended Semantic Web Conference (ESWC), Crete 2014

  • Panel on Data Protection and Security on the Web
  • -- Data Protection and Security ESWC Panel
  • -- Collaborative Systems versus Security and Trust

country_flag Panel on Data Protection and Security on the Web
Fabien Gandon, 2014   (2 views)
@ 11th Extended Semantic Web Conference (ESWC), Crete 2014

  • Panel on Data Protection and Security on the Web
  • -- "Semantics are a double-edged weapon for security." "Deployment requires security on every floor
  • -- ." "Security is much more than a technical problem."
  • -- Double edged semantics in security - 1
  • -- Double edged semantics in security - 2
  • -- Security on every floor

country_flag Panel on Data Protection and Security on the Web
Luciano Floridi, 2014   (7 views)
@ 11th Extended Semantic Web Conference (ESWC), Crete 2014

  • Panel on Data Protection and Security on the Web

country_flag Panel on Data Protection and Security on the Web
Maria Esther Vidal, Luciano Floridi, Casanovas Romeu Pompeu, Steffen Staab, Evelyne Viegas, Fabien Gandon, Aldo Gangemi, Harith Alani, Valentina Presutti, 2014   (4 views)
@ 11th Extended Semantic Web Conference (ESWC), Crete 2014

  • Panel on Data Protection and Security on the Web
  • --  level with human rights?" We all know that guaranteeing privacy and security at the same time in a world
  • --  addressed in order to guarantee web users privacy, on one hand, without putting their security in danger
  • -- , and web users security, on the other hand, without limiting their freedom by invading their private

country_flag Panel on Data Protection and Security on the Web
Valentina Presutti, 2014   (3 views)
@ 11th Extended Semantic Web Conference (ESWC), Crete 2014

  • Panel on Data Protection and Security on the Web
  • --  level with human rights?" We all know that guaranteeing privacy and security at the same time in a
  • --  should be addressed in order to guarantee web users privacy, on one hand, without putting their security
  • --  in danger, and web users security, on the other hand, without limiting their freedom by invading

country_flag Panel on Data Protection and Security on the Web
Steffen Staab, 2014   (2 views)
@ 11th Extended Semantic Web Conference (ESWC), Crete 2014

  • Panel on Data Protection and Security on the Web
  • -- "Data protection and security is not an issue to be solved once and for all, but an enduring issue
  • --  like traffic safety." "Data protection and security is and will remain inconvenient, even if the
  • -- Assistive Systems for Data Protection and Security

country_flag Panel on Data Protection and Security on the Web
Evelyne Viegas, 2014   (2 views)
@ 11th Extended Semantic Web Conference (ESWC), Crete 2014

  • Panel on Data Protection and Security on the Web

country_flag Game Theory for Security: Lessons learned from deployed applications
Milind Tambe, Christopher Kiekintveld, 2011   (857 views)
@ 27th Conference on Uncertainty in Artificial Intelligence (UAI), Barcelona 2011

  • Game Theory for Security: Lessons learned from deployed applications
  • -- Security at infrastructure of economic, political, or symbolic importance is a key concern around
  • --  the world. Game theory is well-suited to adversarial reasoning for security resource allocation and
  • --  scheduling problems, and allows us to generate security strategies that are unpredictable, but also based on
  • --  analysis in security domains. For instance, the ARMOR system was the first to apply this framework, and has
  • --  modeling different types of uncertainty in security domains and solving the resulting game formulations
  • -- Security Games
  • -- Motivation: Game Theory for Security (1)
  • -- Motivation: Game Theory for Security (2)
  • -- Urban Road Network Security
  • -- Outline: Background and basic security games

country_flag Achieving U.S. Energy Security Through Energy Diversity
Robert Malone, 2008   (61 views)
@ MIT World Series: Dean's Innovative Leader Series

  • Achieving U.S. Energy Security Through Energy Diversity
  • -- . Malone advocates a deliberate, federally directed enterprise aimed at providing long-term energy security

country_flag Relational Data Pre-Processing Techniques for Improved Securities Fraud Detection
Andrew Fast, 2007   (498 views)
@ Industrial & Government Tracks

  • Relational Data Pre-Processing Techniques for Improved Securities Fraud Detection
  • --  undertaken by the University of Massachusetts Amherst and the National Association of Securities Dealers
  • -- , and relational dataset describing nearly the entirety of the U.S. securities industry, and we show how

country_flag Mobile App Recommendations with Security and Privacy Awareness
Hengshu Zhu, 2014   (16 views)
@ Research Sessions

  • Mobile App Recommendations with Security and Privacy Awareness
  • --  security. Therefore, more and more mobile users are reluctant to adopt mobile Apps due to the risk of
  • --  privacy invasion and other security concerns. To fill this crucial void, in this paper, we propose to
  • --  develop a mobile App recommender system with privacy and security awareness. The design goal is to equip
  • --  security risk of mobile Apps. Then, the recommender system can provide App recommendations by considering
  • --  both the Apps' popularity and the users' security preferences. Specifically, a mobile App can lead to
  • -- Mobile App Recommendations with Security and Privacy Awareness

country_flag TeraLab, A Secure Big Data Platform: Description And Use Cases
Franck Cotton, 2014   (23 views)
@ European Data Forum (EDF), Athens 2014

  • TeraLab, A Secure Big Data Platform: Description And Use Cases
  • -- TeraLab, A Secure Big Data Platform Description And Use Cases

country_flag MobiS - Personalized Mobility Services for energy efficiency and security through advanced Artificial Intelligence Techniques
2014   (0 views)
@ EU Supported

  • MobiS - Personalized Mobility Services for energy efficiency and security through advanced

country_flag Improved Mobility, Security and Safety of Pedestrians and Bicyclists on Roads through Small Towns and Villages
Charlotta Johansson, 2008   (54 views)
@ Traffic Safety

  • Improved Mobility, Security and Safety of Pedestrians and Bicyclists on Roads through Small Towns
  • -- 2 Minus 1 Roads Means Improved Mobility - Security and Safety of Pedestrians and Bicyclists on

country_flag From Helsinki Final Act to an OSCE Charter: A Case for a New Security Architecture
Danilo Türk, 2010   (23 views)
@ President of the Republic of Slovenia

  • From Helsinki Final Act to an OSCE Charter: A Case for a New Security Architecture

country_flag UK Minister of State for Energy - Energy Security and Market Liberalisation
Malcolm Wicks, 2007   (67 views)
@ Conference on Climate Change: An Opportunity for Growth, Brdo pri Kranju 2007

  • UK Minister of State for Energy - Energy Security and Market Liberalisation

country_flag International cooperation on Road Transport leading to improved mobility, safety, security and prosperity
Michael Nielsen, 2008   (119 views)
@ Traffic Safety

  • International cooperation on Road Transport leading to improved mobility, safety, security and

country_flag Debt Detection in Social Security by Sequence Classification Using Both Positive and Negative Patterns
Yanchang Zhao, 2009   (50 views)
@ Sessions

  • Debt Detection in Social Security by Sequence Classification Using Both Positive and Negative
  • -- Debt detection is important for improving payment accuracy in social security. Since debt detection
  • --  patterns. However, according to our experience in a large social security application, negative patterns
  • --  detection in a large social security application. The central technique is building sequence classification

country_flag Democratic Antinomies: Freedom and Security, Liberty and Equality, Individual and Collective Claims
Oliver Hidalgo, 2008   (113 views)
@ Freedom and Democracy: European Perceptions, European Perspectives

  • Democratic Antinomies: Freedom and Security, Liberty and Equality, Individual and Collective

country_flag Fisheries and Global Warming: Impacts on Marine Ecosystems and Food Security
Daniel Pauly, 2007   (99 views)
@ MIT World Series: Earth System Revolutions - Key Turning Points in the History of Our Planet

  • Fisheries and Global Warming: Impacts on Marine Ecosystems and Food Security

country_flag Defining the Boundaries: Homeland Security and Its Impact on Scientific Research
Jerome I. Friedman, Phillip A. Sharp, 2003   (26 views)
@ MIT World Series: Nobel Laureate Speakers

  • Defining the Boundaries: Homeland Security and Its Impact on Scientific Research
  • --  scientists, Jerome Friedman says, will harm our national security by damaging the very way science is
  • --  international scholars. Phillip Sharp spoke to the issue of security concerns in the biological arena. It is
  • --  serve as our best defense – the same institutions that now face mounting security limits on researching

country_flag Breaking the Energy Deadlock-New Technologies for a Secure and Sustainable Energy Economy
Charles C. Mann, Firoz Rasul, Steve Gehl, Ashok Belani, Michael Koss, 2002   (18 views)
@ MIT World Series - 2002 TR100 Symposium

  • Breaking the Energy Deadlock-New Technologies for a Secure and Sustainable Energy Economy

country_flag Lecture 11 - Guest Lecture by Will Goetzmann: Institutions and Incentives in Mortgages and Mortgage-Backed Securities
Will Goetzmann, 2009   (75 views)
@ PLSC 270 - Capitalism: Success, Crisis and Reform

  • -Backed Securities

country_flag Learning to Extract Security-related Event Information from Large News Collections
Hristo Tanev, 2007   (234 views)
@ NATO Advanced Study Institute on Mining Massive Data Sets for Security

  • Learning to Extract Security-related Event Information from Large News Collections
  • --  automatically security related events in clusters of news articles.
  • -- Learning to Extract Security-related Event Information from Large News Collections
  • -- Outline - Overview of the Event Extraction system NEXUS, profiled for the security domain
  • -- Security-related event extraction, the NEXUS system

country_flag Swedish Experience in Adopting Action Plan 1325 [UN S/RES 1325 (2000) on Women, Peace and Security]
Inger Ultvedt, 2009   (57 views)
@ Peace Building, Interreligious Dialogue and Gender Equality

  • Swedish Experience in Adopting Action Plan 1325 [UN S/RES 1325 (2000) on Women, Peace and Security]

country_flag Security and Privacy: Is It only a Matter of Time before a Massive Loss of Personal Data or Identity theft Happens on a Smart Mobile Platform?
Rachel Jones, David Cleevely, Tim Kindberg, Derek McAuley, 2009   (89 views)
@ 8th International Conference on Mobile and Ubiquitous Multimedia

  • Security and Privacy: Is It only a Matter of Time before a Massive Loss of Personal Data or
  • --  have a security architecture that actually makes sense in terms of protecting end users against all the
  • --  attacks that are common place on the Internet today. Securing the potentially massive amount of

country_flag NOMEN d.o.o.
Mitja Žnidarič, 2007   (231 views)
@ Slovenian ICT and Security companies

  • * CORE BUSINESS: BIOMETRIC SECURITY * Other Security Fields: video&audio surveliance, close
  • --  protection, education * Trainings for security personnel, border security guards, anti terror seminars…

country_flag Winner Announcement: Facing 21st Century Disasters Challenge
Metka Ule Novak, Urša Manček, 2012   (98 views)
@ Challenge:Future Summit Gala 2012, Bled

  • Security Disaster

country_flag One Nation Under Surveillance: A New Social Contract to Defend Freedom Without Sacrificing Liberty
Simon Chesterman, 2011   (77 views)
@ Security and Technology @ Carnegie Council

  • name of national security?

country_flag Department of Intelligent Systems
Matjaž Gams, 2007   (96 views)
@ Presentation of JSI

  • areas of event-driven security and supervisory systems for near-real-time and mission critical operation

country_flag Emaze Networks S.p.A.
Claudio Sabia, 2007   (232 views)
@ ICT companies from Friuli Venezia Giulia

  • Emaze Networks is an innovative provider of services and products in the Information **Security

country_flag Accountability and Deterrence in Online Life
Joan Feigenbaum, 2011   (90 views)
@ 3rd International Conference on Web Science

  • The standard technical approach to privacy and security in online life is preventive: Before
  • --  someone can access confidential data or take any other action that implicates privacy or security, he
  • --  set of information-security researchers has embraced greater reliance on accountability mechanisms to
  • -- : (1) We flesh out with realistic examples our claim that a purely preventive approach to security is
  • -- Utopian Vision of IT Security

country_flag We need to understand our data
Knut Sebastian Tungland, 2013   (81 views)
@ European Data Forum (EDF), Dublin 2013

  • collected, analysed and distributed. The size of computer security logs explodes, the need to understand and
  • --  detect events related to security increases.
  • -- IT Security situation awareness
  • -- Some challenges in IT Security security awareness

country_flag Lecture 19 - History of the Mortgage Market: A Personal Narrative
John Geanakoplos, 2009   (65 views)
@ YALE - ECON 251 - Financial Theory

  • practical world of mortgage securities, and how he became the Head of Fixed Income Securities at Kidder

country_flag Wireless sensor network measurements of high density wind dynamics in the region Vipavska dolina, Slovenia with embedded real-time algorithm for prediction of the wind conditions
Dimitrij Najdovski, 2010   (298 views)
@ Prosense WSN and SME workshop: Wireless sensor networks (WSN) and small medium enterprises (SME)

  • conditions in the region of Vipavska dolina. The system was developed for traffic security on the highway
  • --  security.

country_flag An overview of artificial immune systems
Richard Wheeler, 2011   (536 views)
@ Solomon seminar

  • introduce basic concepts and applications including the use of AIS in network and physical security.
  • -- AIS Research: Physical Security

country_flag Lecture 17 - Investment Banking and Secondary Markets
Robert J. Shiller, 2008   (619 views)
@ ECON 252 - Financial Markets

  • banking. Investment banks underwrite securities and arrange for the issue of stocks and bonds by
  • --  corporations. Corporations work with investment banks to navigate the Securities and Exchange Commission
  • --  requirements for issuing securities. The banks then take on a "bought deal" or "best efforts deal" and help the
  • --  corporation to find a market for the securities. Investment banking depends on the reputation of its bankers

country_flag Lecture 19 - Brokerage, ECNs, etc.
Robert J. Shiller, 2008   (99 views)
@ ECON 252 - Financial Markets

  • The exchanges in which stocks and other securities are traded serve an important function in
  • --  finance. They bring together people interested in buying and selling securities in order to create a
  • --  price of securities at a point in time to all interested parties. Electronic Communication Networks and
  • --  automatic exchanges, more generally, have significantly impacted the exchange of securities and few

country_flag Lecture 12 - Overlapping Generations Models of the Economy
John Geanakoplos, 2009   (61 views)
@ YALE - ECON 251 - Financial Theory

  • In order for Social Security to work, people have to believe there's some possibility that the
  • --  Security and the real rate of interest. We find that Social Security likely increases the real rate of
  • --  rate of interest to be positive, exposing the flaw in Samuelson's contention that Social Security is a

country_flag A Configurable Hardware Framework for a Trusted Computing Base: Application to the Power Grid
Ravi K. Iyer, 2007   (439 views)
@ Satellite Conferences

  • security, while delivering optimal and timely performance.
  • -- Increased Power Grid Trustworthiness via Secure and Reliable Computing Base
  • -- Achieving Secure and Reliable Computing BaseReliability
  • -- Security Partitioned Applications
  • -- Example of Security Partitioned Applications
  • -- Security Partitioned Applications - part 1

country_flag Simulation Experiments: Emerging Instruments for CIP
Walter Schmitz, 2007   (68 views)
@ Satellite Conferences

  • sector complying with the rules of shareholder value has to prevent costs. On the other hand security of
  • --  critical infrastructures has a high societal importance. That means new business models and security
  • --  addition novel security technologies like Modelling and Simulation (M&S) have to be developed and used in
  • --  order to protect critical infrastructures as well as to train people responsible for safety and security.

country_flag Workshop Introduction
Vittorio Rosato, 2007   (40 views)
@ Satellite Conferences

  • destroyed, would have a serious impact on health, safety, security or well-beings of citizens or the

country_flag Collusion-Resistant Privacy-Preserving Data Mining
Bin Yang, 2010   (187 views)
@ Research Sessions

  • - multiparty secure computation of some functions of secure summations of data spreading around multiple
  • --  parties. To solve such a problem, we propose a new method that entails a high level of security - full
  • --  security.
  • -- Secure Product of Summations
  • -- Secure Linear Function Evaluation - 1
  • -- Secure Linear Function Evaluation - 2
  • -- Secure Linear Function Evaluation - 3
  • -- Secure Linear Function Evaluation - 4

country_flag Cloud Standardization, Compliance and Certification
Dalibor Baškovč, 2012   (37 views)
@ Cloud Assisted Services in Europe (CLASS) Conference, Bled 2012

  • Security and compliance are two the most important issues that stand out from the many that exist

country_flag Efficient Market Making via Convex Optimization & Connection to Online Learning
Jenn Wortman Vaughan, 2011   (324 views)
@ Relations between machine learning problems – an approach to unify the field

  • , prediction markets are often operated by automated market makers. The market maker trades a set of securities
  • --  security that will pay off $1 if and only if a Democrat wins the 2012 US presidential election. A risk
  • --  this security at any price below p, or sell it at any price above p. The current market price can then
  • --  design of securities markets over combinatorial or infinite state or outcome spaces. Our framework
  • -- , space of securities with bounded payoff. We prove that any market satisfying a set of intuitive
  • -- Arrow-Debreu Securities - 1
  • -- Arrow-Debreu Securities - 2
  • -- Arrow-Debreu Securities - 3
  • -- Arrow-Debreu Securities - 4
  • -- Arrow-Debreu Securities - 5

country_flag Interview
Joao Schwarz da Silva, Davor Orlič, 2008   (58 views)
@ Dnevi Jožefa Stefana na Institutu "Jožefa Stefana"

  • terrorism, internet security, wifi and gives an overlook about the future of the Internet. He later
  • -- .  **"We need to ensure that the network of tomorrow must be safe, reliable and secure to withstands not

country_flag Lecture 3 - Nuclear Experiments
John Wargo, 2010   (119 views)
@ YALE - EVST 255 - Environmental Politics and Law

  • To illustrate the linkages among national security, secrecy, and environmental quality, Professor
  • --  security reasons. **Reading assignment:** Wargo, Green Intelligence, chapters 1-3 **Resources** ;[[http