Conferences related to Law Enforcement

Back to Top

2018 13th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

HRI is a highly selective annual conference that showcases the very best research and thinking in human-robot interaction. HRI is inherently interdisciplinary and multidisciplinary, reflecting work from researchersin robotics, psychology, cognitive science, HCI, human factors, artificial intelligence, organizational behavior,anthropology, and many other fields.

  • 2019 14th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

    HRI is a highly selective annual conference that showcases the very best research and thinking in human-robot interaction. HRI is inherently interdisciplinary and multidisciplinary, reflecting work from researchers in robotics, psychology, cognitive science, HCI, human factors, artificial intelligence, organizational behavior, anthropology, and many other fields.

  • 2017 12th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

    The conference serves as the primary annual meeting for researchers in the field of human-robot interaction. The event will include a main papers track and additional sessions for posters, demos, and exhibits. Additionally, the conference program will include a full day of workshops and tutorials running in parallel.

  • 2016 11th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

    This conference focuses on the interaction between humans and robots.

  • 2015 10th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

    HRI is a single -track, highly selective annual conference that showcases the very bestresearch and thinking in human -robot interaction. HRI is inherently interdisciplinary and multidisciplinary,reflecting work from researchers in robotics, psychology, cognitive science, HCI, human factors, artificialintelligence, organizational behavior, anthropology, and many other fields.

  • 2014 9th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

    HRI is a highly selective annual conference that showcases the very best research and thinking in human -robot interaction. HRI is inherently interdisciplinary and multidisciplinary, reflecting work from researchers in robotics, psychology, cognitive science, HCI, human factors, artificial intelligence, organizational behavior, anthropology, and many other fields.

  • 2013 8th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

    HRI is a single -track, highly selective annual conference that showcases the very best research and thinking in human-robot interaction. HRI is inherently interdisciplinary and multidisciplinary, reflecting work from researchers in robotics, psychology, cognitive science, HCI, human factors, artificial intelligence, organizational behavior, anthropology, and many other fields.

  • 2012 7th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

    HRI is a single-track, highly selective annual conference that showcases the very best research and thinking in human-robot interaction. HRI is inherently interdisciplinary and multidisciplinary, reflecting work from researchers in robotics, psychology, cognitive science, HCI, human factors, artificial intelligence, organizational behavior, anthropology, and many other fields.

  • 2011 6th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

    Robot companions Lifelike robots Assistive (health & personal care) robotics Remote robots Mixed initiative interaction Multi-modal interaction Long-term interaction with robots Awareness and monitoring of humans Task allocation and coordination Autonomy and trust Robot-team learning User studies of HRI Experiments on HRI collaboration Ethnography and field studies HRI software architectures HRI foundations Metrics for teamwork HRI group dynamics.

  • 2010 5th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

    TOPICS: Robot companions, Lifelike robots, Assistive (health & personal care) robotics, Remote robots, Mixed initiative interaction, Multi-modal interaction, Long-term interaction with robots, Awareness and monitoring of humans, Task allocation and coordination, Autonomy and trust, Robot-team learning, User studies of HRI, Experiments on HRI collaboration, Ethnography and field studies, HRI software architectures

  • 2009 4th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

    * Robot companions * Lifelike robots * Assistive (health & personal care) robotics * Remote robots * Mixed initiative interaction * Multi-modal interaction * Long-term interaction with robots * Awareness and monitoring of humans * Task allocation and coordination * Autonomy and trust * Robot-team learning * User studies of HRI * Experiments on HRI collaboration * Ethnography and field studies * HRI software architectures

  • 2008 3rd ACM/IEEE International Conference on Human-Robot Interaction (HRI)

    Robot companions Lifelike robots Assistive (health & personal care) robotics Remote robots Mixed initiative interaction Multi-modal interaction Long-term interaction with robots Awareness and monitoring of humans Task allocation and coordination Autonomy and trust Robot-team learning User studies of HRI Experiments on HRI collaboration Ethnography and field studies HRI software architectures HRI foundations Metrics for teamwork HRI group dynamics Individual vs. group HRI

  • 2007 2nd Annual Conference on Human-Robot Interaction (HRI)


2018 25th IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE Signal Processing Society, is the premier forum for the presentation of technological advances and research results in the fields of theoretical, experimental, and applied image and video processing. ICIP 2018, the 25th in the series that has been held annually since 1994, brings together leading engineers and scientists in image and video processing from around the world.


2018 APWG Symposium on Electronic Crime Research (eCrime)

eCrime consist of two full days which bring together academic researchers, security practitioners, and law enforcement to discuss all aspects of electronic crime and ways to combat it


2018 IEEE 19th International Conference on High Performance Switching and Routing (HPSR)

The explicit goal of the conference is to bridge the gap between networking hardware and software. This gap has come under scrutiny recently with the advent of programmable data planes such as P4. Traditionally, the hardware (EE) and software (CS) communities have been clearly separated as they focused on their respective parts of the stack. Today, this separation is blurred and the need for inter-community discussion and collaboration is imperative. HPSR 2018 plans to bridge this gap.


2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)

The Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) is one of the premier conferences in the wireless research arena and has a long history of bringing together academia, industry and regulatory bodies. Today, it has become one of the IEEE Communication Society’s major conferences in wireless communications and networks. The topics cover the physical layer (PHY) and fundamentals of wireless communications, medium access control (MAC) and cross-layer design, mobile and wireless networks, as well as services, applications, and business.


More Conferences

Periodicals related to Law Enforcement

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Biomedical Engineering, IEEE Transactions on

Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


More Periodicals

Most published Xplore authors for Law Enforcement

Back to Top

Xplore Articles related to Law Enforcement

Back to Top

The Result of Selective Law Enforcement: Based on the Dynamic Game Analysis

[{u'author_order': 1, u'full_name': u'Yubin Zhang'}, {u'author_order': 2, u'full_name': u'Yunhui Zhang'}] 2010 International Conference on Computing, Control and Industrial Engineering, 2010

In the framework of optimal law enforcement theory, the existed literatures have analyzed the acts of selective law enforcement under the static conditions. In this paper, we use incomplete information dynamic game model to analyze the process of dynamic game between the enforcer and the potential offenders. The result shows that the potential offenders can get relevant enforcement information by ...


The Law Enforcement in Cyberspace Criminal: Focusing on the Experience between Taiwan and the United States

[{u'author_order': 1, u'full_name': u'Fa-Chang Cheng'}] 2011 Third International Conference on Multimedia Information Networking and Security, 2011

This article is discussing the Cyberspace Crime from the point of view to law enforcement. From the observation of this article, it indicates that the trans-bordering and hard-to-trace are two prominent characteristics in the field of Cyberspace Crime investigation. These two characteristics not only trigger the balance between assertion of jurisdiction and practicability of investigation but also raise the concern ...


Design research in the context of federal law enforcement

[{u'author_order': 1, u'affiliation': u'Carnegie Mellon Software Engineering Institute CERT Division', u'full_name': u'Barbara Batokova'}, {u'author_order': 2, u'affiliation': u'Carnegie Mellon Software Engineering Institute CERT Division', u'full_name': u'Todd Waits'}, {u'author_order': 3, u'affiliation': u'Carnegie Mellon Software Engineering Institute CERT Division', u'full_name': u'Anne Connell'}] 2014 IEEE International Professional Communication Conference (IPCC), 2014

In recent years, design thinking and design research have proved indispensable in creating useful and usable solutions that both address human needs and create value for the client. Design research is the connective activity that helps us integrate specialized knowledge into meaningful solutions. We used a structured design process and various design research methods to facilitate the design and development ...


Cryptography, Law Enforcement, and Mobile Communications

[{u'author_order': 1, u'affiliation': u'Universit\xbf Paris II Panth\xbfon-Assas', u'full_name': u'Vanessa Gratzer'}, {u'author_order': 2, u'affiliation': u'\xbfcole normale sup\xbfrieure', u'full_name': u'David Naccache'}] IEEE Security & Privacy, 2006

The Global System for Mobile (GSM) Communications Association reports that nearly 700 networks in more than 214 countries will have served 2 billion users. Unfortunately, the development of inexpensive mobile communications is also a source of new threats. In this issue's installment of-Crypto Corner, we review the handset-related methods law enforcement agencies use to gather evidence during criminal investigations. This ...


Extracting semantic information structures from free text law enforcement data

[{u'author_order': 1, u'affiliation': u'ADB Consulting, Carson City, Nevada, USA', u'full_name': u'James R. Johnson'}, {u'author_order': 2, u'affiliation': u'ADB Consulting, Carson City, Nevada, USA', u'full_name': u'Anita Miller'}, {u'author_order': 3, u'affiliation': u'University of Texas at Dallas, Richardson, USA', u'full_name': u'Latifur Khan'}, {u'author_order': 4, u'affiliation': u'University of Texas at Dallas, Richardson, USA', u'full_name': u'Bhavani Thuraisingham'}] 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

A detective distributes information on a current case to his law enforcement peers. He quickly receives a computer generated response with leads identified within hundreds of thousands of previously distributed free text documents from thousands of other detectives. The challenges lie in the nature of free text - unstructured formats, confusing word usage, cut-andpaste additions, abbreviations, inserted html/xml tags, multimedia ...


More Xplore Articles

Educational Resources on Law Enforcement

Back to Top

eLearning

No eLearning Articles are currently tagged "Law Enforcement"

IEEE.tv Videos

Speaker Deepak Maheshwari - ETAP San Jose 2015
The Future of Semiconductor: Moore's Law Plus - IEEE Rebooting Computing Industry Summit 2017
Gender-Based Occupational Stereotypes: New Behaviors, Old Attitudes - Carolyn Matheus & Elizabeth Quinn - IEEE WIE Forum USA East 2017
From the Quantum Moore's Law toward Silicon Based Universal Quantum Computing - IEEE Rebooting Computing 2017
End of Moore's Law Challenges and Opportunities: Computer Architecture Perspectives: IEEE Rebooting Computing 2017, Margaret Martonosi
Care Innovations: Responsibility For Being Green (com legendas em portugues)
What Will Carry the Industry Beyond the Tradition of Moore's Law? - IEEE Rebooting Computing Industry Summit 2017
Panel Discussion: RegionaI Issues and Developments Related to Internet Governance, Cybersecurity and Privacy - ETAP Tel Aviv 2015
Did You Know: Eric Schmidt is HKN
Computing Beyond Moore's Law - William Vanderlinde: 2016 International Conference on Rebooting Computing
Interview with Marcel J.M. Pelgrom - The Pelgrom Law: IEEE Gustav Robert Kirchhoff Award Recipient
Yesterday, Today and the Next Decade ? James Whittaker, Microsoft
Seven (Small) Steps to Protecting Big Trade Secrets and Confidential Information, Part 1 - IEEE USA
Q&A with Tom Conte: IEEE Rebooting Computing Podcast, Episode 1
Going Beyond Moore's Law: IEEE at SXSW 2017
Inspiring Brilliance: The Impact of Maxwell's Demon on Information Theory and Computing
Q&A with Dejan Milojicic: IEEE Rebooting Computing Podcast, Episode 9
IEEE Medal of Honor Recipient (2008): Dr. Gordon Moore
Intellectual Property Law Primer - Tyson Benson (2014-HKN-SLC)
Q&A with Tom Conte: IEEE Rebooting Computing Podcast, Episode 8

IEEE-USA E-Books

  • RFID Technology in Homeland Security, Law Enforcement, and Corrections

    This chapter contains sections titled:IntroductionRFID Technology in Homeland SecurityRFID in Law EnforcementRFID Use in Law Enforcement—Looking to the FutureRFID Technology in Corrections

  • Law Enforcement

    This chapter contains sections titled: The Function of Law Enforcement: Solution versus Prevention, A Brief History of the Police, The Use of Wiretaps in Law Enforcement, Wiretaps and Their Relatives, Electronic Surveillance in Context, Blurring the National Security/Law Enforcement Distinction

  • 4 From Agorism to OPSEC: Dark Web Markets and a Shifting Relationship to the State

    “Everywhere I looked I saw the State.” —Dread Pirate Roberts Perhaps the most infamous Dark Web site was the original Silk Road drug market, hosted as a Tor hidden service. From its beginning in early 2011 to its seizure by law enforcement in late 2013, the Silk Road was arguably more than a market. Its founder, Ross Ulbricht, conceptualized Silk Road as a sociotechnical implementation of agorism, a radical market libertarian philosophy. Echoing Weberian theories of state legitimacy (as discussed in chapter 2), agorism holds that the state is indeed the sole source of coercion and violence in contemporary society. Rather than accepting this dominance as “legitimate,” however, agorists argue that the state is illegitimate precisely because of its monopoly on violence. For agorists, free markets offer a new model for social organizing that does not rely on coercion, violence, or state power, where exchanges, not law enforcement, could be the glue that holds society together. Ulbricht argued that every sale on Silk Road was not just a means for drug dealers to satisfy the desires of drug consumers but a blow to the concept of the state itself.

  • NOTES

    None

  • Law Enforcement

    This chapter contains sections titled: Enforcement or Harassment?, Typical Examples of Harassment by Police, Quandary for Police, Proper Enforcement Policy: Enforce the Traffic Laws, Bicycles as Vehicles, Psychological Considerations, Bicycle Patrols, Public Support and Public Information, Answering Public Concerns, The Link Between Enforcement and Education, Penalties for Violations by Cyclists, Effect of Conviction Upon Driver's License, Treatment of Violations by Children

  • Encryption, Law Enforcement, and Privacy

    This chapter contains sections titled: * Introduction * Rise and Fall of the Data Encryption Standard * Evolution of Wiretaps and the ��Right to Privacy�� * Development of Public Key Encryption * Government Policy Toward Encryption * Current Social Conflicts and Ethical Issues * Case Study This chapter contains sections titled: * Worksheet��-��Review of Encryption Concepts * Worksheet��-��Legal Challenges to Encryption Export Regulations * Worksheet��-��The Importance of Not Being Different * Worksheet��-��Is Staying With the Herd Really Best? * Additional Assignments * References * Cryptography: The Importance of Not Being Different * Cryptography: Is Staying with the Herd Really Best? ]]>

  • Exercise Centers and Facilities

    This chapter contains sections titled:Organization of a Training/Exercise CenterDesign Principles for Training/Exercise Center FacilitiesReview Questions

  • 4 Hello, Data Journalism

    We are at an exciting moment, when every field has taken a computational turn. We now have computational social science, computational biology, computational chemistry, or digital humanities; visual artists use languages like Processing to create multimedia art; 3-D printing allows sculptors to push further into physical possibilities with art. It's thrilling to consider the progress that has been made. However, as life has become more computational, people haven't changed. Just because we have open government data doesn't mean we don't have corruption. The tech-facilitated gig economy has exactly the same problems as labor markets have had since the beginning of the industrial age. Traditionally, journalists have investigated these types of social problems to create positive social change. In the computational world, the practice of investigative journalism has had to go high tech.

  • Public Protection and Disaster Relief Communications

    The public protection and disaster relief (PPDR) sector brings essential value to society by creating a stable and secure environment to maintain law and order and to protect the life and values of citizens. One important task of PPDR services is to deal with emergency and surveillance situations on land, sea and air. The most important part of this work is done in the field, so all the tools must match the needs accordingly. This chapter provides a comprehensive vision of operational aspects concerning PPDR communications that includes a categorization of PPDR operational scenarios, a description of a generic operational framework, the identification of main components and communications’ reference points and the identification of current and expected communications services that are central to PPDR operations. The chapter also describes the main communications technologies and systems currently in use for the delivery of the communications services needed for PPDR operations.

  • 4 The Most Wanted Cybercriminal in the World: GameOver ZeuS, Cryptolocker, and the Rise of Ransomware

    When it comes to using computers to steal money, not even Albert Gonzalez with his buried barrel of cash has come close to matching the success of Russian hacker Evgeniy Bogachev. The $3 million bounty the FBI has offered for Bogachev's capture is larger than any that has ever been offered for a cybercriminal—but that sum represents only a tiny fraction of the money he has stolen through his botnet GameOver ZeuS.1At its height in 2012 and 2013, GameOver ZeuS, or GOZ, comprised between 500,000 and one million compromised computers all over the world that Bogachev could control remotely. For years, Bogachev used these machines to spread malware that allowed him to steal banking credentials and perpetrate online extortion.2No one knows exactly how much money Bogachev stole from his thousands of victims using GOZ, but the FBI conservatively estimates that it was well over $100 million.3Meanwhile, Bogachev has spent lavishly on a fleet of luxury cars, two French villas, and—showing a kinship of sorts with Gonzalez—a large yacht.4



Standards related to Law Enforcement

Back to Top

Standard for Common Incident Management Message Sets for Use by Emergency Management Centers

This standard is the Base Standard for a family of related standards that address the intercommunication needs of emergency management centers and other types of centers engaged in transportation incident management. Incident in this standard includes information concerning any transportation-related event that is received by the emergency management system, including planned roadway closures and special events, whether or not the ...