Conferences related to Law Enforcement

Back to Top

2018 13th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

HRI is a highly selective annual conference that showcases the very best research and thinking in human-robot interaction. HRI is inherently interdisciplinary and multidisciplinary, reflecting work from researchersin robotics, psychology, cognitive science, HCI, human factors, artificial intelligence, organizational behavior,anthropology, and many other fields.

  • 2019 14th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

    HRI is a highly selective annual conference that showcases the very best research and thinking in human-robot interaction. HRI is inherently interdisciplinary and multidisciplinary, reflecting work from researchers in robotics, psychology, cognitive science, HCI, human factors, artificial intelligence, organizational behavior, anthropology, and many other fields.

  • 2017 12th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

    The conference serves as the primary annual meeting for researchers in the field of human-robot interaction. The event will include a main papers track and additional sessions for posters, demos, and exhibits. Additionally, the conference program will include a full day of workshops and tutorials running in parallel.

  • 2016 11th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

    This conference focuses on the interaction between humans and robots.

  • 2015 10th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

    HRI is a single -track, highly selective annual conference that showcases the very bestresearch and thinking in human -robot interaction. HRI is inherently interdisciplinary and multidisciplinary,reflecting work from researchers in robotics, psychology, cognitive science, HCI, human factors, artificialintelligence, organizational behavior, anthropology, and many other fields.

  • 2014 9th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

    HRI is a highly selective annual conference that showcases the very best research and thinking in human -robot interaction. HRI is inherently interdisciplinary and multidisciplinary, reflecting work from researchers in robotics, psychology, cognitive science, HCI, human factors, artificial intelligence, organizational behavior, anthropology, and many other fields.

  • 2013 8th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

    HRI is a single -track, highly selective annual conference that showcases the very best research and thinking in human-robot interaction. HRI is inherently interdisciplinary and multidisciplinary, reflecting work from researchers in robotics, psychology, cognitive science, HCI, human factors, artificial intelligence, organizational behavior, anthropology, and many other fields.

  • 2012 7th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

    HRI is a single-track, highly selective annual conference that showcases the very best research and thinking in human-robot interaction. HRI is inherently interdisciplinary and multidisciplinary, reflecting work from researchers in robotics, psychology, cognitive science, HCI, human factors, artificial intelligence, organizational behavior, anthropology, and many other fields.

  • 2011 6th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

    Robot companions Lifelike robots Assistive (health & personal care) robotics Remote robots Mixed initiative interaction Multi-modal interaction Long-term interaction with robots Awareness and monitoring of humans Task allocation and coordination Autonomy and trust Robot-team learning User studies of HRI Experiments on HRI collaboration Ethnography and field studies HRI software architectures HRI foundations Metrics for teamwork HRI group dynamics.

  • 2010 5th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

    TOPICS: Robot companions, Lifelike robots, Assistive (health & personal care) robotics, Remote robots, Mixed initiative interaction, Multi-modal interaction, Long-term interaction with robots, Awareness and monitoring of humans, Task allocation and coordination, Autonomy and trust, Robot-team learning, User studies of HRI, Experiments on HRI collaboration, Ethnography and field studies, HRI software architectures

  • 2009 4th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

    * Robot companions * Lifelike robots * Assistive (health & personal care) robotics * Remote robots * Mixed initiative interaction * Multi-modal interaction * Long-term interaction with robots * Awareness and monitoring of humans * Task allocation and coordination * Autonomy and trust * Robot-team learning * User studies of HRI * Experiments on HRI collaboration * Ethnography and field studies * HRI software architectures

  • 2008 3rd ACM/IEEE International Conference on Human-Robot Interaction (HRI)

    Robot companions Lifelike robots Assistive (health & personal care) robotics Remote robots Mixed initiative interaction Multi-modal interaction Long-term interaction with robots Awareness and monitoring of humans Task allocation and coordination Autonomy and trust Robot-team learning User studies of HRI Experiments on HRI collaboration Ethnography and field studies HRI software architectures HRI foundations Metrics for teamwork HRI group dynamics Individual vs. group HRI

  • 2007 2nd Annual Conference on Human-Robot Interaction (HRI)


2018 25th IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE Signal Processing Society, is the premier forum for the presentation of technological advances and research results in the fields of theoretical, experimental, and applied image and video processing. ICIP 2018, the 25th in the series that has been held annually since 1994, brings together leading engineers and scientists in image and video processing from around the world.


2018 APWG Symposium on Electronic Crime Research (eCrime)

eCrime consist of two full days which bring together academic researchers, security practitioners, and law enforcement to discuss all aspects of electronic crime and ways to combat it


2018 IEEE 19th International Conference on High Performance Switching and Routing (HPSR)

The explicit goal of the conference is to bridge the gap between networking hardware and software. This gap has come under scrutiny recently with the advent of programmable data planes such as P4. Traditionally, the hardware (EE) and software (CS) communities have been clearly separated as they focused on their respective parts of the stack. Today, this separation is blurred and the need for inter-community discussion and collaboration is imperative. HPSR 2018 plans to bridge this gap.


2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)

The Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) is one of the premier conferences in the wireless research arena and has a long history of bringing together academia, industry and regulatory bodies. Today, it has become one of the IEEE Communication Society’s major conferences in wireless communications and networks. The topics cover the physical layer (PHY) and fundamentals of wireless communications, medium access control (MAC) and cross-layer design, mobile and wireless networks, as well as services, applications, and business.


More Conferences

Periodicals related to Law Enforcement

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Biomedical Engineering, IEEE Transactions on

Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


More Periodicals

Most published Xplore authors for Law Enforcement

Back to Top

Xplore Articles related to Law Enforcement

Back to Top

Internet intermediaries and counter-terrorism: Between self-regulation and outsourcing law enforcement<sup>1</sup>

[{u'author_order': 1, u'affiliation': u'School of Law, University of Minnesota, Minneapolis, United States', u'full_name': u'Krisztina Huszti-Orban'}] 2018 10th International Conference on Cyber Conflict (CyCon), None

Recent years have seen increasing pressure on Internet intermediaries that provide a platform for and curate third-party content to monitor and police, on behalf of the State, online content generated or disseminated by users. This trend is prominently motivated by the use of ICTs by terrorist groups as a tool for recruitment, financing, and planning operations. States and international organizations ...


Towards hierarchical cooperative analytics architecture in law enforcement agencies

[{u'author_order': 1, u'affiliation': u'Department of Software Engineering, Jordan University of Science & Technology, Irbid, Jordan', u'full_name': u'Luay Alawneh'}, {u'author_order': 2, u'affiliation': u'GE Healthcare, Wisconsin, USA', u'full_name': u'Mahmoud Said'}, {u'author_order': 3, u'affiliation': u'Department of Software Engineering, Jordan University of Science & Technology, Irbid, Jordan', u'full_name': u'Ziad Al-Sharif'}] 2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA), None

The vast growth in populations and the widespread of metropolitan areas hinder the efforts of crime investigation and inhibit tracking the risk of threats to safety and national security. Information technology has been helping in tracing criminals and terrorists, but with the outspread of social networks and the emergence of the Internet of Things, new challenges have arisen. The Internet ...


Law enforcement resource optimization with response time guarantees

[{u'author_order': 1, u'affiliation': u'School of Information Systems, Singapore Management University, Singapore', u'full_name': u'Jonathan Chase'}, {u'author_order': 2, u'affiliation': u'School of Information Systems, Singapore Management University, Singapore', u'full_name': u'Jiali Du'}, {u'author_order': 3, u'affiliation': u'School of Information Systems, Singapore Management University, Singapore', u'full_name': u'Na Fu'}, {u'author_order': 4, u'affiliation': u'School of Information Systems, Singapore Management University, Singapore', u'full_name': u'Truc Viet Le'}, {u'author_order': 5, u'affiliation': u'School of Information Systems, Singapore Management University, Singapore', u'full_name': u'Hoong Chuin Lau'}] 2017 IEEE Symposium Series on Computational Intelligence (SSCI), None

In a security-conscious world, and with the rapid increase in the global urbanized population, there is a growing challenge for law enforcement agencies to efficiently respond to emergency calls. We consider the problem of spatially and temporally optimizing the allocation of law enforcement resources such that the quality of service (QoS) in terms of emergency response time can be guaranteed. ...


Towards a Breakthrough Speaker Identification Approach for Law Enforcement Agencies: SIIP

[{u'author_order': 1, u'affiliation': u'Airbus, Elancourt, France', u'full_name': u'Khaled Khelif'}, {u'author_order': 2, u'affiliation': u'Airbus, Elancourt, France', u'full_name': u'Yann Mombrun'}, {u'author_order': 3, u'affiliation': u'SAIL Labs., Vienna, Austria', u'full_name': u'Gerhard Backfried'}, {u'author_order': 4, u'affiliation': u'INTERPOL, Lyon, France', u'full_name': u'Farhan Sahito'}, {u'author_order': 5, u'affiliation': u'NUANCE, Turin, Italy', u'full_name': u'Luca Scarpato'}, {u'author_order': 6, u'affiliation': u'IDIAP, Martigny, Switzerland', u'full_name': u'Petr Motlicek'}, {u'author_order': 7, u'affiliation': u'IDIAP, Martigny, Switzerland', u'full_name': u'Srikanth Madikeri'}, {u'author_order': 8, u'affiliation': u'Data Fusion Int., Dublin, Ireland', u'full_name': u'Damien Kelly'}, {u'author_order': 9, u'affiliation': u'VERINT, Herzliya, Israel', u'full_name': u'Gideon Hazzani'}, {u'author_order': 10, u'affiliation': u'SingularLogic, Athens, Greece', u'full_name': u'Emmanouil Chatzigavriil'}] 2017 European Intelligence and Security Informatics Conference (EISIC), None

This paper describes SIIP (Speaker Identification Integrated Project) a high performance innovative and sustainable Speaker Identification (SID) solution, running over large voice samples database. The solution is based on development, integration and fusion of a series of speech analytic algorithms which includes speaker model recognition, gender identification, age identification, language and accent identification, keyword and taxonomy spotting. A full integrated ...


An optimal allocation method of law enforcement monitoring based on the saptio-temporal evolution of land use

[{u'author_order': 1, u'affiliation': u'Wuhan Land Resources and Planning Information Center, Wuhan, Hubei, China', u'full_name': u'Rumin Wang'}, {u'author_order': 2, u'affiliation': u'Wuhan Land Resources and Planning Bureau, Wuhan, Hubei, China', u'full_name': u'Mingjun Peng'}, {u'author_order': 3, u'affiliation': u'Wuhan Land Resources and Planning Information Center, Wuhan, Hubei, China', u'full_name': u'Xizi Wu'}, {u'author_order': 4, u'affiliation': u'Wuhan Land Resources and Planning Law Enforcement Detachment, Wuhan, Hubei, China', u'full_name': u'Xin Xu'}, {u'author_order': 5, u'affiliation': u'Wuhan Land Resources and Planning Information Center, Wuhan, Hubei, China', u'full_name': u'Bo Zhu'}] 2017 25th International Conference on Geoinformatics, None

Law enforcement monitoring plays a significant role in preventing and forbidding illegal land use behavior, and provide an efficient method for promoting orderly use of land resources and arable land conservation. In order to optimize the efficiency of law enforcement monitoring, spatial analyzing techniques are adopted to calculate the dynamic change extent of land cover, comprehensive land use degree and ...


More Xplore Articles

Educational Resources on Law Enforcement

Back to Top

eLearning

No eLearning Articles are currently tagged "Law Enforcement"

IEEE.tv Videos

Speaker Deepak Maheshwari - ETAP San Jose 2015
The Future of Semiconductor: Moore's Law Plus - IEEE Rebooting Computing Industry Summit 2017
Gender-Based Occupational Stereotypes: New Behaviors, Old Attitudes - Carolyn Matheus & Elizabeth Quinn - IEEE WIE Forum USA East 2017
From the Quantum Moore's Law toward Silicon Based Universal Quantum Computing - IEEE Rebooting Computing 2017
End of Moore's Law Challenges and Opportunities: Computer Architecture Perspectives: IEEE Rebooting Computing 2017, Margaret Martonosi
Care Innovations: Responsibility For Being Green (com legendas em portugues)
Panel Discussion: RegionaI Issues and Developments Related to Internet Governance, Cybersecurity and Privacy - ETAP Tel Aviv 2015
What Will Carry the Industry Beyond the Tradition of Moore's Law? - IEEE Rebooting Computing Industry Summit 2017
Did You Know: Eric Schmidt is HKN
Forensic Metrology: Introduction for Use in Law/Justice - Tutorial by Veronica Scotti
Computing Beyond Moore's Law - William Vanderlinde: 2016 International Conference on Rebooting Computing
Seven (Small) Steps to Protecting Big Trade Secrets and Confidential Information, Part 1 - IEEE USA
Interview with Marcel J.M. Pelgrom - The Pelgrom Law: IEEE Gustav Robert Kirchhoff Award Recipient
Yesterday, Today and the Next Decade ? James Whittaker, Microsoft
Q&A with Tom Conte: IEEE Rebooting Computing Podcast, Episode 1
Going Beyond Moore's Law: IEEE at SXSW 2017
Intellectual Property Law Primer - Tyson Benson (2014-HKN-SLC)
Inspiring Brilliance: The Impact of Maxwell's Demon on Information Theory and Computing
Q&A with Dejan Milojicic: IEEE Rebooting Computing Podcast, Episode 9
IEEE Medal of Honor Recipient (2008): Dr. Gordon Moore

IEEE-USA E-Books

  • RFID Technology in Homeland Security, Law Enforcement, and Corrections

    This chapter contains sections titled: Introduction RFID Technology in Homeland Security RFID in Law Enforcement RFID Use in Law Enforcement-- Looking to the Future RFID Technology in Corrections

  • Law Enforcement

    This chapter contains sections titled: Enforcement or Harassment?, Typical Examples of Harassment by Police, Quandary for Police, Proper Enforcement Policy: Enforce the Traffic Laws, Bicycles as Vehicles, Psychological Considerations, Bicycle Patrols, Public Support and Public Information, Answering Public Concerns, The Link Between Enforcement and Education, Penalties for Violations by Cyclists, Effect of Conviction Upon Driver's License, Treatment of Violations by Children

  • Law Enforcement

    This chapter contains sections titled: The Function of Law Enforcement: Solution versus Prevention, A Brief History of the Police, The Use of Wiretaps in Law Enforcement, Wiretaps and Their Relatives, Electronic Surveillance in Context, Blurring the National Security/Law Enforcement Distinction

  • Encryption, Law Enforcement, and Privacy

  • They Came by Boat: The 2008 Terrorist Attack on Mumbai

    Since the 1980s, militancy in Kashmir has been a particular source of discord between India and Pakistan. The three major terrorist groups active in Kashmir include Harakat ul‐Mujahideen; Jaish‐e‐Mohammed; and Lashkar‐e‐Taiba. On November 23, 2008, a group of 10 Pakistani young men and unleashed terrorist attacks using machine guns and grenades on seven locations around Mumbai, killing approximately 173 people and injuring 293 over the next 3 days. The Mumbai attacks were unique because collectively, the event caused a transnational crisis, claiming lives of Indians as well as people of various nationalities who were especially targeted; the attacks were perpetrated on multiple high profile, elite locations in Mumbai; they unfolded live on television; the attacks were carried out by terrorists under the close guidance of handlers in Pakistan. The stakeholders who were impacted are described and the strategies and tactics adopted by some as response to the crisis are examined.

  • Dealing with Political and Cultural Crisis in a Troubled Middle East Region

    This chapter examines the political, economic, and cultural crisis in Egypt, which has led to protesters expressing their grievance through violence that is met with state brutality. The fragile political scene might have also been aggravated by the role played by families of local tribes who submit themselves to the dictates of the ruling regime in exchange for influence. The chapter moves beyond the euphoria of political changes in Egypt into a contextual analysis. It provides clarity to the underlying and short‐term socioeconomic reasons for military intervention. The chapter describes the group‐think structure of Egyptian society and the changing social contract, explaining the growing sense of polarization and radicalism as a cultural reservoir. It also clarifies the role of technology and social media in the political fluidity in Egypt. The political climate and cultural crisis can be tracked to many issues of economic failure and political stagnation.

  • Public Protection and Disaster Relief Communications

    The public protection and disaster relief (PPDR) sector brings essential value to society by creating a stable and secure environment to maintain law and order and to protect the life and values of citizens. One important task of PPDR services is to deal with emergency and surveillance situations on land, sea and air. The most important part of this work is done in the field, so all the tools must match the needs accordingly. This chapter provides a comprehensive vision of operational aspects concerning PPDR communications that includes a categorization of PPDR operational scenarios, a description of a generic operational framework, the identification of main components and communications' reference points and the identification of current and expected communications services that are central to PPDR operations. The chapter also describes the main communications technologies and systems currently in use for the delivery of the communications services needed for PPDR operations.

  • Group Communication Over LTE

    This chapter provides details of group communication services as specified in 3GPP Release 12. This includes the architectural framework adopted for unicast and broadcast delivery of voice and data in order to effectively support group communication. It also highlights different use cases and how group communication solutions apply for these use cases.

  • Emergency Calling

    This chapter contains sections titled: Overview Infrastructure Requirements The Role of Location Information References

  • Introduction

    Computer vision is playing an increasingly vital role in three broad areas of intelligent transportation systems: law enforcement, traffic efficiency, and driver safety. This chapter introduces the reader to key applications in each of these domains, whetting the appetite for deeper exploration in subsequent chapters. A basic computer vision pipeline for roadway transportation systems is presented, which serves as an encompassing framework for the techniques presented in the text. The pipeline comprises the modules of image and video acquisition, data preprocessing, feature extraction, inference, and feedback. Each module is summarized in terms of basic concepts, opportunities, and challenges. In addition, a systemic approach is encouraged that exploits interactions among the modules and optimizes the entire pipeline in a holistic manner.



Standards related to Law Enforcement

Back to Top

Standard for Common Incident Management Message Sets for Use by Emergency Management Centers

This standard is the Base Standard for a family of related standards that address the intercommunication needs of emergency management centers and other types of centers engaged in transportation incident management. Incident in this standard includes information concerning any transportation-related event that is received by the emergency management system, including planned roadway closures and special events, whether or not the ...