2,552 resources related to Law Enforcement
- Topics related to Law Enforcement
- IEEE Organizations related to Law Enforcement
- Conferences related to Law Enforcement
- Periodicals related to Law Enforcement
- Most published Xplore authors for Law Enforcement
The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.
To promote awareness, understanding, advancement and application of ocean engineering and marine technology. This includes all aspects of science, engineering, and technology that address research, development, and operations pertaining to all bodies of water. This includes the creation of new capabilities and technologies from concept design through prototypes, testing, and operational systems to sense, explore, understand, develop, use, and responsibly manage natural resources.
HRI is a highly selective annual conference that showcases the very best research and thinking in human-robot interaction. HRI is inherently interdisciplinary and multidisciplinary, reflecting work from researchers in robotics, psychology, cognitive science, HCI, human factors, artificial intelligence, organizational behavior, anthropology, and many other fields.
The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2019, the 26th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.
International Geosicence and Remote Sensing Symposium (IGARSS) is the annual conference sponsored by the IEEE Geoscience and Remote Sensing Society (IEEE GRSS), which is also the flagship event of the society. The topics of IGARSS cover a wide variety of the research on the theory, techniques, and applications of remote sensing in geoscience, which includes: the fundamentals of the interactions electromagnetic waves with environment and target to be observed; the techniques and implementation of remote sensing for imaging and sounding; the analysis, processing and information technology of remote sensing data; the applications of remote sensing in different aspects of earth science; the missions and projects of earth observation satellites and airborne and ground based campaigns. The theme of IGARSS 2019 is “Enviroment and Disasters”, and some emphases will be given on related special topics.
The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.
The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...
Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
2010 International Conference on Computing, Control and Industrial Engineering, 2010
In the framework of optimal law enforcement theory, the existed literatures have analyzed the acts of selective law enforcement under the static conditions. In this paper, we use incomplete information dynamic game model to analyze the process of dynamic game between the enforcer and the potential offenders. The result shows that the potential offenders can get relevant enforcement information by ...
2011 Third International Conference on Multimedia Information Networking and Security, 2011
This article is discussing the Cyberspace Crime from the point of view to law enforcement. From the observation of this article, it indicates that the trans-bordering and hard-to-trace are two prominent characteristics in the field of Cyberspace Crime investigation. These two characteristics not only trigger the balance between assertion of jurisdiction and practicability of investigation but also raise the concern ...
2014 IEEE International Professional Communication Conference (IPCC), 2014
In recent years, design thinking and design research have proved indispensable in creating useful and usable solutions that both address human needs and create value for the client. Design research is the connective activity that helps us integrate specialized knowledge into meaningful solutions. We used a structured design process and various design research methods to facilitate the design and development ...
IEEE Security & Privacy, 2006
The Global System for Mobile (GSM) Communications Association reports that nearly 700 networks in more than 214 countries will have served 2 billion users. Unfortunately, the development of inexpensive mobile communications is also a source of new threats. In this issue's installment of-Crypto Corner, we review the handset-related methods law enforcement agencies use to gather evidence during criminal investigations. This ...
2012 IEEE International Conference on Intelligence and Security Informatics, 2012
A detective distributes information on a current case to his law enforcement peers. He quickly receives a computer generated response with leads identified within hundreds of thousands of previously distributed free text documents from thousands of other detectives. The challenges lie in the nature of free text - unstructured formats, confusing word usage, cut-andpaste additions, abbreviations, inserted html/xml tags, multimedia ...
Gender-Based Occupational Stereotypes: New Behaviors, Old Attitudes - Carolyn Matheus & Elizabeth Quinn - IEEE WIE Forum USA East 2017
The Future of Semiconductor: Moore's Law Plus - IEEE Rebooting Computing Industry Summit 2017
From the Quantum Moore's Law toward Silicon Based Universal Quantum Computing - IEEE Rebooting Computing 2017
End of Moore's Law Challenges and Opportunities: Computer Architecture Perspectives: IEEE Rebooting Computing 2017, Margaret Martonosi
Care Innovations: Responsibility For Being Green (com legendas em portugues)
What Will Carry the Industry Beyond the Tradition of Moore's Law? - IEEE Rebooting Computing Industry Summit 2017
Did You Know: Eric Schmidt is HKN
Panel Discussion: RegionaI Issues and Developments Related to Internet Governance, Cybersecurity and Privacy - ETAP Tel Aviv 2015
Computing Beyond Moore's Law - William Vanderlinde: 2016 International Conference on Rebooting Computing
Seven (Small) Steps to Protecting Big Trade Secrets and Confidential Information, Part 1 - IEEE USA
Interview with Marcel J.M. Pelgrom - The Pelgrom Law: IEEE Gustav Robert Kirchhoff Award Recipient
Yesterday, Today and the Next Decade ? James Whittaker, Microsoft
Q&A with Tom Conte: IEEE Rebooting Computing Podcast, Episode 1
Going Beyond Moore's Law: IEEE at SXSW 2017
Inspiring Brilliance: The Impact of Maxwell's Demon on Information Theory and Computing
Intellectual Property Law Primer - Tyson Benson (2014-HKN-SLC)
Q&A with Dejan Milojicic: IEEE Rebooting Computing Podcast, Episode 9
IEEE Medal of Honor Recipient (2008): Dr. Gordon Moore
IRDS: Beyond CMOS & Emerging Research Materials - Shamik Das at INC 2019
In the framework of optimal law enforcement theory, the existed literatures have analyzed the acts of selective law enforcement under the static conditions. In this paper, we use incomplete information dynamic game model to analyze the process of dynamic game between the enforcer and the potential offenders. The result shows that the potential offenders can get relevant enforcement information by observing, studying, and predicting the situations and modify their behaviors based on this information. These opportunistic behaviors not only bring the inefficient allocation of resources, but also damage the credibility and justice of the law.
This article is discussing the Cyberspace Crime from the point of view to law enforcement. From the observation of this article, it indicates that the trans-bordering and hard-to-trace are two prominent characteristics in the field of Cyberspace Crime investigation. These two characteristics not only trigger the balance between assertion of jurisdiction and practicability of investigation but also raise the concern of privacy issue in finding the identity of suspect. This article would like to conclude that, under the current technology and legal status quo, the degree for law enforcement within Cyberspace should not be substantially differentiated than that in the physical world. In order to achieve this purpose, to set up gateways within the territory and refuse to acknowledge the connection between the identity privacy and the fundamental human rights for freedom of speech within Cyberspace are worth serious thinking to the nations in the world.
In recent years, design thinking and design research have proved indispensable in creating useful and usable solutions that both address human needs and create value for the client. Design research is the connective activity that helps us integrate specialized knowledge into meaningful solutions. We used a structured design process and various design research methods to facilitate the design and development of a software and hardware solution for a federal law enforcement agency to automate and standardize the processing and collection of a certain type of evidence. The methods we used were crucial in gathering the necessary evidence and presenting a synthesized, meaningful picture of the problems at hand to the client. This in turn led to a highly effective and collaborative partnership that resulted in a high-value application that helped standardize the current state of practice and advanced the mission of the federal law enforcement agency in the realm of intelligence gathering.
The Global System for Mobile (GSM) Communications Association reports that nearly 700 networks in more than 214 countries will have served 2 billion users. Unfortunately, the development of inexpensive mobile communications is also a source of new threats. In this issue's installment of-Crypto Corner, we review the handset-related methods law enforcement agencies use to gather evidence during criminal investigations. This article's goal is twofold: explain how law enforcement agencies work and increase the user community's awareness of the digital footprints left by handsets
A detective distributes information on a current case to his law enforcement peers. He quickly receives a computer generated response with leads identified within hundreds of thousands of previously distributed free text documents from thousands of other detectives. The challenges lie in the nature of free text - unstructured formats, confusing word usage, cut-andpaste additions, abbreviations, inserted html/xml tags, multimedia content, and domain-specific terminology. This research proposes a new data structure, the semantic information structure, which encapsulates the extracted content information on classes of information such as people, vehicles, events, organizations, objects, and locations as well as the contextual information about the connections and measures to enable prioritization of files containing related pieces of content. The structure is organized to be a result of automated natural language processing methods that extract entities, expanded entity phrases and their links which are driven by ontologies, DLSafe rules, abductive hypotheses and semantic composition. Importance and significance measures aid in prioritization.
Can law enforcement agencies leverage open source to benefit the communities they serve? In some areas, recommending open source solutions is easy. In others, the arguments for open source solutions are less clear.
This paper presents INSPEC<sup>2</sup>T's<sup>1</sup> approach of designing and implementing a smart mobile application, part of a greater system (background services and supporting tools) emphasizing on its impact in day to day community policing operations and also in strategic decision making. Important aspects are: automation of processes, compliance to ethical and legal regulations, transparency in operations, user engagement.
By analyzing the contents of China's securities-related laws and the enforcement actions taken by China Securities Regulatory Commission, this paper argues that the legislation and enforcement of securities-related laws and the regulation of stock market are politicized by the ruling party and the government to promote their political agendas instead of investors' interests. This paper further shows that such politicization has caused some serious consequences for China's stock market and economic growth.
This paper explored the dilemma of anti-administrative monopoly in China and analyzed the reasons leading to dilemma such as legislation defects, conflict of policies, interest contest and function intercrossed among administrative branches, which challenge the enforcement of Anti-monopoly Law a lot. After the introduction of existing agencies and their power, the author put forward some suggestions to resolve this dilemma, focusing on institutional design that China should compose an independent and authoritative implementing agency.
Law enforcement monitoring plays a significant role in preventing and forbidding illegal land use behavior, and provide an efficient method for promoting orderly use of land resources and arable land conservation. In order to optimize the efficiency of law enforcement monitoring, spatial analyzing techniques are adopted to calculate the dynamic change extent of land cover, comprehensive land use degree and landscape pattern index, which reflect the spatio-temporal evolution trend of land use. In this paper, differentiating monitoring district evaluation division index system is established, and Advanced AHP method is applied to calculate index weight and divide monitoring areas. At last, Jiangxia district of Wuhan was set as the research area, which is divided into fast changing area, changing area, changing likely area and slowly changing area. Based on current land enforcement techniques including remote sensing, mobile vehicle enforcement, remote video surveillance and UAV monitoring, individualized monitoring strategies are projected for optimal selection of enforcement monitoring techniques, and to help increase enforcement efficiency and offer innovation approaches for land resources monitoring.
This standard is the Base Standard for a family of related standards that address the intercommunication needs of emergency management centers and other types of centers engaged in transportation incident management. Incident in this standard includes information concerning any transportation-related event that is received by the emergency management system, including planned roadway closures and special events, whether or not the ...
Telemetry Signals Analyst - Entry/Mid-Level
The National Security Agency
Postdoctoral Appointee - Scalable Algorithms and Software
Sandia National Laboratories
Experienced Research Staff in Data Analytics or Machine Learning
Sandia National Laboratories
R&D Materials Science - XPS/AFM/Surface Analysis Researcher (Experienced)
Sandia National Laboratories