Criminal law

View this topic in
Criminal law, or penal law, is the body of law that relates to crime. It might be defined as the body of rules that defines conduct that is prohibited by the state because it is held to threaten, harm or otherwise endanger the safety and welfare of the public, and that sets out the punishment to be imposed on those who breach these laws. (Wikipedia.org)






Conferences related to Criminal law

Back to Top

2019 14th IEEE Conference on Industrial Electronics and Applications (ICIEA)

Artificial Intelligence, Control and Systems, Cyber-physical Systems, Energy and Environment, Industrial Informatics and Computational Intelligence, Robotics, Network and Communication Technologies, Power Electronics, Signal and Information Processing


2019 IEEE 49th International Symposium on Multiple-Valued Logic (ISMVL)

Multiple-Valued Logic has many aspects. This yearly event attracts researchers in this area.

  • 2018 IEEE 48th International Symposium on Multiple-Valued Logic (ISMVL)

    The Conference will bring together researchers from computer science, engineering, mathematics, and further disciplines to discuss new developments and directions for future research in the area of multi-valued logic and related fields. Research papers, surveys, or tutorial papers on any subject in these areas are within the scope of the symposium.

  • 2017 IEEE 47th International Symposium on Multiple-Valued Logic (ISMVL)

    The symposium encompasses all aspects of multiple-valued logic and application.

  • 2016 IEEE 46th International Symposium on Multiple-Valued Logic (ISMVL)

    Multiple-valued logic (MVL) is the study of circuits, oftware, architectures, and systems in which information is carried by more than two values, or where information is presented in unconventional, i.e., non-binary-weighted ways. The scope of ISMVL covers a broad range of related topics, including fundamental algebra, theory and philosophy, logic synthesis, decision diagrams, reversible computing, quantum computing, microelectronic circuits, testing andverification, architectures, and modelling of novel devices, all within a multiple-valued framework.

  • 2015 IEEE International Symposium on Multiple-Valued Logic (ISMVL)

    Multiple-valued logic (MVL) is the study of circuits, software, architectures, and systems in which information is carried by more than two values, or where information is represented in unconventional, i.e., non-binary-weighted ways. The scope of ISMVL covers a broad range of related topics, including fundamental algebra, theory and philosophy, logic synthesis, decision diagrams, reversible computing, quantum computing, microelectronic circuits, testing and verification, architectures, and modelling of novel devices, all within a multiple-valued framework.

  • 2014 IEEE 44th International Symposium on Multiple-Valued Logic (ISMVL)

    The aim of the conference is to present and disseminate knowledge in the areas related to multiple-valued logic, that is, to computing that is tolerant of imprecision, uncertainty, partial truth, and approximative reasoning. Specific topics include (but are not limited to):- Algebra and Formal Aspects- Automatic Test Pattern Generation- Automatic Reasoning- Boolean Satisfiability- Circuit/Device Implementation- Communication Systems- Computer Arithmetic- Data Mining- Fuzzy Systems and Soft Computing- Image Processing- Logic Design and Switching Theory- Logic Programming- Machine Learning and Robotics- Mathematical Fuzzy Logic- Nanotechnology- Philosophical Aspects- Quantum Computing- Quantum Cryptography- Reversible Computation- Signal Processing- Spectral Techniques- Verification

  • 2013 IEEE 43rd International Symposium on Multiple-Valued Logic (ISMVL)

    ISMVL is the principal annual meeting for the dissemination and discussion of research in multiple-valued logic and related areas. Topics cover all aspects of theory, implementation and application.

  • 2012 IEEE 42nd International Symposium on Multiple-Valued Logic (ISMVL)

    ISMVL is the principal annual meeting for the dissemination and discussion of research in multiple-valued logic and related areas. Topics cover all aspects of theory, implementation and application.

  • 2011 IEEE 41st International Symposium on Multiple-Valued Logic (ISMVL)

    areas of multiple-valued logic, including but not limited to: Algebra and Formal Aspects, ATPG and SAT, Automatic Reasoning, Circuit/Device Implementation, Communication Systems, Computer Arithmetic, Data Mining, Fuzzy Systems and Soft Computing, Image Processing, Logic Design and Switching Theory, Logic Programming Machine Learning and Robotics, Mathematical Fuzzy Logic, Nano Technology, Philosophical Aspects Quantum Computing, Signal Processing, Spectral Techniques, Verification.

  • 2010 40th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2010)

    The Multiple-Valued Logic Technical Committee of the IEEE Computer Society will hold its 40th annual symposium on May 26-28, 2010 in Casa Convalesc ncia, Barcelona, Spain. The event is sponsored by the IEEE Computer Society, and is organized by the Artificial Intelligence Research Institute of the Spanish National Research Council (IIIA-CSIC), the University of Barcelona, the Autonomous University of Barcelona, and the University of Lleida.

  • 2009 39th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2009)

    The area of multiple-valued logic is covered, including but not limited to: Algebra and Formal Aspects, Automatic Reasoning, Logic Programming, Philosophical Aspects, Fuzzy Logic and Soft Computing, Data Mining, Machine Learning and Robotics, Quantum Computing, Logic Design and Switching Theory, Test and Verification, Spectral Techniques, Circuit/Device Implementation, VLSI Architecture, VLSI Computing, System-on-Chip Technology, Nano Technology.

  • 2008 38th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2008)

    The aim of ISMVL is to publish and disseminate knowledge in the field of multiple-valued logic and related areas. All aspects of MVL are considered at the symposium, ranging form algebra, formal aspects, and philosophy to logic design, verification, and circuit implementation.

  • 2007 37th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2007)

  • 2006 36th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2006)

  • 2005 35th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2005)


2019 IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC)

The aim of IEEE ITAIC 2019 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in Information Technology and Artificial Intelligence. It provides opportunities for the delegates to exchange new ideas and application experiences, to establish business or research relations and to find global partners for future collaboration.

  • 2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference (ITAIC)

    The aim objective of ITAIC 2014 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in Information Technology and Artificial Intelligence. This conference provides opportunities for the delegates to exchange new ideas and application experiences face to face, to establish business or research relations and to find global partners for future collaboration.

  • 2011 6th IEEE Joint International Information Technology and Artificial Intelligence Conference (ITAIC)

    The aim objective of ITAIC 2011 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in Information Technology and Artificial Intelligence. This conference provides opportunities for the delegates to exchange new ideas and application experiences face to face, to establish business or research relations and to find global partners for future collaboration.


2019 IEEE International Conference on Systems, Man and Cybernetics (SMC)

2019 IEEE International Conference on Systems, Man, and Cybernetics (SMC2019) will be held in the south of Europe in Bari, one of the most beautiful and historical cities in Italy. The Bari region’s nickname is “Little California” for its nice weather and Bari's cuisine is one of Italian most traditional , based of local seafood and olive oil. SMC2019 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report up-to-the-minute innovations and developments, summarize state­of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems and cybernetics. Advances have importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience, and thereby improve quality of life.


2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)

The conference solicits experimental and theoretical works on social network analysis and mining along with their application to real life situations.

  • 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)

    The conference solicits experimental and theoretical works on social network analysis and mining along with their application to real life situations.

  • 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)

    social networks and mining

  • 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)

    The conference will consider papers in all areas of social networks and mining. In recent years, social network research has advanced significantly; the development of sophisticated techniques for Social Network Analysis and Mining (SNAM) has been highly influenced by the online social Web sites, email logs, phone logs and instant messaging systems, which are widely analyzed using graph theory and machine learning techniques. People perceive the Web increasingly as a social medium that fosters interaction among people, sharing of experiences and knowledge, group activities, community formation and evolution. This has led to a rising prominence of SNAM in academia, politics, homeland security and business. This follows the pattern of known entities of our society that have evolved into networks in which actors are increasingly dependent on their structural embedding.

  • 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)

    The international conference on Advances in Social Network Analysis and Mining (ASONAM 2015) will primarily provide an interdisciplinary venue that will bring together practitioners and researchers from a variety of SNAM fields to promote collaborations and exchange of ideas and practices. ASONAM 2015 is intended to address important aspects with a specific focus on the emerging trends and industry needs associated with social networking analysis and mining. The conference solicits experimental and theoretical works on social network analysis and mining along with their application to real life situations.

  • 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)

    The IEEE/ACM International Conference on Advances in Social Network Analysis and Mining (ASONAM) provides a premier interdisciplinary forum to bring together researchers and practitioners from all social networking analysis and mining related fields for presentation of original research results, as well as exchange and dissemination of innovative, practical development experiences. ASONAM 2014 seeks to address important challenging problems with a specific focus on the emerging trends and industry needs associated with social networking analysis and mining. The conference solicits experimental and theoretical findings along with their real-world applications. General areas of interest to ASONAM 2014 include the design, analysis and implementation of social networking theory, systems and applications from computer science, mathematics, communications, business administration, sociology, psychology, anthropology, applied linguistics, biology and medicine.

  • 2013 International Conference on Advances in Social Networks Analysis and Mining (ASONAM)

    People perceive the Web increasingly as a social medium that fosters interaction among people, sharing of experiences and knowledge, group activities, community formation and evolution. This has led to a rising prominence of Social Network Analysis and Mining (SNAM) in academia, politics, homeland security and business. The 2013 international conference on Advances in Social Network Analysis and Mining (ASONAM-13 will primarily provide an interdisciplinary venue brings together practitioners and researchers from a variety of SNAM fields to promote collaborations and exchange of ideas and practices. The conference will address important aspects with a specific focus on the emerging trends and industry needs associated with social networking analysis and mining. The conference solicits experimental and theoretical works on social network analysis and mining with their application to real life situations.

  • 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)

    In recent years, social network research has advanced significantly; the development of sophisticated techniques for Social Network Analysis and Mining (SNAM) has been highly influenced by the online social Web sites, email logs, phone logs and instant messaging systems, which are widely analyzed using graph theory and machine learning techniques. People perceive the Web increasingly as a social medium that fosters interaction among people, sharing of experiences and knowledge, group activities, community formation and evolution. This has led to a rising prominence of SNAM in academia, politics, homeland security and business.

  • 2011 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2011)

    The international conference on Advances in Social Network Analysis and Mining (ASONAM 2011) will primarily provide an interdisciplinary venue that will bring together practitioners and researchers from a variety of SNAM fields to promote collaborations and exchange of ideas and practices. ASONAM 2011 is intended to address important aspects with a specific focus on the emerging trends and industry needs associated with social networking analysis and mining. The conference solicits experimental and theoreti

  • 2010 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2010)

    The international conference on Advances in Social Network Analysis and Mining (ASONAM 2010) will primarily provide an interdisciplinary venue that will bring together practitioners and researchers from a variety of SNAM fields to promote collaborations and exchange of ideas and practices. ASONAM 2010 is intended to address important aspects with a specific focus on the emerging trends and industry needs associated with social networking analysis and mining. The conference solicits experimental and theoreti

  • 2009 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2009)

    In recent years, social network research has advanced significantly; the development of sophisticated techniques for Social Network Analysis and Mining (SNAM) has been highly influenced by the online social websites, email logs, phone logs and instant messageing systems, which are widely analyzed using graph theory and machine learning techniques. People perceive teh web increasingly as a social medium that fosters interaction among people, sharing of experiences and knowledge, group activities, community


More Conferences

Periodicals related to Criminal law

Back to Top

Antennas and Wireless Propagation Letters, IEEE

IEEE Antennas and Wireless Propagation Letters (AWP Letters) will be devoted to the rapid electronic publication of short manuscripts in the technical areas of Antennas and Wireless Propagation.


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computer Graphics and Applications, IEEE

IEEE Computer Graphics and Applications (CG&A) bridges the theory and practice of computer graphics. From specific algorithms to full system implementations, CG&A offers a strong combination of peer-reviewed feature articles and refereed departments, including news and product announcements. Special Applications sidebars relate research stories to commercial development. Cover stories focus on creative applications of the technology by an artist or ...


Dependable and Secure Computing, IEEE Transactions on

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...


Engineering in Medicine and Biology Magazine, IEEE

Both general and technical articles on current technologies and methods used in biomedical and clinical engineering; societal implications of medical technologies; current news items; book reviews; patent descriptions; and correspondence. Special interest departments, students, law, clinical engineering, ethics, new products, society news, historical features and government.


More Periodicals

Most published Xplore authors for Criminal law

Back to Top

Xplore Articles related to Criminal law

Back to Top

On China's Multi-objective Legal System of Terrorist Emergency Control

2011 Fourth International Joint Conference on Computational Sciences and Optimization, 2011

Terrorism is a serious crime that with its systematic schemes brings devastating impact on all nations in the world and its development in a wider range with more destructiveness and international complexity than ever requires a shift from the previous single-objective mode of optimum determination to a mode with multiple objectives for optimum and satisfactory determination. It remains at present ...


Matching Forensic Sketches and Mug Shots to Apprehend Criminals

Computer, 2011

Emerging face recognition technology can use forensic sketches to help identify criminal suspects.


Automated Detection of Hate Speech towards Woman on Twitter

2018 3rd International Conference on Computer Science and Engineering (UBMK), 2018

Given the steadily growing body of social media content, hate speech towards women is increasing. Such kind of contents have the potential to cause harm and suffering on an individual basis, and they may lead to social tension and disorder beyond cyber space. To support the automatic detection of cyber hate online, specifically on Twitter, we build a supervised learning ...


An explanation of the sentencing of willful and malicious injury crime based on inference rules

2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE), 2017

In the criminal law of all countries, the crime of willful and malicious injury is a common accusation. The offender must bear the criminal responsibility and be punished by criminal penalty. However, because of the complexity of the circumstances for adjudication, the various kinds of statutory sentence, and the wide extent of the fixed-term imprisonment, the sentencing imbalance can be ...


How to regulate computer crime in America criminal law

2011 International Conference on Computer Science and Service System (CSSS), 2011

American is not only the birthplace of the computer and the internetwork, but also the most developed country in the world Internet at present. It is more perfect in computer crime legislation in American than the other countries. There are federal law and single law in federation, as well, law is issued in States. Protection of legal interests is extensive. ...


More Xplore Articles

Educational Resources on Criminal law

Back to Top

IEEE.tv Videos

Is Your Algorithm Dangerous? Lyria Bennett Moses - Ignite: Sections Congress 2017
The Future of Semiconductor: Moore's Law Plus - IEEE Rebooting Computing Industry Summit 2017
End of Moore's Law Challenges and Opportunities: Computer Architecture Perspectives: IEEE Rebooting Computing 2017, Margaret Martonosi
From the Quantum Moore's Law toward Silicon Based Universal Quantum Computing - IEEE Rebooting Computing 2017
What Will Carry the Industry Beyond the Tradition of Moore's Law? - IEEE Rebooting Computing Industry Summit 2017
Did You Know: Eric Schmidt is HKN
Computing Beyond Moore's Law - William Vanderlinde: 2016 International Conference on Rebooting Computing
Panel Discussion: RegionaI Issues and Developments Related to Internet Governance, Cybersecurity and Privacy - ETAP Tel Aviv 2015
Q&A with Tom Conte: IEEE Rebooting Computing Podcast, Episode 1
Going Beyond Moore's Law: IEEE at SXSW 2017
Seven (Small) Steps to Protecting Big Trade Secrets and Confidential Information, Part 1 - IEEE USA
Speaker Deepak Maheshwari - ETAP San Jose 2015
Inspiring Brilliance: The Impact of Maxwell's Demon on Information Theory and Computing
Interview with Marcel J.M. Pelgrom - The Pelgrom Law: IEEE Gustav Robert Kirchhoff Award Recipient
Yesterday, Today and the Next Decade ? James Whittaker, Microsoft
IRDS: Beyond CMOS & Emerging Research Materials - Shamik Das at INC 2019
Q&A with Dejan Milojicic: IEEE Rebooting Computing Podcast, Episode 9
IEEE Medal of Honor Recipient (2008): Dr. Gordon Moore
A Conversation with... Wendell Wallach: IEEE TechEthics
Q&A with Stan Williams: IEEE Rebooting Computing Podcast, Episode 6

IEEE-USA E-Books

  • On China's Multi-objective Legal System of Terrorist Emergency Control

    Terrorism is a serious crime that with its systematic schemes brings devastating impact on all nations in the world and its development in a wider range with more destructiveness and international complexity than ever requires a shift from the previous single-objective mode of optimum determination to a mode with multiple objectives for optimum and satisfactory determination. It remains at present still much room for an exploration of removal of terrorism in China.

  • Matching Forensic Sketches and Mug Shots to Apprehend Criminals

    Emerging face recognition technology can use forensic sketches to help identify criminal suspects.

  • Automated Detection of Hate Speech towards Woman on Twitter

    Given the steadily growing body of social media content, hate speech towards women is increasing. Such kind of contents have the potential to cause harm and suffering on an individual basis, and they may lead to social tension and disorder beyond cyber space. To support the automatic detection of cyber hate online, specifically on Twitter, we build a supervised learning model which is developed to classify cyber hate towards woman on Twitter. Turkish tweets, with a hashtag specific to choice of clothing for women, have been collected and five machine learning based classification algorithms were applied including Support Vector Machines (using polynomial and RBF Kernel), J48, Naive Bayes, Random Forest and Random Tree. Preliminary results showed that hateful contents can be detected with high precision however more sophisticated approaches are necessary to improve recall.

  • An explanation of the sentencing of willful and malicious injury crime based on inference rules

    In the criminal law of all countries, the crime of willful and malicious injury is a common accusation. The offender must bear the criminal responsibility and be punished by criminal penalty. However, because of the complexity of the circumstances for adjudication, the various kinds of statutory sentence, and the wide extent of the fixed-term imprisonment, the sentencing imbalance can be caused, such as different responsibility for same crime and different punishments for same responsibilities. In this paper, the penalty for the crime of willful and malicious injury is the main object of study, and some rules of sentencing reasoning are put forward to restrict the discretion of judges and to improve the impartiality and enforce-ability of punishment.

  • How to regulate computer crime in America criminal law

    American is not only the birthplace of the computer and the internetwork, but also the most developed country in the world Internet at present. It is more perfect in computer crime legislation in American than the other countries. There are federal law and single law in federation, as well, law is issued in States. Protection of legal interests is extensive. Crime subjective aspects different. The behavior way and object are abundant. Punishment assignment is reasonable. Which are features of computer crime in America criminal law.

  • Analogy making in criminal law with neural network

    This paper considers the problem of decision making by a Judge in case of murder cases. The paper describes the construction of decision system to be used by a Judge about to pass sentence in a murder case. The system is an Analogy making from examples. In law, analogy is used to resolve issues on which there is no previous authority. Analogies are drawn from precedent cases. The Judge finds that the facts of another case are similar to the one at hand to an extent that the analogous application of the rule established in the previous case is justified. In this paper a neural network is described for judgment in murder cases. The examples demonstrate how to model legal system analogous to recent decisions, first by learning a system with court decisions, and second, by analyzing, modeling and testing the decision making neural network.

  • Comparison of text-dependent speaker identification methods for short distance telephone lines using artificial neural networks

    The transition to democracy in South Africa has brought with it certain challenges. The main challenge is to get rid of crime and corruption. The paper presents a technique to combat white-collar crime in telephone transactions by identifying and verifying speakers using artificial neural networks (ANNs). Results are presented to show that speaker identification is feasible and this is illustrated with two different types of ANN architectures and with two different types of characteristic features as inputs to ANNs.

  • Representation of Chinese criminal law in the semantic web

    SBVR's Structured English (SSE) approach has been applied to deal with problems in the United States legal domain. However, the method has scarcely been applied in Chinese legal field. In this article, we adapt the SBVR Structured English approach for the Chinese Criminal Law and express the Chinese legal rules using semi-formal and formal knowledge representation and automate the transformation from vocabularies and rules in SBVR to vocabularies and rules. Based on the representation above, we also give the preliminary reasoning process of the justifiable defense. The representation and the preliminary reasoning process lay a solid foundation for the reasoning mechanism of Chinese Criminal Law.

  • Notice of Retraction<br>Research on judicial identification of contract fraud in real estate field

    In china, there are many writings involving the research of judicial identification on real estate contract fraud, however, few of them have been in-depth exploration and many of them lack the systematic research. This paper, from the aspect of constitutive elements of crime, crime and innocence, this crime and that crime, identification of the amount of crime and so on, combined with the specific circumstances of contract fraud in judicial practice, has made a more systematic exposition according to the principle of Civil and Commercial Law and Criminal Law with a view to benefit the criminal justice and theories.

  • Giving permission implies giving choice

    When we want to examine different kinds of forms of acts within the framework of the description of the Dutch criminal law, whether an act is permitted or not permitted, we can encounter a difference. On the one hand, it could be the case that a certain act is permitted by a competent normative authority. On the other hand, it could be the case that in the Dutch criminal law a certain act is weak permitted without a competent normative authority having enacted that permission. The article presents the formalisation of the weak and strong permission in deontic logic based on the logic of enactment. A permission that follows from the absence of a prohibition, we call a weak permission; this permission is not enacted. A strong permission is always enacted (implicitly or explicitly), and implies a giving choice. The distinction between these two types of permission is a consequence of the universality of a normative system by the closure rule: 'whatever is not forbidden, is permitted'.



Standards related to Criminal law

Back to Top

No standards are currently tagged "Criminal law"


Jobs related to Criminal law

Back to Top