SUCHE
Inhaltstyp
Kategorien
-
CREDENTIAL kick-off meeting
meeting took place in Vienna, Austria where all partners got together in order to discuss about the implementation of the action and to define next steps and goals. CREDENTIAL is a EU Horizon 2020 funded research [...] level of security than other current solutions. The main idea and ambition of CREDENTIAL is to enable end-to-end security and improved privacy in cloud identity management services for managing secure [...] these services relies on the combination of strong hardware-based multi-factor authentication with end-to-end encryption representing a significant advantage over current password-based authentication schemes
-
Best Paper Award at "ICQNM 2014 - The Eighth International Conference on Quantum, Nano/Bio, and Micro Technologies"
Nano/Bio, and Micro Technologies", which took place from 16th to 20th of November in Lisboa, Portugal. Our experts also were invited to publish an extended version of the paper in the "International [...] result, we show that the adversary’s information can be reduced to an amount of I_AE~ 0.20752 when using a single basis transformation and to an amount of I_AE~ 0.0548 when combining two different basis [...] tions as a security measure for quantum key distribution protocols based on entanglement swapping. To estimate the security, we focus on the information an adversary obtains on the raw key bits from a
-
AIT lecture at MedicineX in Stanford
at least once a year. In order to develop an individualized fall prevention strategy for older people living in the community, the first step is to assess their fall risk to determine the starting points [...] advance the practice of medicine, improve health, and empower patients to be active participants in their own care. The “X” is meant to encourage thinking beyond numbers and trends—it represents the infinite [...] work focuses on the feasibility of a self-assessment fall prediction, prevention and feedback approach to empower older people living at home.About Stanford Medicine X Medicine X is a catalyst for new ideas
-
PRISMACLOUD - PRIvacy and Security MAintaining services in the CLOUD
methods to practical application to improve the security and privacy of cloud based services and make them usable for providers and users. The main idea and ambition of PRISMACLOUD is to enable end-to-end [...] security for cloud users and to provide tools to protect user privacy with the best technical means possible - by cryptography. To make this vision come true, PRISMACLOUD plans innovation in the fields [...] their own data, but hand them over to external untrusted parties, i.e. cloud service providers, for processing and storage. Currently there exist no satisfactory approaches to protect data during its lifetime
-
Project kick-off meeting: SECCRIT
The goal of the SECCRIT project is to analyse and evaluate cloud computing technologies with respect to security risks in sensitive environments, and consequently to develop methodologies, technologies [...] project kick-off. The SECCRIT project (SEcure Cloud computing for CRitical infrastructure IT) is a small-to-medium sized collaborative EU-funded research project in the 7th Framework Programme (FP7-SEC-2012-1) [...] infrastructures. At the kick-off meeting, there were lively discussions about the research challenges to be addressed by the project, which resulted in a productive and friendly atmosphere.You can find more
-
AIT at Annual Privacy Forum 2014
approach to take into account privacy concerns in the design of surveillance systems. The project builds a framework as a set of concepts, overarching principles, and knowledge relative to the social [...] aspects of surveillance, as well as concepts related to privacy-by-design and accountability-by-design. The framework will serve as a decision support basis to assist system designers and other stakeholders
-
ISD 2011 - A new AIT technology platform
r</b> (AIT Safety & Security Department) explained to the participants at the beginning of the event, the main focus of the symposium was to bring all stakeholders in the field of video surveillance [...] coexist with loose contact. The intention of the ISD is exactly to build bridges among the academic, the governmental and the industrial world and to establish contact. Exchange of scientific and technological [...] but many companies and end users have been starting to realize the complexity of the cognitive aspects of Computer Vision technology in addition to the complexity of the design and the engineering. Such
-
AIT publication in the International Journal "Neurophysiologie Clinique / Clinical Neurophysiology"
care patients needs to be evaluated time efficiently to maximize the treatment effect. A computational method will be presented that detects rhythmic and periodic patterns according to the critical care [...] care EEG terminology (CCET) of the American Clinical Neurophysiology Society (ACNS). The aim is to show that these detected patterns support EEG experts in writing neurophysiological reports. Materials and [...] patient the result of a review session using the EEG and the visualized pattern detections was compared to the original neurophysiology report. Read the full article here.
-
Best Paper Award at "SPIE Electronic Imaging Conference“ in San Francisco
result, we show that the adversary’s information can be reduced to an amount of I_AE~ 0.20752 when using a single basis transformation and to an amount of I_AE~ 0.0548 when combining two different basis [...] this year´s IS&T/SPIE International Conference on Electronic Imaging, which took place from 2nd to 6th of February in San Francisco.Paper abstractIn this article, we discuss the optimality of basis [...] tions as a security measure for quantum key distribution protocols based on entanglement swapping. To estimate the security, we focus on the information an adversary obtains on the raw key bits from a
-
AIT Keynote at Summer School in Dresden
Dresden was an exciting place from September 21 to 26, 2014, when the Interdisciplinary Summer School took place at the School of Humanities and Social Sciences at the TU in Dresden.Among some other high [...] Summer School had been focusing on the subject of “Inclusive Innovations in Health Care” and according to this, Peter Kastner was talking in his lecture about “The Internet of Things 4 pHealth”. The workshop [...] workshop on the following question: “Which kind of information sources and parameters should be included to improve the prediction of risk for worsening of heart failure and why?”The group picture only gives
-
AIT Austrian Institute of Technology key partner in MBAT (Combined Model-based Analysis and Testing of Embedded Systems)
has set itself the goal to develop efficient and cost-saving methods and tools that guarantee that these requirements are met. Many complex tests and analyses have to be executed to ascertain that the developed [...] requirements. All possible sources of errors have to be identified and removed. Static analysis techniques adopt mathematical methods and principles to analyze an abstract design specification of a system [...] institutes.Digital controllers are an essential part in modern transportation systems. They are necessary to provide the various state-of-the-art safety and usability functions. Since errors in these systems
-
Best Paper Awards for AIT
s all protocol messages on the public channel, our proposal is to authenticate the qubit stream already to verify the peer’s identity. To this end, we employ a second public channel that is physically [...] experts were venerated for the outstanding papers. Additionally, some of the AIT experts were invited to publish an extended version of the paper for the next conventions. ICQNM 2015: Best Paper Award for [...] tion" Awarded experts: Stefan Rass, Sandra König, Stefan SchauerAbstract:We describe a method to authenticate the qubit stream being exchanged during the first phases of the BB84 quantum key distribution
-
How do they know that?
It is a Digital Classics network which aims to interconnect scholarly resources from the domain of Ancient World research through the places they refer to. Pelagios also means 'of the sea', the superhighway [...] consortium considers appropriate for a digital resource that will connect references to ancient places.Pelagios is open to online content of any type and format, currently connecting data as diverse as text [...] ; arose out of a partnership between the BBC and the British Museum. The partnership then extended to museums across the UK who teamed up with the BBC in their area and selected over 1,000 objects from
-
SAIL Vienna 2035: Gerald Hüther gave a speech on co-creativity
project “Sargfabrik” with respect to requirements on assisting technologies.In front of project members and invited guests Hüther explained that the human brain is able to grow and develop even at an advanced [...] On February 23rd Gerald Hüther, a German neurobiologist, was invited to talk about how social relations enhance a positive evolvement of unlimited potentials of our brain during our life as a whole. Thus [...] the heart and thereby stimulating the brains of the speakers. His speech was part of the programme to kick off Innovation Systems’ latest AAL- and Foresight-project SAIL Vienna 2035. With the help of a
-
7th Conference of Public Safety Communication Europe
Member States to play a central role in shaping security research on the EU-level during FP7. It was acknowledged that now, at the dawning of Horizon 2020, Austria is looking forward to a new chapter in [...] Communication Europe is to foster, by consensus building, excellence in the development and use of public safety communications and information management systems as well as to improve the provision of [...] 2013, PSCE organised already its 7th biannual conference since its transformation from the FP6 project to an independent association in 2009. Held in Brussels, the conference was built up on 5 thematic pillars
-
YEAR Annual Conference: Open Science in Horizon 2020
strategies and train the young researchers to integrate those with their research workflows. Call for project ideas: We kindly invite our young researchers to submit a project idea for the workshop on the [...] Management course. Registration and the call for project ideas are still open. We are looking forward to seeing you in Espoo in May! For more information, please contact Michela Vignoli or Axelle Gasne.
-
Best Paper Award auf internationaler Bildverarbeitungskonferenz CVPR geht an AIT
information with a high dynamic range (HDR) and in real-time within a natural environment to allow timely respond to scene dynamics.... Nährere Informationen zum Paper finden Sie hier. [...] area surveillance applications often require vision-based systems enabling 3D 360° panoramic vision to provide enhanced capabilities like autonomous navigation, localization, mapping, exploration or environment
-
HyRiM End User Workshop
the official dinner the attendees had the chance to exchange further ideas and discuss possible future collaborations among research projects in order to bring risk and security management on a higher level [...] November 2015 experts from academia and industry from different European countries had the opportunity to discuss about new approaches towards the security and risk assessment for utility providers in a very [...] utility networks and smart grids. Except of the presentations, the participants had the opportunity to discuss with a panel consisting of academia and industry experts about future challenges and potential
-
1st Short-term Visual Object Tracking Challenge in Sydney successfully accomplished
tracking methods. To address this issue, AIT co-organized the Visual Object Tracking (VOT) workshop in conjunction with ICCV2013. Researchers from academia as well as industry were invited to participate in [...] recent surge in the number of publications on tracking-related problems have made it almost impossible to follow the developments in the field. One of the reasons is that there is a lack of commonly accepted
-
Applied Quantum Cryptography - Chinese edition!
Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely novel technology. Only a few years ago quantum cr [...] n or QKD left the laboratories and was picked up by more practical-oriented teams that worked hard to develop a practically applicable technology out of the astonishing results of basic research. One major [...] Commission that aimed at combining quantum physics with complementary technologies that are necessary to create a technical solution: electronics, software, and network components. The book “Applied