SUCHE
Inhaltstyp
Kategorien
-
Best Paper Award at "ICQNM 2014 - The Eighth International Conference on Quantum, Nano/Bio, and Micro Technologies"
Nano/Bio, and Micro Technologies", which took place from 16th to 20th of November in Lisboa, Portugal. Our experts also were invited to publish an extended version of the paper in the "International [...] result, we show that the adversary’s information can be reduced to an amount of I_AE~ 0.20752 when using a single basis transformation and to an amount of I_AE~ 0.0548 when combining two different basis [...] tions as a security measure for quantum key distribution protocols based on entanglement swapping. To estimate the security, we focus on the information an adversary obtains on the raw key bits from a
-
AIT publication in the International Journal "Neurophysiologie Clinique / Clinical Neurophysiology"
care patients needs to be evaluated time efficiently to maximize the treatment effect. A computational method will be presented that detects rhythmic and periodic patterns according to the critical care [...] care EEG terminology (CCET) of the American Clinical Neurophysiology Society (ACNS). The aim is to show that these detected patterns support EEG experts in writing neurophysiological reports. Materials and [...] patient the result of a review session using the EEG and the visualized pattern detections was compared to the original neurophysiology report. Read the full article here.
-
AIT lecture in "Russian Alpbach"
"Tools, Technologies and Advances in Telemedicine" at the Open Innovations Forum from 14th to 16th of October in Moscow . The high-profile audience consisted of e.g. presidents and ministers from [...] top managers.About the ForumThe global discussion platform — Open Innovations Forum — is dedicated to emerging technologies and furthering innovation prospects and collaboration worldwide. Dmitry Medvedev
-
"Social Physics" als Grundlage für "Social Media"
festgehalten, welche Stimmlage für ein Gespräch verwendet wurde und auch, ob man sich durch ein Face-to-face-Gespräch oder durch ein Telefonat mitteilte. Pentland gab diese Badges unterschiedlichen Ar
-
Best Paper Award at "SPIE Electronic Imaging Conference“ in San Francisco
result, we show that the adversary’s information can be reduced to an amount of I_AE~ 0.20752 when using a single basis transformation and to an amount of I_AE~ 0.0548 when combining two different basis [...] this year´s IS&T/SPIE International Conference on Electronic Imaging, which took place from 2nd to 6th of February in San Francisco.Paper abstractIn this article, we discuss the optimality of basis [...] tions as a security measure for quantum key distribution protocols based on entanglement swapping. To estimate the security, we focus on the information an adversary obtains on the raw key bits from a
-
YEAR Annual Conference & AIT Award winner
Network, offered training and networking possibilities for young researchers with the focus on how to integrate Open Science in European Projects. The conference took place on 11-12 May in Espoo, Finland
-
New EU-Project CARONTE (“Creating an Agenda for Research ON Transportation sEcurity”) started
terrorism, theft, cyber-attacks or vandalism – and how to assess them? More crucially, how to develop the capabilities and situational awareness needed to guard against these in the future, while ensuring [...] sEcurity”) is now exploring these issues. “Policymakers need guidance for such questions in order to shape the EU’s Security Research agenda in this critical sector but respecting the importance of efficient [...] Fraunhofer, Germany’s leading applied research institute and CARONTE’s coordinator. “We’re now working to a tight timetable, but the composition of our research group is a strong one, and we’re confident the
-
AIT Austrian Institute of Technology key partner in MBAT (Combined Model-based Analysis and Testing of Embedded Systems)
has set itself the goal to develop efficient and cost-saving methods and tools that guarantee that these requirements are met. Many complex tests and analyses have to be executed to ascertain that the developed [...] requirements. All possible sources of errors have to be identified and removed. Static analysis techniques adopt mathematical methods and principles to analyze an abstract design specification of a system [...] institutes.Digital controllers are an essential part in modern transportation systems. They are necessary to provide the various state-of-the-art safety and usability functions. Since errors in these systems
-
AIT Vorträge auf dem International Symposium on Visual Computing (ISVC)
and are indication for further surface degradation right up to rail break. Due to security issues, defects have to be recognized early in order to take countermeasures in time. By means of differently colored [...] hypotheses in the EPI domain, which can directly be related to depth. The considered methods used in hypothesis assessment, which belong to a broader class of block-matching algorithms, are modified sum [...] by a shape-from-focus algorithm. A linear sharpness measure is shown to be computational advantageous as computational refocusing to a specific depth and sharpness assessment of each refocused image can
-
Second European expert meeting for Patient Blood Management (PBM) in Lisbon
adverse outcome due to anaemia, blood loss and transfusion, change is warranted. To close the gap between theory and clinical practice in the appropriate management of patients and to reduce the use of scarce [...] Project, launched by the Consumers, Health, Agriculture and Food Executive Agency (Chafea) to provide service to the European Commission DG SANTE. The Meeting was organized by Peter Kastner and Helga Peinsold [...] le investments and administrative efforts have been made to improve the safety of donor blood. However, measures and structural adjustments to broadly pre-empt and minimize blood usage have fallen short
-
New: The book Smart Cameras goes China 智能摄像机 (Smart Cameras in Chinese)
Germany, Dr. Belbachir presented the book and works on Smart Cameras at the 54. Forum edition, dedicated to embedded vision (http://www.bv-forum.de/rb/bvf54.html). In his talk, Dr. Belbachir presented background
-
Young European Associated Researchers (YEAR)
this last one is still to be decided, so don’t hesitate to send your inputs until 15 November to Caroline Lemeire, YEAR Chair at caroline.lemeire@vito.be.Looking further ahead to next year: In May 2014 [...] the next YEAR Workshop "from project idea to successful project proposal" will take place in Vienna. Once again, a YEAR Award will be given to the most promising participant. In September, in [...] successful YEAR workshop in Trondheim and a well-deserved Summer holiday, the YEAR Board is back on track to prepare the coming events. In November, there will be a seminar with the European Commission on Resource
-
PRISMACLOUD - PRIvacy and Security MAintaining services in the CLOUD
methods to practical application to improve the security and privacy of cloud based services and make them usable for providers and users. The main idea and ambition of PRISMACLOUD is to enable end-to-end [...] security for cloud users and to provide tools to protect user privacy with the best technical means possible - by cryptography. To make this vision come true, PRISMACLOUD plans innovation in the fields [...] their own data, but hand them over to external untrusted parties, i.e. cloud service providers, for processing and storage. Currently there exist no satisfactory approaches to protect data during its lifetime
-
Applied Quantum Cryptography - Chinese edition!
Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely novel technology. Only a few years ago quantum cr [...] n or QKD left the laboratories and was picked up by more practical-oriented teams that worked hard to develop a practically applicable technology out of the astonishing results of basic research. One major [...] Commission that aimed at combining quantum physics with complementary technologies that are necessary to create a technical solution: electronics, software, and network components. The book “Applied
-
eHealth 2016 - Call for Papers
from prediction to prevention”. Future ICT systems need to include methods of machine learning and predictive analytics in order to provide actionable information to health carers and to support preventive [...] platform for researchers, practitioners, decision makers and vendors to discuss innovative health informatics and eHealth solutions so as to improve the quality and efficiency of health care. A special topic
-
ISD 2011 - A new AIT technology platform
r</b> (AIT Safety & Security Department) explained to the participants at the beginning of the event, the main focus of the symposium was to bring all stakeholders in the field of video surveillance [...] coexist with loose contact. The intention of the ISD is exactly to build bridges among the academic, the governmental and the industrial world and to establish contact. Exchange of scientific and technological [...] but many companies and end users have been starting to realize the complexity of the cognitive aspects of Computer Vision technology in addition to the complexity of the design and the engineering. Such
-
Innovating Innovation - From Recycling to User Driven Innovation
Der einzige verlässliche Weg, sich heute einen Wettbewerbsvorteil gegenüber der Marktkonkurrenz zu verschaffen, ist permanente Innovation. Dieser Artikel erörtert die Hintergründe, warum technologis
-
YEAR - Annual Conference 2015
on key aspects of EU projects. For the 2015 edition, supported by EU FOSTER project, YEAR chooses to focus the conference on Open Science in Horizon 2020. This event provides young researchers with a [...] access requirements in H2020 projects and Open Data Pilots.Day 2:the young researchers are invited to come with a project idea relying on, or promoting open research data/open science aspects. YEAR Award:The [...] be awarded. The Award Consist of a European Project Management training course and 5000 euros each to further develop the project ideas. Date: 11th - 12th of May 2015, VTT - Technical Research Centre
-
Industrial Surveillance Day - Call for Participation
September 2011. Additionally to submitting a paper to this industrial session of the conference, we encourage companies to demonstrate their products and/or prototypes to a broader scientific audience [...] will offer a demo/poster session and a panel discussion where companies will be given the opportunity to discuss technical challenges, application fields of end users and future trends with outstanding [...] the field (Chief Technology Officers and leading engineers are the target audience). You are invited to submit a proposal of your showcase/poster by April 29th, 2011. The one page PDF document should contain
-
1st Short-term Visual Object Tracking Challenge in Sydney successfully accomplished
tracking methods. To address this issue, AIT co-organized the Visual Object Tracking (VOT) workshop in conjunction with ICCV2013. Researchers from academia as well as industry were invited to participate in [...] recent surge in the number of publications on tracking-related problems have made it almost impossible to follow the developments in the field. One of the reasons is that there is a lack of commonly accepted