SUCHE
-
Security Document World Conference 2016
Rarely has there been such an intense focus on the industry to deliver solutions to problems ranging from complex fingerprint-based ePassport systems to internationally interoperable national identity cards [...] focusing on intrinsic document security and on the new cutting-edge secure infrastructure now required to produce and use these advanced documents in live situations. The world of advanced security document
-
eHealth2016 - Austria's national eHealth event
future ICT systems need to include methods of machine learning and predictive analytics in order to provide actionable information to health carers and to support preventive health care concepts. The congress [...] From the 24th to 25th of May 2016 the tenth eHealth Conference in Vienna takes place. The theme of this convention is"Predictive modeling in healthcare – from prediction to prevention", future [...] Austria. The session provides a comprehensive program according to the motto "Predictive modeling in healthcare – from prediction to prevention". Date: 24 - 25 May 2016 Venue: Schloss Schönbrunn
-
symbIoTe – symbiosis of smart objects across IoT environments
such virtual environments to offer specialized services (e.g., localization in indoor spaces or unified access to environmental data gathered from various sources), tailored to the needs of symbIoTe-specific [...] been identified as one of the next big concepts to support societal changes and double-digit economic growth in the upcoming years. The overall challenge is to deliver an Internet of Things (IoT) extended [...] across IoT environments) is to foster a simplified IoT application and service development process over interworking IoT platforms. This is accomplished by providing the means to create and manage virtual
-
SECPID 2016
platform to discuss topics related to the following questions: • How can cloud services be made more trustworthy? • How can we build distributed systems without single point of failure or trust? • How to design [...] design end-to-end secure services in an untrusted Environment? • And is it possible to give back users full control over their data, i.e., let them decide when and to whom they are revealed? Topics of interest [...] nhancing TechnologiesIdentity Management We are happy to welcome papers from people in academia, industry and the public sector, who would like to share their results, knowledge and experience. Questions
-
M2M/IoT Forum CEE 2016
are taking disruption to new levels. Intelligent technologies will change our lives, hopefully only for better. M2M Communication and the Internet of Things are closely linked to many aspects of living [...] living in a safe, sustainable and livable city. Martin Stierle, Head of Business Unit Optical Quantum Technology at the AIT Digital Safety & Security Department, will give a lecture entitled &
-
Webinar on social innovation in municipal housing
social innovation leading to social transformation. After World War I, a grass-root movement, the settler’s movement, started to construct their own housing and agriculture in order to escape from severe h [...] Time Participants must register in advance: To register please send a brief email.Once you have registered, you will received further instructions on how to participate in the webinar.
-
Workshop on Personalization in Serious & Persuasive Games & Gamified Interactions @CHI PLAY 2015
2015 conference in London. The workshop will take place on the 4th of October. The ultimate goal is to outline a future research agenda on personalization of serious and persuasive games and gamified i [...] Periscope. It will start at 9.15 am (GMT+1). Check out @MaBu_89 (Marc Busch) on Periscope or Twitter to get a notification when the live broadcast starts! GEMPLAY on FacebookProjektwebsite GEMPLAY
-
Interactive Session: Requirements meet solutions
which aims to extract best practices in successfully translating stakeholder requirements into AAL proucts and services. Participants are encouraged to share the methods and tools they used to convey stakeholder [...] requirements and deal with conflicting stakeholder needs. They are also invited to reflect upon past or ongoing AAL projects to identify pitfalls and best practices that will be useful in developing future
-
International Conference on Quantum Cryptography - QCrypt 2015
goals of the conference are to represent the previous year’s best results and to support the building of a research community in quantum cryptography. Date: 18. September to 02. October 2015 Venue: Hitotsubashi [...] Quantum cryptography aims to achieve security from fundamental physical principles, such as the quantum mechanical phenomena of entanglement and Heisenberg’s uncertainty principle. In the last few years
-
Networking Session zu Future Working Experience (ICT 2015)
Scientist at the Business Unit “Technology Experience”, is dedicated to discuss Europe’s Digital Agenda and support the building of consortia to identify challenges and opportunities in changing working environments: [...] workplace (e.g. gamification) be beneficial for productivity and for the workers well-being? What can we do to increase organizational information security and prevent data leaks (e.g. through social engineering)
-
Rethinking Technology Innovation
in round-table sessions, working groups, as well as a public event open to other interested stakeholders. The workshop is open to student applicants. More information: +43 662 8044 4800 and ffdr@hci.sbg [...] In order to advance research in and around human-computer interaction on factories, fabrication and DIY making, this event will bring together key researchers and practitioners from varied disciplines [...] personal fabrication, as well as from hobbyist and entrepreneurial production. Manfred Tscheligi, head of the Business Unit Technology Experience, is part of the organizing committee. Although different
-
AIT organizes international Border Control Conference
conference. This workshop proposes to bring together a wide range of researchers, industry, and practitioners of biometric and/or monitoring/surveillance technologies in ABC to share innovative ideas and solutions
-
AIT Scientist Marc Busch hält Vortrag bei CMG-AE Tagung
industrieller Tsunami? Business-Continuity-Management am PrüfstandManfred Wöhrl, R.I.C.S. EDV-GmbHHow to hack your critical infrastructureThomas Bleier, B-SEC better secure KGSpielerische Methoden zur Abwehr
-
CeDEM 2016
e-participation and open government specialists working in academia, politics, government and business to critically analyse the innovations, issues, ideas and challenges in the networked societies of the
-
IFIP Networking 2016
The main objectives of Networking 2016 are to discuss recent advances in the broad and quickly-evolving fields of computer and communication networks, and to highlight key issues, identify trends, and
-
Cybersecurity Lecture Series 2015
technologies, are no longer able to defend your organizationagainst the polymorphic and complex attacks we face today. Instead, organizations must take a new approach to intrusion threats: rapididentification [...] analysis capabilities, intelligence sharing and incident management capabilities can be brought together to realize this new approach. Date: 17th March, 4.30 pmVenue: Technische Universität Wien, EI 3 Sahulka
-
Internet of Things Forum Vienna
critical role of Technology Experience of Wearable Devices The Internet of Things (IoT) has the power to significantly change many aspects of our everyday life. But how can we ensure that embedding intelligent [...] alcohol and nicotine addiction it is crucial that a novel infrastructure, such as the IoT, empower us to act more responsibly. Behavior Change Support Systems (also called Persuasive Technologies) are powerful [...] chances for interventions. However, people are individual and they differ in their susceptibility to persuasive behavior change techniques and strategies. Furthermore, privacy concerns in the IoT arise
-
Cybersecurity Lecture Series
attack vectors and growing interest from governments worldwide. This talk provides an introduction to the Supervisory Control And Data Acquisition (SCADA) systems that underpin CNI and provides an insight
-
Zero Emission Cities Exhibition @Vienna City Hall
Vienna city hall for the 5th time. In bringing stakeholders together, the one-day exhibitions aim is to promote innovative Smart City concepts and spark an expert discussion on trend-setting topics. The
-
Visual Computing Trends Symposium 2015
will learn about key open challenges and scientific and industrial trends. Participants are encouraged to participate in extended discussions on core technological issues.Invited Speakers: Michela Spagnuolo