Artificial Intelligence

Final Call for Papers: IEEE Joint Intelligence and Security Informatics Conference (JISIC) 2014 (deadline approaching soon)

IEEE Joint Intelligence and Security Informatics Conference (JISIC) 2014 will include a special track on BORDER CONTROL.

Call for Papers: IEEE Joint Intelligence and Security Informatics Conference (JISIC) 2014

IEEE Joint Intelligence and Security Informatics Conference (JISIC) 2014 will include a special track on BORDER CONTROL.

Final Call for Papers: IEEE Joint Intelligence and Security Informatics Conference (JISIC) 2014 (deadline approaching soon)

IEEE Joint Intelligence and Security Informatics Conference (JISIC) 2014 will include a special track on BORDER CONTROL.

The possibility exists for Industry to visit Frontex and brief Frontex experts on its portfolios of products and services in the field of border security. For this purpose, a Visit Proposal Form available at http://btn.frontex.europa.eu/form/visit-proposal-form must be completed and submitted.

Frontex invites European Industry and Academia which are implementing projects intended for developing new products/technologies/solutions for border security to send their applications by filling in the form available at: http://btn.frontex.europa.eu/form/application-form-workshop-newongoing-p..., by 15 September 2014.

Call for Papers: IEEE Joint Intelligence and Security Informatics Conference (JISIC) 2014

IEEE Joint Intelligence and Security Informatics Conference (JISIC) 2014 will include a special track on BORDER CONTROL.
Conference Paper
External
Date of publication: 
Mon, 04/07/2011
Discovering and gathering information from multiple disparate sources, assessing the veracity of that information, and determining how and when to utilize the information in each stream is one of the most perplexing challenges that governments and businesses face. This symposium explores how governments and businesses can increase the fidelity and use of information streams. Assessing the credibility of information and increasing the quality of information streams is critical in many venues (e.g., law enforcement scenarios, border security, fraud investigations, intelligence gathering, etc.).

Pages