Hakutulokset: Kirjoja kirjailijalta Computer Science and Telecommunications Board
yhteensä 222 hakutulosta
Biometric Recognition
Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide …
Building Data Capacity for Patient-Centered Outcomes Research
The Office of the Assistant Secretary for Planning and Evaluation (ASPE), in partnership with other agencies and divisions of the United States Department of Health and Human …
Building a Workforce for the Information Economy
A look at any newspaper's employment section suggests that competition for qualified workers in information technology (IT) is intense. Yet even experts disagree on not only the …
Looking Over the Fence at Networks
A remarkable creation, the Internet encompasses a diversity of networks, technologies, and organizations. The enormous volume and great variety of data carried over it give it a …
Summary of a Workshop on Using Information Technology to Enhance Disaster Management
Section 214 of the E-government Act of 2002 called on the Administrator of the Office of Electronic Government in the Office of Management and Budget, in consultation with the …
Academic Careers for Experimental Computer Scientists and Engineers
The information age has grown out of the work of experimental computer science, which is dedicated to the development of new hardware, software, graphics, interfaces, and other …
Information Technology and the U.S. Workforce
Recent years have yielded significant advances in computing and communication technologies, with profound impacts on society. Technology is transforming the way we work, play, and …
Summary of a Workshop on Software Certification and Dependability
Certification of critical software systems (e.g., for safety and security) is important to help ensure their dependability. Today, certification relies as much on evaluation of the …
Who Goes There?
Who Goes There?: Authentication Through the Lens of Privacy explores authentication technologies (passwords, PKI, biometrics, etc.) and their implications for the privacy of the …
Realizing the Potential of C4I
Rapid progress in information and communications technologies is dramatically enhancing the strategic role of information, positioning effective exploitation of these technology …
Assessing the Impacts of Changes in the Information Technology R&D Ecosystem
The U.S. information technology (IT) research and development (R&D) ecosystem was the envy of the world in 1995. However, this position of leadership is not a birthright, and it is …
Emergency Alert and Warning Systems
Following a series of natural disasters, including Hurricane Katrina, that revealed shortcomings in the nations ability to effectively alert populations at risk, Congress passed …