Applications - fingerprint-based forensics identify argentina's desaparecidos - Computer Graphics and Applications, IEEE
نویسندگان
چکیده
IEEE Computer Graphics and Applications 7 In March of 1976, in a battle against left-wing terrorism, a military junta took control of the government in Argentina and began a campaign of horror now known as the “Guerra Sucia,” or Dirty War. Between 1976 and 1983 this military government was responsible for the disappearances of an estimated 20,000 to 30,000 people—most of them dissidents or innocent civilians not connected with terrorism—in the name of national security. These desaparecidos (the vanished or disappeared) included people from all walks of life: trade unionists, students, young children, nuns and priests, journalists, and many others. Those few who survived the horror and military personnel who participated said that the victims invariably suffered agonizing torture, unclean living conditions, and selective forms of solitary confinement before their deaths. Most victims have never been seen nor heard from again. When Argentina restored democracy in 1983, the National Commission on the Disappeared (CONADEP) was formed to investigate the fate of the thousands of people who vanished during military rule. The story of approximately 9,000 cases is chronicled in the book Nunca Mas (Never Again), published by Farrar Straus Giroux (New York). It brings to light the horrors suffered by the victims of the military government during the Dirty War. Unfortunately, most of the victims remain unidentified, and their families are left to wonder about the fate of their missing loved ones.
منابع مشابه
IEEE 802.11 user fingerprinting and its applications for intrusion detection
Easy associations with wireless access points (APs) give users temporal and quick access to the Internet. It needs only a few seconds to take their machines to hotspots and do a little configuration in order to have Internet access. However, this portability becomes a double-edged sword for ignorant network users. Network protocol analyzers are typically developed for network performance analys...
متن کاملA Detailed Exploration of Usability Statistics and Application Rating Based on Wireless Protocols
A Detailed Exploration of usability statistics and Application Rating on short-range Wireless protocols Bluetooth (IEEE 802.15.1), ZigBee (IEEE 802.15.4), Wi-Fi (IEEE 802.11) and NFC (ISO/IEC 14443) has been performed that being representing of those prominent wireless protocols evaluating their main characteristics and performances in terms of some metric such as co-existence, data rate, secur...
متن کاملService Differentiation of IEEE 802.11e
The type of the applications for which Internet is being used has changed over the years. Multimedia applications, Real-time applications and Game playing require Quality of service. IEEE has proposed IEEE 802.11e, a quality of service extension to the wireless LAN standard IEEE 802.11. In this paper service differentiation ability of 802.11e is evaluated. Identical traffic is considered for al...
متن کاملService Differentiation of IEEE 802.11e
The type of the applications for which Internet is being used has changed over the years. Multimedia applications, Real-time applications and Game playing require Quality of service. IEEE has proposed IEEE 802.11e, a quality of service extension to the wireless LAN standard IEEE 802.11. In this paper service differentiation ability of 802.11e is evaluated. Identical traffic is considered for al...
متن کاملModeling Virtual Humans
Modeling virtual humans Bender, Jan; Erleben, Kenny; Solenthaler, Barbara Published in: IEEE Computer Graphics and Applications DOI: 10.1109/MCG.2017.4031067 Publication date: 2017 Document Version Publisher's PDF, also known as Version of record Citation for published version (APA): Bender, J., Erleben, K., & Solenthaler, B. (2017). Modeling virtual humans. IEEE Computer Graphics and Applicati...
متن کامل