Applications - fingerprint-based forensics identify argentina's desaparecidos - Computer Graphics and Applications, IEEE

نویسندگان

  • Mary Hanson
  • Michael J. Potel
چکیده

IEEE Computer Graphics and Applications 7 In March of 1976, in a battle against left-wing terrorism, a military junta took control of the government in Argentina and began a campaign of horror now known as the “Guerra Sucia,” or Dirty War. Between 1976 and 1983 this military government was responsible for the disappearances of an estimated 20,000 to 30,000 people—most of them dissidents or innocent civilians not connected with terrorism—in the name of national security. These desaparecidos (the vanished or disappeared) included people from all walks of life: trade unionists, students, young children, nuns and priests, journalists, and many others. Those few who survived the horror and military personnel who participated said that the victims invariably suffered agonizing torture, unclean living conditions, and selective forms of solitary confinement before their deaths. Most victims have never been seen nor heard from again. When Argentina restored democracy in 1983, the National Commission on the Disappeared (CONADEP) was formed to investigate the fate of the thousands of people who vanished during military rule. The story of approximately 9,000 cases is chronicled in the book Nunca Mas (Never Again), published by Farrar Straus Giroux (New York). It brings to light the horrors suffered by the victims of the military government during the Dirty War. Unfortunately, most of the victims remain unidentified, and their families are left to wonder about the fate of their missing loved ones.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IEEE 802.11 user fingerprinting and its applications for intrusion detection

Easy associations with wireless access points (APs) give users temporal and quick access to the Internet. It needs only a few seconds to take their machines to hotspots and do a little configuration in order to have Internet access. However, this portability becomes a double-edged sword for ignorant network users. Network protocol analyzers are typically developed for network performance analys...

متن کامل

A Detailed Exploration of Usability Statistics and Application Rating Based on Wireless Protocols

A Detailed Exploration of usability statistics and Application Rating on short-range Wireless protocols Bluetooth (IEEE 802.15.1), ZigBee (IEEE 802.15.4), Wi-Fi (IEEE 802.11) and NFC (ISO/IEC 14443) has been performed that being representing of those prominent wireless protocols evaluating their main characteristics and performances in terms of some metric such as co-existence, data rate, secur...

متن کامل

Service Differentiation of IEEE 802.11e

The type of the applications for which Internet is being used has changed over the years. Multimedia applications, Real-time applications and Game playing require Quality of service. IEEE has proposed IEEE 802.11e, a quality of service extension to the wireless LAN standard IEEE 802.11. In this paper service differentiation ability of 802.11e is evaluated. Identical traffic is considered for al...

متن کامل

Service Differentiation of IEEE 802.11e

The type of the applications for which Internet is being used has changed over the years. Multimedia applications, Real-time applications and Game playing require Quality of service. IEEE has proposed IEEE 802.11e, a quality of service extension to the wireless LAN standard IEEE 802.11. In this paper service differentiation ability of 802.11e is evaluated. Identical traffic is considered for al...

متن کامل

Modeling Virtual Humans

Modeling virtual humans Bender, Jan; Erleben, Kenny; Solenthaler, Barbara Published in: IEEE Computer Graphics and Applications DOI: 10.1109/MCG.2017.4031067 Publication date: 2017 Document Version Publisher's PDF, also known as Version of record Citation for published version (APA): Bender, J., Erleben, K., & Solenthaler, B. (2017). Modeling virtual humans. IEEE Computer Graphics and Applicati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000