Portada: Infraestructura para la Logística Sustentable 2050
DESTACADO | CPI Propone - Resumen Ejecutivo

Infraestructura para el desarrollo que queremos 2026-2030

Elaborado por el Consejo de Políticas de Infraestructura (CPI), este documento constituye una hoja de ruta estratégica para orientar la inversión y la gestión de infraestructura en Chile. Presenta propuestas organizadas en siete ejes estratégicos, sin centrarse en proyectos específicos, sino en influir en las decisiones de política pública para promover una infraestructura que conecte territorios, genere oportunidades y eleve la calidad de vida de la población.
ARTÍCULO
TITULO

Trusted Decision-Making: Data Governance for Creating Trust in Data Science Decision Outcomes

Paul Brous and Marijn Janssen    

Resumen

No disponible

Artículos similares

Hemos preparados una selección de otros artículos que pudieran ser de tu interés
Nihayatus Sa'adah, I Gede Puja Astawa, Amang Sudarsono     Pág. 217 - 235
Security is a major concern of the internet world because the development of the Internet requires the security of data transmission. The security method helps us to store valuable information and send it over an insecure network so that it can not be re... ver más
Jing Liu, Xuesong Hai and Keqin Li    
Massive amounts of data drive the performance of deep learning models, but in practice, data resources are often highly dispersed and bound by data privacy and security concerns, making it difficult for multiple data sources to share their local data dir... ver más
Revista: Future Internet
Alessandro Bellini, Emanuele Bellini, Monica Gherardelli and Franco Pirri    
The Internet of Things (IoT) is a remarkable data producer and these data may be used to prevent or detect security vulnerabilities and increase productivity by the adoption of statistical and Artificial Intelligence (AI) techniques. However, these desir... ver más
Revista: Future Internet
Alessandro Bocci, Stefano Forti, Roberto Guanciale, Gian-Luigi Ferrari and Antonio Brogi    
The security of Cloud applications is a major concern for application developers and operators. Protecting users? data confidentiality requires methods to avoid leakage from vulnerable software and unreliable Cloud providers. Recently, trusted execution ... ver más
Revista: Future Internet
Dmitry Namiot,Eugene Ilyushin,Oleg Pilipenko     Pág. 119 - 127
The development and use of artificial intelligence systems (machine learning) in critical areas (avionics, autonomous movement, etc.) inevitably raise the question of the reliability of the software used. Trusted computing systems have been around for a ... ver más