Sciweavers

173 search results - page 32 / 35
» Computer Forensics in Forensis
Sort
View
AUTOID
2005
IEEE
14 years 3 months ago
Statistical Models for Assessing the Individuality of Fingerprints
Following Daubert in 1993, forensic evidence based on fingerprints was first challenged in the 1999 case of USA vs. Byron Mitchell, and subsequently, in 20 other cases involving...
Sarat C. Dass, Yongfang Zhu, Anil K. Jain
ESORICS
2005
Springer
14 years 3 months ago
Privacy Preserving Clustering
The freedom and transparency of information flow on the Internet has heightened concerns of privacy. Given a set of data items, clustering algorithms group similar items together...
Somesh Jha, Louis Kruger, Patrick McDaniel
HICSS
2003
IEEE
184views Biometrics» more  HICSS 2003»
14 years 3 months ago
Content Based File Type Detection Algorithms
Identifying the true type of a computer file can be a difficult problem. Previous methods of file type recognition include fixed file extensions, fixed “magic numbers” stored ...
Mason McDaniel, Mohammad Hossain Heydari
DAC
2001
ACM
14 years 10 months ago
Publicly Detectable Techniques for the Protection of Virtual Components
Highlighted with the newly released intellectual property (IP) protection white paper by VSI Alliance, the protection of virtual components (VCs) has received a large amount of at...
Gang Qu
FUZZIEEE
2007
IEEE
14 years 4 months ago
Tolerance-based and Fuzzy-Rough Feature Selection
— One of the main obstacles facing the application of computational intelligence technologies in pattern recognition (and indeed in many other tasks) is that of dataset dimension...
Richard Jensen, Qiang Shen