Sciweavers

1963 search results - page 295 / 393
» How is aliasing used in systems software
Sort
View
SADFE
2008
IEEE
14 years 3 months ago
Computer Forensics in Forensis
Different users apply computer forensic systems, models, and terminology in very different ways. They often make incompatible assumptions and reach different conclusions about ...
Sean Peisert, Matt Bishop, Keith Marzullo
ER
2007
Springer
122views Database» more  ER 2007»
14 years 3 months ago
An e-Process Selection Model
1 A number of e-Processes (i.e. software processes for developing e-Commerce information systems) exist in industry. We presuppose that for a subclass of these their targeted quali...
Roland Kaschek, Frina Albertyn, Vladimir A. Shekho...
MSWIM
2006
ACM
14 years 3 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
HOTI
2005
IEEE
14 years 2 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
GRAPHITE
2004
ACM
14 years 2 months ago
FingARtips: gesture based direct manipulation in Augmented Reality
This paper presents a technique for natural, fingertip-based interaction with virtual objects in Augmented Reality (AR) environments. We use image processing software and finger- ...
Volkert Buchmann, Stephen Violich, Mark Billinghur...