Sciweavers

94 search results - page 12 / 19
» Performance Forensics
Sort
View
USS
2008
13 years 9 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
BMCBI
2008
102views more  BMCBI 2008»
13 years 7 months ago
mtDNAmanager: a Web-based tool for the management and quality analysis of mitochondrial DNA control-region sequences
Background: For the past few years, scientific controversy has surrounded the large number of errors in forensic and literature mitochondrial DNA (mtDNA) data. However, recent res...
Hwan Young Lee, Injee Song, Eunho Ha, Sung-Bae Cho...
JDFP
2006
139views more  JDFP 2006»
13 years 7 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer
MEDIAFORENSICS
2010
13 years 6 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
ICASSP
2011
IEEE
12 years 11 months ago
Calibration and weight of the evidence by human listeners. The ATVS-UAM submission to NIST HUMAN-aided speaker recognition 2010
This work analyzes the performance of speaker recognition when carried out by human lay listeners. In forensics, judges and jurors usually manifest intuition that people is profi...
Daniel Ramos, Javier Franco-Pedroso, Joaquin Gonza...