Sciweavers

94 search results - page 8 / 19
» Performance Forensics
Sort
View
CCS
2011
ACM
12 years 7 months ago
Forensic investigation of the OneSwarm anonymous filesharing system
OneSwarm is a system for anonymous p2p file sharing in use by thousands of peers. It aims to provide Onion Routing-like privacy and BitTorrent-like performance. We demonstrate se...
Swagatika Prusty, Brian Neil Levine, Marc Liberato...
DIAL
2004
IEEE
181views Image Analysis» more  DIAL 2004»
13 years 11 months ago
Forensic Handwritten Document Retrieval System
Document storage and retrieval capabilities of the CEDAR-FOX forensic handwritten document examination system are described. The system is designed for automated and semi-automate...
Sargur N. Srihari, Zhixin Shi
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 1 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
SADFE
2008
IEEE
14 years 1 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
ICIP
2003
IEEE
14 years 9 months ago
Sparse-parametric writer identification using heterogeneous feature groups
This paper evaluates the performance of edge-based directional probability distributions as features in writer identification in comparison to a number of non-angular features. It...
Lambert Schomaker, Marius Bulacu, Merijn van Erp