Sciweavers

150 search results - page 30 / 30
» Recovering Digital Evidence from Linux Systems
Sort
View
OOPSLA
2009
Springer
14 years 2 months ago
Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations
An object diagram makes explicit the object structures that are only implicit in a class diagram. An object diagram may be missing and must extracted from the code. Alternatively,...
Marwan Abi-Antoun, Jonathan Aldrich
SECON
2008
IEEE
14 years 2 months ago
SYNAPSE: A Network Reprogramming Protocol for Wireless Sensor Networks Using Fountain Codes
—Wireless reprogramming is a key functionality in Wireless Sensor Networks (WSNs). In fact, the requirements for the network may change in time, or new parameters might have to b...
Michele Rossi, Giovanni Zanca, Luca Stabellini, Ri...
ASIACRYPT
2003
Springer
14 years 26 days ago
A Traceable Block Cipher
In this paper1 we propose a new symmetric block cipher with the following paradoxical traceability properties: it is computationally easy to derive many equivalent secret keys prov...
Olivier Billet, Henri Gilbert
EGOV
2003
Springer
14 years 26 days ago
Implementing e-Government in Spain
: New information and communication technologies within the Administration give rise to a series of important challenges: to select and use the various telematic and computer-relat...
José Luis Bermejo Latre
NIPS
1998
13 years 9 months ago
Modeling Surround Suppression in V1 Neurons with a Statistically Derived Normalization Model
We examine the statistics of natural monochromatic images decomposed using a multi-scale wavelet basis. Although the coefficients of this representation are nearly decorrelated, t...
Eero P. Simoncelli, Odelia Schwartz