Sciweavers

1733 search results - page 252 / 347
» Self-Similarity in File Systems
Sort
View
IJDE
2007
105views more  IJDE 2007»
13 years 10 months ago
Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method
Inconsistencies in various data structures, such as missing log records and modified operating system files, have long been used by intrusion investigators and forensic analysts a...
Pavel Gladyshev, Andreas Enbacka
JCIT
2007
63views more  JCIT 2007»
13 years 10 months ago
Optimizing Reaching Definitions Overhead in Queue Processors
Queue computers are a viable option for embedded systems design. Queue computers feature a dense instruction set, high parallelism, low hardware complexity. In this paper we propo...
Yuki Nakanishi, Arquimedes Canedo, Ben A. Abderaze...
INFSOF
2000
109views more  INFSOF 2000»
13 years 9 months ago
Constructing component-based software engineering environments: issues and experiences
Developing software engineering tools is a difficult task, and the environments in which these tools are deployed continually evolve as software developers' processes, tools ...
John C. Grundy, Warwick B. Mugridge, John G. Hoski...
IJSN
2010
148views more  IJSN 2010»
13 years 8 months ago
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
: This paper investigates authentication and secure data retrieval issues in Radio-Frequency IDentification (RFID)-aware wireless sensor networks. We propose a network architecture...
Shih-I Huang, Shiuhpyng Shieh
BMCBI
2011
13 years 1 months ago
The Proteogenomic Mapping Tool
Background: High-throughput mass spectrometry (MS) proteomics data is increasingly being used to complement traditional structural genome annotation methods. To keep pace with the...
William S. Sanders, Nan Wang, Susan M. Bridges, Br...