Sciweavers

1744 search results - page 197 / 349
» The Steganographic File System
Sort
View
AINA
2010
IEEE
15 years 9 months ago
InnoDB Database Forensics
— Whenever data is being processed, there are many places where parts of the data are temporarily stored; thus forensic analysis can reveal past activities, create a (partial) ti...
Peter Fruhwirt, Marcus Huber, Martin Mulazzani, Ed...
FC
1999
Springer
97views Cryptology» more  FC 1999»
15 years 8 months ago
Playing "Hide and Seek" with Stored Keys
In this paper we consider the problem of efficiently locating cryptographic keys hidden in gigabytes of data, such as the complete file system of a typical PC. We describe efficie...
Adi Shamir, Nicko van Someren
114
Voted
DEXA
1994
Springer
102views Database» more  DEXA 1994»
15 years 8 months ago
The Design and Implementation of a Legal Text Database
We describe the design and implementation of a legal text database. The database of provides a number of Greek Council of State decisions in the form of a computer-accessible mediu...
Diomidis Spinellis
ICDCS
2000
IEEE
15 years 7 months ago
An Efficient Cache Maintenance Scheme for Mobile Environment
In this paper we present a new cache maintenance scheme, called AS, suitable for wireless mobile environment. Our scheme integrates mobility management scheme of Mobile IP with ca...
Anurag Kahol, Ramandeep Singh Khurana, Sandeep K. ...
ECAI
2008
Springer
15 years 5 months ago
Automatic Page Turning for Musicians via Real-Time Machine Listening
We present a system that automatically turns the pages of the music score for musicians during a performance. It is based on a new algorithm for following an incoming audio stream ...
Andreas Arzt, Gerhard Widmer, Simon Dixon