Sciweavers

1744 search results - page 253 / 349
» The Steganographic File System
Sort
View
JSW
2008
105views more  JSW 2008»
15 years 4 months ago
Representing Procedural Logic in XML
Extensible Markup Language (XML) is a powerful tool used for describing structured documents and exchanging standardized data files over the Internet. This article describes how us...
Albert D. Bethke
IJDE
2007
105views more  IJDE 2007»
15 years 4 months ago
Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method
Inconsistencies in various data structures, such as missing log records and modified operating system files, have long been used by intrusion investigators and forensic analysts a...
Pavel Gladyshev, Andreas Enbacka
JCIT
2007
63views more  JCIT 2007»
15 years 4 months ago
Optimizing Reaching Definitions Overhead in Queue Processors
Queue computers are a viable option for embedded systems design. Queue computers feature a dense instruction set, high parallelism, low hardware complexity. In this paper we propo...
Yuki Nakanishi, Arquimedes Canedo, Ben A. Abderaze...
INFSOF
2000
109views more  INFSOF 2000»
15 years 3 months ago
Constructing component-based software engineering environments: issues and experiences
Developing software engineering tools is a difficult task, and the environments in which these tools are deployed continually evolve as software developers' processes, tools ...
John C. Grundy, Warwick B. Mugridge, John G. Hoski...
IJSN
2010
148views more  IJSN 2010»
15 years 2 months ago
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
: This paper investigates authentication and secure data retrieval issues in Radio-Frequency IDentification (RFID)-aware wireless sensor networks. We propose a network architecture...
Shih-I Huang, Shiuhpyng Shieh