Sciweavers

741 search results - page 110 / 149
» Tools and techniques for Network Forensics
Sort
View
IEEESCC
2007
IEEE
14 years 3 months ago
Business-Activity Driven Search: Addressing the Information Needs of Services Professionals
Services business generates significant amount of human and machine created data. Search and discovery of relevant information from this data is a critical factor in enhancing wor...
Nithya Rajamani, Murthy V. Devarakonda, Yu Deng, W...
EUROCRYPT
2004
Springer
14 years 2 months ago
Dining Cryptographers Revisited
Abstract. Dining cryptographers networks (or DC-nets) are a privacypreserving primitive devised by Chaum for anonymous message publication. A very attractive feature of the basic D...
Philippe Golle, Ari Juels
LCTRTS
2004
Springer
14 years 2 months ago
Advanced control flow in Java card programming
Java Card technology simplifies the development of smart card applications by providing a high-level programming language similar to Java. However, the master-slave programming m...
Peng Li, Steve Zdancewic
HICSS
2000
IEEE
169views Biometrics» more  HICSS 2000»
14 years 1 months ago
A Software System for Spatial Data Analysis and Modeling
Advances in geographical information systems (GIS) and supporting data collection technology has resulted in the rapid collection of a huge amount of spatial data. However, known ...
Aleksandar Lazarevic, Tim Fiez, Zoran Obradovic
LREC
2010
201views Education» more  LREC 2010»
13 years 10 months ago
Cultural Heritage: Knowledge Extraction from Web Documents
This article presents the use of NLP techniques (text mining, text analysis) to develop specific tools that allow to create linguistic resources related to the cultural heritage d...
Eva Sassolini, Alessandra Cinini