Sciweavers

741 search results - page 115 / 149
» Tools and techniques for Network Forensics
Sort
View
SUTC
2006
IEEE
14 years 2 months ago
Multi-ontology Based Multimedia Annotation for Domain-specific Information Retrieval
Recent advances in computer power, network bandwidth, information storage, and multimedia/signal processing techniques have led to a proliferation of multimedia data. As a result,...
Aijuan Dong, Honglin Li
CSB
2005
IEEE
126views Bioinformatics» more  CSB 2005»
14 years 2 months ago
Visualization of Logic Analysis of Phylogenetic Profiles (LAPP)
Recently Bowers et al. [1] analyzed triplet logic relationships among 4873 Clusters of Orthologous Groups (COGS) from 67 fully sequenced organisms by calculating how well logic re...
Kay A. Robbins, Li Zhao
DSN
2005
IEEE
14 years 2 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
IFM
2005
Springer
100views Formal Methods» more  IFM 2005»
14 years 2 months ago
Embedding the Stable Failures Model of CSP in PVS
We present an embedding of the stable failures model of CSP in the PVS theorem prover. Our work, extending a previous embedding of the traces model of CSP in [6], provides a platfo...
Kun Wei, James Heather
ISADS
2003
IEEE
14 years 2 months ago
A GUI Approach to Programming of TMO Frames and Design of Real-Time Distributed Computing Software
An advanced high-level approach for programming of real-time distributed computing applications, the TMO (Time-triggered Message-triggered Object) programming and specification sc...
K. H. Kim, Seok-Joong Kang