Sciweavers

741 search results - page 125 / 149
» Tools and techniques for Network Forensics
Sort
View
ICDCSW
2007
IEEE
14 years 3 months ago
A Context-aware Reminding System for Daily Activities of Dementia Patients
Older people with dementia often decline in short-term memory and forget what to do next to complete their activities of daily living (ADLs), such as tea-making and toothbrushing....
Hua Si, Seung Jin Kim, Nao Kawanishi, Hiroyuki Mor...
ESORICS
2007
Springer
14 years 3 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
FPGA
2007
ACM
185views FPGA» more  FPGA 2007»
14 years 3 months ago
Power-aware FPGA logic synthesis using binary decision diagrams
Power consumption in field programmable gate arrays (FPGAs) has become an important issue as the FPGA market has grown to include mobile platforms. In this work we present a power...
Kevin Oo Tinmaung, David Howland, Russell Tessier
ICIC
2007
Springer
14 years 3 months ago
Unbalanced Underground Distribution Systems Fault Detection and Section Estimation
This paper presents a novel fault detection and section estimation method for unbalanced underground distribution systems (UDS). The method proposed is based on artificial neural n...
Karen Rezende Caino de Oliveira, Rodrigo Hartstein...
IUI
2006
ACM
14 years 2 months ago
A goal-oriented interface to consumer electronics using planning and commonsense reasoning
We are reaching a crisis with design of user interfaces for consumer electronics. Flashing 12:00 time indicators, push-andhold buttons, and interminable modes and menus are all sy...
Henry Lieberman, José H. Espinosa