Sciweavers

741 search results - page 127 / 149
» Tools and techniques for Network Forensics
Sort
View
ICCSA
2010
Springer
14 years 1 months ago
Geospatial Analysis of Cooperative Works on Asymmetric Information Environment
In the so-called Information-Explosion Era, astronomical amount of information is ubiquitously produced and digitally stored. It is getting more and more convenient for cooperative...
Tetsuya Kusuda, Tetsuro Ogi
HICSS
2002
IEEE
109views Biometrics» more  HICSS 2002»
14 years 1 months ago
Toward an Understanding of Creative Solution Generation
Researchers have sought a better understanding of creativity for more than a century and the resulting investigations have shed a great deal of light on the subject of creativity....
Eric L. Santanen, Robert O. Briggs, Gert-Jan de Vr...
ESWS
2010
Springer
14 years 1 months ago
Reactive Policies for the Semantic Web
Semantic Web policies are general statements defining the behavior of a system that acts on behalf of real users. These policies have various applications ranging from dynamic age...
Piero A. Bonatti, Philipp Kärger, Daniel Olme...
DATE
2000
IEEE
124views Hardware» more  DATE 2000»
14 years 1 months ago
On the Generation of Multiplexer Circuits for Pass Transistor Logic
Pass Transistor Logic has attracted more and more interest during last years, since it has proved to be an attractive alternative to static CMOS designs with respect to area, perf...
Christoph Scholl, Bernd Becker
DATE
2010
IEEE
148views Hardware» more  DATE 2010»
14 years 1 months ago
Scoped identifiers for efficient bit aligned logging
Abstract--Detailed diagnostic data is a prerequisite for debugging problems and understanding runtime performance in distributed wireless embedded systems. Severe bandwidth limitat...
Roy Shea, Mani B. Srivastava, Young Cho