Sciweavers

MEMETIC
2010
311views more  MEMETIC 2010»
13 years 6 months ago
Iterated local search with Powell's method: a memetic algorithm for continuous global optimization
In combinatorial solution spaces Iterated Local Search (ILS) turns out to be exceptionally successful. The question arises: is ILS also capable of improving the optimization proces...
Oliver Kramer
SADFE
2010
IEEE
13 years 9 months ago
Fonts for Forensics
: Like other latent evidence that cannot be directly perceived by people, bit sequences have to be presented through tools. Presentations of digital forensic evidence often involve...
Fred Cohen
MEDIAFORENSICS
2010
13 years 10 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
MEDIAFORENSICS
2010
13 years 10 months ago
On the embedding capacity of DNA strands under substitution, insertion, and deletion mutations
A number of methods have been proposed over the last decade for embedding information within deoxyribonucleic acid (DNA). Since a DNA sequence is conceptually equivalent to a unid...
Félix Balado
MEDIAFORENSICS
2010
13 years 10 months ago
Image dependent log-likelihood ratio allocation for repeat accumulate code-based decoding in data hiding channels
Error correction codes of suitable redundancy are used for ensuring perfect data recovery in noisy channels. For iterative decoding based methods, the decoder needs to be initiali...
Anindya Sarkar, B. S. Manjunath
SIDAR
2003
14 years 1 months ago
Elektronische Beweise!
Reinhold Kern
SIDAR
2003
14 years 1 months ago
Post Mortem Analysen mit OpenSource Software
: Forensische Analysen mit freien OpenSource Programmen sind seit Dan Farmers und Wietse Venemas ersten und einzigen Forensik-Kurs und der darauf folgenden Veröffentlichung des Co...
Matthias Hofherr
SIDAR
2003
14 years 1 months ago
Effiziente Bearbeitung von Abuse-Beschwerden
Ernst Bötsch, Petra Eilfeld, Wolfgang Hommel
AUSFORENSICS
2003
14 years 1 months ago
Identifying Trends in the Deployment and Security of 802.11b Wireless Technology, in Perth, W.A
Many organisations and individuals are installing wireless local area networks (WLANs), which are based on the IEEE 802.11b standard. Insecurely configured WLANs present a threat ...
Sue Webb