Sciweavers

3394 search results - page 580 / 679
» A Modal Model of Memory
Sort
View
HICSS
2008
IEEE
86views Biometrics» more  HICSS 2008»
15 years 10 months ago
Overcoming Impediments to Cell Phone Forensics
: Cell phones are an emerging but rapidly growing area of computer forensics. While cell phones are becoming more like desktop computers functionally, their organization and operat...
Wayne Jansen, Aurélien Delaitre, Ludovic Mo...
ICC
2008
IEEE
127views Communications» more  ICC 2008»
15 years 10 months ago
MIMO Optical Wireless Channels Using Halftoning
— Two-dimensional (2D) optical intensity channels exist in a variety of applications including holographic storage, page-oriented memories, optical interconnects, 2D barcodes, as...
Mohamed D. A. Mohamed, Awad Dabbo, Steve Hranilovi...
ICDCS
2008
IEEE
15 years 10 months ago
Strong WORM
We introduce a Write-Once Read-Many (WORM) storage system providing strong assurances of data retention and compliant migration, by leveraging trusted secure hardware in close dat...
Radu Sion
IISWC
2008
IEEE
15 years 10 months ago
A workload for evaluating deep packet inspection architectures
—High-speed content inspection of network traffic is an important new application area for programmable networking systems, and has recently led to several proposals for high-per...
Michela Becchi, Mark A. Franklin, Patrick Crowley
IJCNN
2008
IEEE
15 years 10 months ago
Hybrid learning architecture for unobtrusive infrared tracking support
—The system architecture presented in this paper is designed for helping an aged person to live longer independently in their own home by detecting unusual and potentially hazard...
K. K. Kiran Bhagat, Stefan Wermter, Kevin Burn