Sciweavers

1744 search results - page 216 / 349
» A Proof-Carrying File System
Sort
View
134
Voted
EUROSEC
2008
ACM
15 years 6 months ago
A methodology for the repeatable forensic analysis of encrypted drives
In this paper we propose a sound methodology to perform the forensic analysis of hard disks protected with whole-disk encryption software, supposing to be in possession of the app...
Cory Altheide, Claudio Merloni, Stefano Zanero
126
Voted
LREC
2010
150views Education» more  LREC 2010»
15 years 6 months ago
Eslo: From Transcription to Speakers' Personal Information Annotation
This paper presents the preliminary works to put online a French oral corpus and its transcription. This corpus is the Socio-Linguistic Survey in Orleans, realized in 1968. First,...
Iris Eshkol, Denis Maurel, Nathalie Friburger
IICAI
2003
15 years 6 months ago
Web Usage Mining: Extraction, Maintenance and Behaviour Trends
With the growing popularity of the web, large volumes of data are gathered automatically by Web Servers and collected into access log files. Analysis of such files is generally cal...
Pierre-Alain Laur, Maguelonne Teisseire, Pascal Po...
132
Voted
ERCIMDL
2010
Springer
150views Education» more  ERCIMDL 2010»
15 years 5 months ago
A Search Log-Based Approach to Evaluation
Abstract. Anyone offering content in a digital library is naturally interested in assessing its performance: how well does my system meet the users' information needs? Standar...
Junte Zhang, Jaap Kamps
CMS
2010
207views Communications» more  CMS 2010»
15 years 4 months ago
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis
While conventional malware detection approaches increasingly fail, modern heuristic strategies often perform dynamically, which is not possible in many applications due to related ...
Ronny Merkel, Tobias Hoppe, Christian Krätzer...