Sciweavers

153 search results - page 23 / 31
» An Examination of Digital Forensic Models
Sort
View
MOBIHOC
2006
ACM
15 years 11 months ago
Performance analysis of mobility-assisted routing
Traditionally, ad hoc networks have been viewed as a connected graph over which end-to-end routing paths had to be established. Mobility was considered a necessary evil that inval...
Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ca...
122
Voted
TABLETOP
2006
IEEE
15 years 5 months ago
Multi-User Interface and Interactions on Direct-Touch Horizontal Surfaces: Collaborative Tabletop Research at MERL
While “displays” have the connotation of affording visual output, “surfaces” invite the users to interact. What happens then when the surfaces are also displays, when a di...
Chia Shen
IPPS
2002
IEEE
15 years 4 months ago
Scheduling Multiple Data Visualization Query Workloads on a Shared Memory Machine
Query scheduling plays an important role when systems are faced with limited resources and high workloads. It becomes even more relevant for servers applying multiple query optimi...
Henrique Andrade, Tahsin M. Kurç, Alan Suss...
ICMCS
1998
IEEE
86views Multimedia» more  ICMCS 1998»
15 years 3 months ago
Virtual Recovery of Excavated Archaeological Finds
This work aims at a virtual recovery of excavated archaeological finds in cyberspace for ancient relic preservation, archaeology research, and multimedia material generation. Many...
Jiang Yu Zheng, Zhong Li Zhang, Norihiro Abe
124
Voted
ACSAC
2004
IEEE
15 years 3 months ago
Alert Correlation through Triggering Events and Common Resources
Complementary security systems are widely deployed in networks to protect digital assets. Alert correlation is essential to understanding the security threats and taking appropria...
Dingbang Xu, Peng Ning