Sciweavers

561 search results - page 33 / 113
» An Investigation Into Computer Forensic Tools
Sort
View
CCS
2009
ACM
15 years 8 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal

Book
292views
17 years 27 days ago
From Surfaces to Objects: Computer Vision and Three Dimensional Scene Analysis
"Three dimensional scene analysis has reached a turning point. Though researchers have been investigating object recognition and scene understanding since the late 1960’s, a...
Robert B. Fisher
DSN
2007
IEEE
15 years 5 months ago
Foundations of Measurement Theory Applied to the Evaluation of Dependability Attributes
Increasing interest is being paid to quantitative evaluation based on measurements of dependability attributes and metrics of computer systems and infrastructures. Despite measura...
Andrea Bondavalli, Andrea Ceccarelli, Lorenzo Fala...
SIGDOC
2010
ACM
14 years 11 months ago
Musical interaction patterns: communicating computer music knowledge in a multidisciplinary project
The growing popularity of mobile devices gave birth to a still emergent research field, called Mobile Music, and concerning the development of musical applications for use in thes...
Luciano Vargas Flores, Evandro Manara Miletto, Mar...
EUROPAR
2001
Springer
15 years 6 months ago
From Cluster Monitoring to Grid Monitoring Based on GRM
GRM was originally designed and implemented as part of the P-GRADE graphical parallel program development environment running on supercomputers and clusters. In the framework of th...
Zoltán Balaton, Péter Kacsuk, Norber...