Sciweavers

7596 search results - page 24 / 1520
» Challenges in forensic computing
Sort
View
FGCN
2007
IEEE
106views Communications» more  FGCN 2007»
15 years 4 months ago
Discovering Methodology and Scenario to Detect Covert Database System
When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of th...
Gu Taek Lee, Seokhee Lee, Elena Tsomko, Sangjin Le...
SADFE
2005
IEEE
15 years 3 months ago
Detecting Digital Tampering by Blur Estimation
With powerful computer and mighty software, seasoned users could turn digital media into what they want. The detection of digital tampering has become a crucial problem. In most o...
Dun-Yu Hsiao, Soo-Chang Pei
HICSS
2007
IEEE
222views Biometrics» more  HICSS 2007»
15 years 4 months ago
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack
This paper proposes a pioneering Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using...
Timothy Buennemeyer, Faiz Munshi, Randy C. Marchan...
RITA
2002
110views more  RITA 2002»
14 years 9 months ago
Modeling and Rendering of Real Environments
The use of detailed geometric models is a critical factor for achieving realism in most computer graphics applications. In the past few years, we have observed an increasing deman...
Wagner Toledo Corrêa, Manuel M. Oliveira, Cl...
ICSE
2005
IEEE-ACM
15 years 9 months ago
Research challenges of autonomic computing
Autonomic computing is a grand-challenge vision of the future in which computing systems will manage themselves in accordance with high-level objectives specified by humans. The I...
Jeffrey O. Kephart