Sciweavers

7596 search results - page 325 / 1520
» Challenges in forensic computing
Sort
View
107
Voted
NDSS
2006
IEEE
15 years 11 months ago
Deploying a New Hash Algorithm
The strength of hash functions such as MD5 and SHA-1 has been called into question as a result of recent discoveries. Regardless of whether or not it is necessary to move away fro...
Steven M. Bellovin, Eric Rescorla
129
Voted
NSPW
2006
ACM
15 years 11 months ago
Inconsistency in deception for defense
The use of deception is one of many defensive techniques being explored today. In the past, defenders of systems have used deception haphazardly, but now researchers are developin...
Vicentiu Neagoe, Matt Bishop
138
Voted
ICDCS
2005
IEEE
15 years 10 months ago
Mixed Consistency Model: Meeting Data Sharing Needs of Heterogeneous Users
Heterogeneous users usually have different requirements as far as consistency of shared data is concerned. This paper proposes and investigates a mixed consistency model to meet t...
Zhiyuan Zhan, Mustaque Ahamad, Michel Raynal
IEEECGIV
2005
IEEE
15 years 10 months ago
Combinations of Range Data and Panoramic Images - New Opportunities in 3D Scene Modeling
The paper informs about rotating line cameras (which capture images of several 100 Megapixel), their use for creating (stereo) panoramas, and how they can be used for texturing cl...
Reinhard Klette, Karsten Scheibe
IPPS
2005
IEEE
15 years 10 months ago
Towards Quantitative Analysis of Real-Time UML Using Stochastic Petri Nets
In recent years the Unified Modeling Language (UML) including its profiles gained increasing acceptance as a specification language for modeling real-time systems. It is crucia...
Jan Trowitzsch, Armin Zimmermann, Günter Homm...