We have applied various visualization techniques to assist crime analysis. These techniques include a hierarchical list, a hyperbolic tree, a time line tool, a periodic pattern to...
Hsinchun Chen, Homa Atabakhsh, Tim Petersen, Jenni...
Nowadays there are many tools for the extraction of data objects [SWGDE] from SIM cards; unfortunately, most of them are proprietary, or their use is restricted to law enforcement...
In this paper we introduce the idea of integrating high security level services to support law enforcement with high-tech crime investigation. We take advantage of a process-orien...
Cezary Mazurek, Maciej Stroinski, Dariusz Walczak,...
Abstract. The wide spread of Peer-to-Peer networks makes multimedia files available to users all around the world. However, Peer-to-Peer networks are often used to spread illegal ...
Over the past half decade, we have been exploring the use of logic in the specification and analysis of computational economic mechanisms. We believe that this approach has the p...