Sciweavers

2265 search results - page 215 / 453
» Recovering Exchanged Data
Sort
View
ITCC
2005
IEEE
15 years 9 months ago
Byteprints: A Tool to Gather Digital Evidence
In this paper, we present techniques to recover useful information from disk drives that are used to store user data. The main idea is to use a logging mechanism to record the mod...
Sriranjani Sitaraman, Srinivasan Krishnamurthy, Su...
130
Voted
STORAGESS
2005
ACM
15 years 9 months ago
Storage-based file system integrity checker
In this paper we present a storage based intrusion detection system (IDS) which uses time and space efficient point-intime copy and performs file system integrity checks to detec...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...
AES
2004
Springer
190views Cryptology» more  AES 2004»
15 years 9 months ago
Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results
Abstract. When cryptosystems are being used in real life, hardware and software implementations themselves present a fruitful field for attacks. Side channel attacks exploit infor...
Elena Trichina, Tymur Korkishko, Kyung-Hee Lee
ISMIR
2004
Springer
100views Music» more  ISMIR 2004»
15 years 9 months ago
Well-Tempered Spelling: A Key Invariant Pitch Spelling Algorithm
In this paper is described a data-driven algorithm for the functionally correct spelling of MIDI pitch values in terms of Western musical notation. Input is in the form of MIDI fi...
Josh Stoddard, Christopher Raphael, Paul E. Utgoff
VLDB
2004
ACM
93views Database» more  VLDB 2004»
15 years 9 months ago
Indexing Temporal XML Documents
Different models have been proposed recently for representing temporal data, tracking historical information, and recovering the state of the document as of any given time, in XM...
Alberto O. Mendelzon, Flavio Rizzolo, Alejandro A....