the aim of this survey was to evaluate the state of implementation of guidelines and decision support systems within the EHR applications in Croatian family practice. the survey was conducted using electronic and pape...
详细信息
Hidden encrypted volumes can cause problems in digital investigations since they provide criminal suspects with a range of opportunities for deceptive anti-forensics and a countermeasure to legislation written to forc...
详细信息
ISBN:
(纸本)9783642132407
Hidden encrypted volumes can cause problems in digital investigations since they provide criminal suspects with a range of opportunities for deceptive anti-forensics and a countermeasure to legislation written to force suspects to reveal decryption keys. this paper describes how hidden encrypted volumes can be detected, and their size estimated. the paper shows how multiple copies of an encrypted container can be obtained from a single disk image of Windows Vista and Windows 7 systems using the Volume Shadow Copy feature, and how the changes between shadow copies can be visualised to detect hidden volumes. the visualisation assists in the presentation of this information to a court, and exposes patterns of change which allows the size and file system of the hidden volume to be determined.
the Educators' Symposium (EduSymp) yields a major forum for software modeling education. Traditionally collocated withthe ACM/IEEE internationalconference on Model-Driven Engineering Languages and systems (MODEL...
ISBN:
(纸本)9783642212093
the Educators' Symposium (EduSymp) yields a major forum for software modeling education. Traditionally collocated withthe ACM/IEEE internationalconference on Model-Driven Engineering Languages and systems (MODELS), EduSymp offers a unique opportunity for educators to present and discuss innovative pedagogical software modeling approaches. In this paper, a short retrospective on the 6th edition of EduSymp hosted in Oslo is presented. the program was a manifold of activities including interesting and thought-provoking oral presentations, an interactive breakout-session, and a panel discussion.
We develop a particle swarm optimisation (PSO) aided orthogonal forward regression (OFR) approach for constructing radial basis function (RBF) classifiers with tunable nodes. At each stage of the OFR construction proc...
详细信息
the proceedings contain 45 papers. the special focus in this conference is on Stabilization, Safety and Security of Distributed systems. the topics include: Efficient Self-stabilizing Graph Searching in Tree Networks;...
ISBN:
(纸本)9783642160226
the proceedings contain 45 papers. the special focus in this conference is on Stabilization, Safety and Security of Distributed systems. the topics include: Efficient Self-stabilizing Graph Searching in Tree Networks;adaptive Containment of Time-Bounded Byzantine Faults;brief Announcement: Fast Convergence in Route-Preservation;authenticated Broadcast with a Partially Compromised Public-Key Infrastructure;on Applicability of Random Graphs for Modeling Random Key Predistribution for Wireless Sensor Networks;“Slow Is Fast” for Wireless Sensor Networks in the Presence of Message Losses;modeling and Analyzing Periodic Distributed Computations;complexity Issues in Automated Model Revision without Explicit Legitimate State;algorithmic Verification of Population Protocols;computation of Equilibria and Stable Solutions;energy Management for Time-Critical Energy Harvesting Wireless Sensor Networks;stably Decidable Graph Languages by Mediated Population Protocols;broadcasting in Sensor Networks of Unknown Topology in the Presence of Swamping;brief Announcement: Configuration of Actuated Camera Networks for Multi-target Coverage;brief Announcement: On the Hardness of Topology Inference;self-stabilizing Algorithm of Two-Hop Conflict Resolution;low Memory Distributed Protocols for 2-Coloring;connectivity-Preserving Scattering of Mobile Robots with Limited Visibility;computing in Social Networks;on Transactional Scheduling in Distributed Transactional Memory systems;a Geometry of Networks;recursion in Distributed computing;on Adaptive Renaming under Eventually Limited Contention;RobuSTM: A Robust Software Transactional Memory;a Provably Starvation-Free Distributed Directory Protocol;lightweight Live Migration for High Availability Cluster Service;approximation of δ-Timeliness;A Framework for Adaptive Optimization of Remote Synchronous CSCW in the Cloud computing Era;Chameleon-MAC: Adaptive and Self-⋆ algorithms for Media Access Control in Mobile Ad Hoc Networks.
We investigate the impact of Irrecoverable Read Errors (IREs) on Mean Time To Data Loss (MTTDL) of declustered-parity RAID 6systems. By extending the analytic model to study the reliability of RAID 5 systems from [1]...
详细信息
A protein is characterized by its 3D structure, which defines its biological function. the protein structure prediction problem has real-world significance where several diseases are associated withthe wrong folding ...
详细信息
In this paper we report on our early-stage research and design efforts to provide Rwandans with access to and reuse of video interviews from the international Criminal Tribunal for Rwanda. More generally, we investiga...
详细信息
the proceedings contain 64 papers. the topics discussed include: UbiPay: minimizing transaction costs with smart mobile payments;requirements of a mobile procurement framework for rural south Africa;user-centric servi...
ISBN:
(纸本)9781605585369
the proceedings contain 64 papers. the topics discussed include: UbiPay: minimizing transaction costs with smart mobile payments;requirements of a mobile procurement framework for rural south Africa;user-centric service provisioning for IMS;a framework for multiple wireless services in heterogeneous wireless networks;an end-to-end QoS framework for IEEE 802.16 and ad-hoc integrated networks;from the IMS PoC service monitoring to its formal conformance testing;enabling web object orientation with mobile devices;a framework for dynamic position determination;seamless mobility and standards;distributed authentication for services commercialization in ad hoc networks;indoor RF fingerprinting using leaky feeder cable considering environmental changes;context-sensitive authorization in interaction patterns;context-aware application mobility support in pervasive computing environments;reusable framework for location-aware mobile applications;and QoS-based design process for pervasive computing applications.
Situation awareness is a promising approach to recommend to a mobile user the most suitable resources for a specific situation. However, determining the correct user situation is not a simple task since users have dif...
详细信息
暂无评论