Digital forensics is usually seen as a specialised domain of information and communication technologies (ICT) that is employed when a serious crime involving ICT is committed. It is by and large seen as a responsibili...
详细信息
Digital forensics is usually seen as a specialised domain of information and communication technologies (ICT) that is employed when a serious crime involving ICT is committed. It is by and large seen as a responsibility of the computer crime units of law enforcement agencies to conduct examinations of the ICT resources used in a crime. The staff members of a corporate ICT team are therefore not required to acquire the digital forensics analysis skills and the corresponding investigation tools. This trend is experiencing a significant shift in the recent years as the commercial interests of corporate sector increasingly require the post-incident analysis capabilities to ensure business continuity. This paper highlights the role of digital forensics in the corporate ICT infrastructure. It presents a framework for embedding digital forensics analysis techniques at various stages of corporate ICT lifecycle. A set of best practices for the corporate ICT security policy is also outlined to keep the operational costs of digital forensics at the optimal level.
SOA migration is a complicated task. To ensure the migration performance, some directions on modeling migration approaches are needed. A user-oriented SOA migration model is proposed in this paper. The model is define...
详细信息
The development of methods for the automatic detection and reconstruction of building radar footprints fromsingle very high resolution (VHR) synthetic aperture radar (SAR) images is a difficult task for two main reaso...
详细信息
The development of methods for the automatic detection and reconstruction of building radar footprints fromsingle very high resolution (VHR) synthetic aperture radar (SAR) images is a difficult task for two main reasons: i) the very high complexity of VHR SAR images; and ii) the need to develop efficient algorithms that can be applied to large images in order to be used in real applications. In this paper we present a novel method for automatic building detection, which also reconstructs the 2D radar footprint of the detected buildings. The method is based on the extraction of a set of low-level features from the images and on their combination in more structured primitives. Then the semantic meaning of primitives is used for the definition of building candidates and for the radar footprint reconstruction. In order to process large VHR SAR images, the method has been implemented on a computer cluster. We demonstrate the effectiveness of the method using a large TerraSAR-X spotlight scene.
Resisting spam in tagging system is very challenging. This paper presents DSpam, a novel spam-resistant tagging system which can significantly diminish spam in tag search results with users' reliabilities. DSpam c...
详细信息
Resisting spam in tagging system is very challenging. This paper presents DSpam, a novel spam-resistant tagging system which can significantly diminish spam in tag search results with users' reliabilities. DSpam client groups other users into unfamiliar users and interacted users according to the fact whether the client has interacted with such users. For an unfamiliar user, the client computes his reliability by tagging behavior-based mechanism which reflects correlation of annotations between them. For an interacted user, the reliability includes two parts: feedback-based reliability, which indicates direct interactions between that user and the client, and recommendation reliability, which indicates the evaluation about that user from the client's friends. The client ranks search result with the average reliabilities of himself with respect to annotators of each result. Experimental results show DSpam can effectively resist tag spam and work better than existing tag search schemes.
The benefits of using mobile sink to prolong sensor network lifetime have been well recognized. However, few provably theoretical results remain are developed due to the complexity caused by time-dependent network top...
详细信息
ISBN:
(纸本)9781424459889
The benefits of using mobile sink to prolong sensor network lifetime have been well recognized. However, few provably theoretical results remain are developed due to the complexity caused by time-dependent network topology. In this work, we investigate the optimum routing strategy for the static sensor *** further propose a number of motion stratifies for the mobile sink(s) to gather real time data from static sensor network, with the objective to maximize the network lifetime. Specially, we consider a more realistic model where the moving speed and path for mobile sinks are constrained. Our extensive experiments show that our scheme can significantly prolong entire network lifetime and reduce delivery delay.
A method used to estimate the state of vehicles when driving was proposed in this paper. This method was based on GPS/INS integrated navigation system. The kinematics model was set up for four-wheeled vehicle, and non...
详细信息
This paper presents a composition of four particular aspect-oriented design patterns: Policy, Cuckoo's Egg, Border Control and Exception Introduction. The composition is studied in the context of the class depreca...
详细信息
This paper presents a composition of four particular aspect-oriented design patterns: Policy, Cuckoo's Egg, Border Control and Exception Introduction. The composition is studied in the context of the class deprecation problem in team development. Each of these four patterns is a representative of one of the three structural categories of aspect-oriented design patterns: pointcut, advice, and inter-type declaration pattern category. Although aspect-oriented patterns mostly can be composed with one another without having to modify the code of the pattern that has been applied first, this is not always so. Based on the structural categorization of aspect-oriented design patterns, a regularity in their sequential composition is uncovered and discussed in general and within a detailed example of Policy, Cuckoo's Egg, Border Control, and Exception Introduction composition and further examples of aspect-oriented design pattern compositions.
For some time, the modeling and verification of web services composition are focused on control flow. Recent years, data validation has gained researchers' attention too, as it is important to the correct executio...
详细信息
For some time, the modeling and verification of web services composition are focused on control flow. Recent years, data validation has gained researchers' attention too, as it is important to the correct execution of the composed web service. To verify data-related requirements of web services composition, we present a Petri net-based method for the data validation of web services composition developed with Web Service Business Process Execution Language. Data-flow related aspects of the WS-BPEL process are described with WS-CPN, which is a special kind of Colored Petri net supporting the description of XML Schema types. In WS-CPN, data types are described by CPN ML, a description language for Colored Petri net. We present WS-CPN models for various activities of a WS-BPEL process, which can be combined together to obtain the WS-CPN model for the entire composition process. Data validation problems in web services composition including redundant data, lost data, inconsistent data and misdirected data are discussed, and the methods for validating these problems are given based on WS-CPN.
The National Highway Traffic Safety Administration (NHTSA) estimates that in the USA alone approximately 100,000 crashes each year are caused primarily by driver drowsiness or fatigue. The major cause for inattentiven...
详细信息
We are developing a measurement device by means of which gait information can be obtained that cannot be obtained by existent devices. We are also evaluating the effectiveness of the device in rehabilitation programs....
详细信息
暂无评论