Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

19,895 Full-Text Articles 30,355 Authors 6,911,423 Downloads 241 Institutions

All Articles in Computer Engineering

Faceted Search

19,895 full-text articles. Page 741 of 749.

Higate (High Grade Anti-Tamper Equipment) Prototype And Application To E-Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki 2010 Tokyo Denki University

Higate (High Grade Anti-Tamper Equipment) Prototype And Application To E-Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki

Journal of Digital Forensics, Security and Law

These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of data and accessing of interim results even by computer users is associated with an increasing number of adverse events. These adverse events often occur when sensitive data such as personal or confidential business information must be handled by two or more parties, such as in the case of e-Discovery, used in legal proceedings, or epidemiologic studies. To solve …


Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky 2010 The University of British Columbia

Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky

Journal of Digital Forensics, Security and Law

This paper introduces the Digital Records Forensics project, a research endeavour located at the University of British Columbia in Canada and aimed at the development of a new science resulting from the integration of digital forensics with diplomatics, archival science, information science and the law of evidence, and of an interdisciplinary graduate degree program, called Digital Records Forensics Studies, directed to professionals working for law enforcement agencies, legal firms, courts, and all kind of institutions and business that require their services. The program anticipates the need for organizations to become “forensically ready,” defined by John Tan as “maximizing the ability …


Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler 2010 Gary Kessler Associates

Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler

Journal of Digital Forensics, Security and Law

On the day that I sat down to start to write this review, the following e-mail came across on one of my lists: Person A and Person B write back and forth and create an email thread. Person A then forwards the email to Person C, but changes some wording in the email exchange between A & B. What is the easiest way (and is it even possible) to find out when that earlier email message was altered before sent to Person C? Before you try to answer these questions, read Fred Cohen's Digital Forensic Evidence Examination. His book won't …


Table Of Contents, 2010 Embry-Riddle Aeronautical University

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather McCalley, Sarah Turner, Anthony Skjellum 2010 University of Alabama, Birmingham

Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather Mccalley, Sarah Turner, Anthony Skjellum

Journal of Digital Forensics, Security and Law

Phishing continues to grow as phishers discover new exploits and attack vectors for hosting malicious content; the traditional response using takedowns and blacklists does not appear to impede phishers significantly. A handful of law enforcement projects — for example the FBI's Digital PhishNet and the Internet Crime and Complaint Center (ic3.gov) — have demonstrated that they can collect phishing data in substantial volumes, but these collections have not yet resulted in a significant decline in criminal phishing activity. In this paper, a new system is demonstrated for prioritizing investigative resources to help reduce the time and effort expended examining this …


Table Of Contents, 2010 Embry-Riddle Aeronautical University

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Malware Forensics: Discovery Of The Intent Of Deception, Murray Brand, Craig Valli, Andrew Woodward 2010 Edith Cowan University

Malware Forensics: Discovery Of The Intent Of Deception, Murray Brand, Craig Valli, Andrew Woodward

Journal of Digital Forensics, Security and Law

Malicious software (malware) has a wide variety of analysis avoidance techniques that it can employ to hinder forensic analysis. Although legitimate software can incorporate the same analysis avoidance techniques to provide a measure of protection against reverse engineering and to protect intellectual property, malware invariably makes much greater use of such techniques to make detailed analysis labour intensive and very time consuming. Analysis avoidance techniques are so heavily used by malware that the detection of the use of analysis avoidance techniques could be a very good indicator of the presence of malicious intent. However, there is a tendency for analysis …


Table Of Contents, 2010 Embry-Riddle Aeronautical University

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Adaptive Resource Allocation For Cognitive Wireless Ad Hoc Networks, Behdis Eslamnour 2010 Missouri University of Science and Technology

Adaptive Resource Allocation For Cognitive Wireless Ad Hoc Networks, Behdis Eslamnour

Doctoral Dissertations

"Widespread use of resource constrained wireless ad hoc networks requires careful management of the network resources in order to maximize the utilization. In cognitive wireless networks, resources such as spectrum, energy, communication links/paths, time, space, modulation scheme, have to be managed to maintain quality of service (QoS). Therefore in the first paper, a distributed dynamic channel allocation scheme is proposed for multi-channel wireless ad hoc networks with single-radio nodes. The proposed learning scheme adapts the probabilities of selecting each channel as a function of the error in the performance index at each step.

Due to frequent changes in topology and …


Solid State Drives: The Beginning Of The End For Current Practice In Digital Forensic Recovery?, Graeme B. Bell, Richard Boddington 2010 Murdoch University, Perth

Solid State Drives: The Beginning Of The End For Current Practice In Digital Forensic Recovery?, Graeme B. Bell, Richard Boddington

Journal of Digital Forensics, Security and Law

Digital evidence is increasingly relied upon in computer forensic examinations and legal proceedings in the modern courtroom. The primary storage technology used for digital information has remained constant over the last two decades, in the form of the magnetic disc. Consequently, investigative, forensic, and judicial procedures are well-established for magnetic disc storage devices (Carrier, 2005). However, a paradigm shift has taken place in technology storage and complex, transistor-based devices for primary storage are now increasingly common. Most people are aware of the transition from portable magnetic floppy discs to portable USB transistor flash devices, yet the transition from magnetic hard …


Forensic Analysis Of The Windows 7 Registry, Khawla A. Alghafli, Andrew Jones, Thomas A. Martin 2010 Khalifa University of Science, Technology and Research (KUSTAR)

Forensic Analysis Of The Windows 7 Registry, Khawla A. Alghafli, Andrew Jones, Thomas A. Martin

Journal of Digital Forensics, Security and Law

The recovery of digital evidence of crimes from storage media is an increasingly time consuming process as the capacity of the storage media is in a state of constant growth. It is also a difficult and complex task for the forensic investigator to analyse all of the locations in the storage media. These two factors, when combined, may result in a delay in bringing a case to court. The concept of this paper is to start the initial forensic analysis of the storage media in locations that are most likely to contain digital evidence, the Windows Registry. Consequently, the forensic …


The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies 2010 Security Research Centre, Edith Cowan University, Khalifa University of Science, Technology and Research

The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies

Journal of Digital Forensics, Security and Law

The ever increasing use and reliance upon computers in both the public and private sector has led to enormous numbers of computers being disposed of at the end of their useful life within an organisation. As the cost of computers has dropped, their use in the home has also continued to increase. In most organisations, computers have a relatively short life and are replaced on a regular basis with the result that, if not properly cleansed of data, they are released into the public domain containing data that can be relatively up to date. This problem is exacerbated by the …


Integrated Circuit Implementation For A Gan Hfet Driver Circuit, Bo Wang, Jason D. Bakos, Antonello Monti 2010 University of South Carolina - Columbia

Integrated Circuit Implementation For A Gan Hfet Driver Circuit, Bo Wang, Jason D. Bakos, Antonello Monti

Faculty Publications

This paper presents the design and implementation of a new integrated circuit (IC) that is suitable for driving the new generation of high-frequency GaN HFETs. The circuit, based upon a resonant switching transition technique, is first briefly described and then discussed in detail, focusing on the design process practical considerations. A new level-shifter topology, used to generate the zero and negative gate-source voltages required to switch the GaN HFET, is introduced and analyzed. The experimental measurements included in this paper report the results of tests carried out on an IC designed and fabricated as part of the multiproject die in …


Runtime Assertion Checking For Jml On The Eclipse Platform Using Ast Merging, Amritam Sarcar 2010 University of Texas at El Paso

Runtime Assertion Checking For Jml On The Eclipse Platform Using Ast Merging, Amritam Sarcar

Departmental Technical Reports (CS)

The Java Modeling Language (JML) is a formal behavioral interface specification language for Java. It is used for detailed design documentation of Java program modules such as classes and interfaces. JML has been used extensively by many researchers across various projects and has a large and varied spectrum of tool support. It extends from runtime assertion checking (RAC) to theorem proving.

Amongst these tools, RAC and ESC/Java has been used as a common tool for many research projects. RAC for JML is a tool that checks at runtime for possible violations of any specifications. However, lately there has been a …


Estimating Information Amount Under Uncertainty: Algorithmic Solvability And Computational Complexity, Vladik Kreinovich, Gang Xiang 2010 The University of Texas at El Paso

Estimating Information Amount Under Uncertainty: Algorithmic Solvability And Computational Complexity, Vladik Kreinovich, Gang Xiang

Departmental Technical Reports (CS)

Measurement results (and, more generally, estimates) are never absolutely accurate: there is always an uncertainty, the actual value x is, in general, different from the estimate X. Sometimes, we know the probability of different values of the estimation error dx=X-x, sometimes, we only know the interval of possible values of dx, sometimes, we have interval bounds on the cdf of dx. To compare different measuring instruments, it is desirable to know which of them brings more information - i.e., it is desirable to gauge the amount of information. For probabilistic uncertainty, this amount of information is described by Shannon's entropy; …


Development Of Novel Backscatter Communication Systems Using A Multi-Hop Framework And Distributed Beamforming, Vikram Reddy Surendra 2010 Missouri University of Science and Technology

Development Of Novel Backscatter Communication Systems Using A Multi-Hop Framework And Distributed Beamforming, Vikram Reddy Surendra

Masters Theses

"The goal of this thesis it to develop a wireless networking framework for battery-free devices based on passive, backscatter communication. In contrast to traditional, active communication systems, where the radio signal has to be generated using large amount of energy from batteries, the passive systems reflect the RF signal. The information is encoded by modulating the reflected signal, which consumes significantly less energy than active transmission. The existing passive, backscatter systems have limited communication capabilities. For example, the Radio Frequency Identification (RFID) systems support short-distance, direct communication between active reader and passive tags. The communication range is limited due to …


Genome3d: A Viewer-Model Framework For Integrating And Visualizing Multi-Scale Epigenomic Information Within A Three-Dimensional Genome, Thomas M. Asbury, Matt Mitman, Jijun Tang, W. Jim Zheng 2010 University of South Carolina - Columbia

Genome3d: A Viewer-Model Framework For Integrating And Visualizing Multi-Scale Epigenomic Information Within A Three-Dimensional Genome, Thomas M. Asbury, Matt Mitman, Jijun Tang, W. Jim Zheng

Faculty Publications

Background
New technologies are enabling the measurement of many types of genomic and epigenomic information at scales ranging from the atomic to nuclear. Much of this new data is increasingly structural in nature, and is often difficult to coordinate with other data sets. There is a legitimate need for integrating and visualizing these disparate data sets to reveal structural relationships not apparent when looking at these data in isolation.

Results
We have applied object-oriented technology to develop a downloadable visualization tool, Genome3D, for integrating and displaying epigenomic data within a prescribed three-dimensional physical model of the human genome. In order …


Using Jackknife To Assess The Quality Of Gene Order Phylogenies, Jian Shi, Yiwei Zhang, Haiwei Luo, Jijun Tang 2010 University of South Carolina - Columbia

Using Jackknife To Assess The Quality Of Gene Order Phylogenies, Jian Shi, Yiwei Zhang, Haiwei Luo, Jijun Tang

Faculty Publications

Background
In recent years, gene order data has attracted increasing attention from both biologists and computer scientists as a new type of data for phylogenetic analysis. If gene orders are viewed as one character with a large number of states, traditional bootstrap procedures cannot be applied. Researchers began to use a jackknife resampling method to assess the quality of gene order phylogenies.

Results
In this paper, we design and conduct a set of experiments to validate the performance of this jackknife procedure and provide discussions on how to conduct it properly. Our results show that jackknife is very useful to …


Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo 2010 University of Pennsylvania Carey Law School

Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo

Faculty Scholarship at Penn Carey Law

The current debate over broadband policy has largely overlooked a number of changes to the architecture of the Internet that have caused the price paid by and quality of service received by traffic traveling across the Internet to vary widely. Topological innovations, such as private peering, multihoming, secondary peering, server farms, and content delivery networks, have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Moreover, network providers have begun to employ an increasingly varied array of business arrangements. Some of these innovations are responses to the growing importance of peer-to-peer technologies. Others, such …


Transmitter Optimization In Multiuser Wireless Systems With Quality Of Service Constraints, Danda B. Rawat 2010 Old Dominion University

Transmitter Optimization In Multiuser Wireless Systems With Quality Of Service Constraints, Danda B. Rawat

Electrical & Computer Engineering Theses & Dissertations

In this dissertation, transmitter adaptation for optimal resource allocation in wireless communication systems are investigated. First, a multiple access channel model is considered where many transmitters communicate with a single receiver. This scenario is a basic component of a. wireless network in which multiple users simultaneously access the resources of a wireless service provider. Adaptive algorithms for transmitter optimization to meet Quality-of-Service (QoS) requirements in a distributed manner are studied. Second, an interference channel model is considered where multiple interfering transmitter-receiver pairs co-exist such that a given transmitter communicates with its intended receiver in the presence of interference from other …


Digital Commons powered by bepress