Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

The Revised 40 Principles For Software Inventions, Umakant Mishra Jul 2006

The Revised 40 Principles For Software Inventions, Umakant Mishra

Umakant Mishra

Applying 40 Principles is one of the earliest and most popular techniques of TRIZ. There are no controversies on application of 40 principles by any of the TRIZ schools. Although they are fundamentally sound, there is some difficulty in applying those in software related problems. As they were originally developed for mechanical or technical problems, the meaning of many terms like 'thermal', 'aerodynamic', 'hydrodynamic', 'ultrasonic', 'infrared', 'temperature', 'liquid', 'gas' etc. are embarrassing in a software context.

This article reviews the 40 principles in the context of software industry and rephrases the principles and their applications to make them suitable for …


Fedora: An Architecture For Complex Objects And Their Relationships, Carl Lagoze, Sandy Payette, Edwin Shin, Chris Wilper Apr 2006

Fedora: An Architecture For Complex Objects And Their Relationships, Carl Lagoze, Sandy Payette, Edwin Shin, Chris Wilper

Edwin Shin

The Fedora architecture is an extensible framework for the storage, management, and dissemination of complex objects and the relationships among them. Fedora accommodates the aggregation of local and distributed content into digital objects and the association of services with objects. This allows an object to have several accessible representations, some of them dynamically produced. The architecture includes a generic Resource Description Framework (RDF)-based relationship model that represents relationships among objects and their components. Queries against these relationships are supported by an RDF triple store. The architecture is implemented as a web service, with all aspects of the complex object architecture …


Mac Os X Forensics, Philip Craiger, Paul Burke Dec 2005

Mac Os X Forensics, Philip Craiger, Paul Burke

J. Philip Craiger, Ph.D.

This paper describes procedures for conducting forensic examinations of Apple Macs running Mac OS X. The target disk mode is used to create a forensic duplicate of a Mac hard drive and preview it. Procedures are discussed for recovering evidence from allocated space, unallocated space, slack space and virtual memory. Furthermore, procedures are described for recovering trace evidence from Mac OS X default email, web browser and instant messaging applications, as well as evidence pertaining to commands executed from a terminal.


Assessing Trace Evidence Left By Secure Deletion Programs, Paul Burke, Philip Craiger Dec 2005

Assessing Trace Evidence Left By Secure Deletion Programs, Paul Burke, Philip Craiger

J. Philip Craiger, Ph.D.

Secure deletion programs purport to permanently erase files from digital media. These programs are used by businesses and individuals to remove sensitive information from media, and by criminals to remove evidence of the tools or fruits of illegal activities. This paper focuses on the trace evidence left by secure deletion programs. In particular, five Windows-based secure deletion programs are tested to determine if they leave identifiable signatures after deleting a file. The results show that the majority of the programs leave identifiable signatures. Moreover, some of the programs do not completely erase file metadata, which enables forensic investigators to extract …