405 research outputs found

    Detection and Identification of Software Encryption Solutions in NT-based Microsoft Windows Operating Systems

    Get PDF
    As encrypted information is very difficult or impossible to reconstruct, there are many situations in which it is critical to detect the presence of encryption software before a computer is shut down. Currently there is no solution that reliably identifies installed encryption software.;For this investigation, thirty encryption software products for Microsoft Windows based on the NT-kernel have been identified and investigated. Operating system dependent factors such as registry, file attributes, operating system attributes, process list analysis and independent factors such as file headers, keyword search, Master Boot Record analysis as well as hashing of software components were investigated and allow the identification of these programs. The most reliable detection rate is achieved through a combination of the aforementioned factors

    Term-driven E-Commerce

    Get PDF
    Die Arbeit nimmt sich der textuellen Dimension des E-Commerce an. Grundlegende Hypothese ist die textuelle Gebundenheit von Information und Transaktion im Bereich des elektronischen Handels. Überall dort, wo Produkte und Dienstleistungen angeboten, nachgefragt, wahrgenommen und bewertet werden, kommen natürlichsprachige Ausdrücke zum Einsatz. Daraus resultiert ist zum einen, wie bedeutsam es ist, die Varianz textueller Beschreibungen im E-Commerce zu erfassen, zum anderen können die umfangreichen textuellen Ressourcen, die bei E-Commerce-Interaktionen anfallen, im Hinblick auf ein besseres Verständnis natürlicher Sprache herangezogen werden

    Data Hiding and Its Applications

    Get PDF
    Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others

    Proceedings, MSVSCC 2013

    Get PDF
    Proceedings of the 7th Annual Modeling, Simulation & Visualization Student Capstone Conference held on April 11, 2013 at VMASC in Suffolk, Virginia

    Writing as Material Practice: Substance, Surface and Medium

    Get PDF
    Writing as Material Practice grapples with the issue of writing as a form of material culture in its ancient and more recent manifestations, and in the contexts of production and consumption. Fifteen case studies explore the artefactual nature of writing — the ways in which materials, techniques, colour, scale, orientation and visibility inform the creation of inscribed objects and spaces, as well as structure subsequent engagement, perception and meaning making. Covering a temporal span of some 5000 years, from c.3200 BCE to the present day, and ranging in spatial context from the Americas to the Near East, the chapters in this volume bring a variety of perspectives which contribute to both specific and broader questions of writing materialities. The authors also aim to place past graphical systems in their social contexts so they can be understood in relation to the people who created and attributed meaning to writing and associated symbolic modes through a diverse array of individual and wider social practices

    Hypertextual Ultrastructures: Movement and Containment in Texts and Hypertexts

    Get PDF
    The surface-level experience of hypertextuality as formless and unbounded, blurring boundaries among texts and between readers and writers, is created by a deep structure which is not normally presented to readers and which, like the ultrastructure of living cells, defines and controls texts' nature and functions. Most readers, restricted to surface-level interaction with texts, have little access to the deep structure of any hypertext. In this dissertation, I argue that digital hypertexts differ essentially from paper texts in that hypertexts are constructed in multiple layers, with surface-level appearance and behavior controlled by sub-surface ultrastructure, and that these multiple layers of structure enable and necessitate new methods of textual study designed for digital texts. Using participant-observation from within my own practice as a webmaster, I closely examine the sub-surface structural layers that create several kinds of Web-based digital hypertexts: blogs, forums, static Web pages, and dynamic Web pages. With these hypertexts as the primary models, along with their enabling software and additional digital texts-wikis, news aggregators, word processing documents, digital photographs, electronic mail, electronic forms-available to me as a reader/author rather than a webmaster, I demonstrate methods of investigating and describing the development of digital texts. These methods, like methods already established within textual studies to trace the development of printed texts, can answer questions about accidental and intentional textual change, the roles of collaborators, and the ways texts are shaped by production processes and mediating technologies. As a step toward a formalist criticism of hypertext, I propose concrete ways of categorizing, describing, and comparing hypertexts and their components. I also demonstrate techniques for visualizing the structures, histories, and interrelationships of hypertexts and explore methods of using self-descriptive surface elements in paper-like texts as partial substitutes for the sub-surface self-description available in software-like texts. By identifying digitization as a gateway to cooperation between human and artificial intelligences rather than an end in itself, I suggest natural areas of expansion for the humanities computing collaboration as well as new methodologies by which originally-printed texts can be studied in their digital forms alongside originally-digital texts

    Европейский и национальный контексты в научных исследованиях

    Get PDF
    В настоящем электронном сборнике «Европейский и национальный контексты в научных исследованиях. Технология» представлены работы молодых ученых по геодезии и картографии, химической технологии и машиностроению, информационным технологиям, строительству и радиотехнике. Предназначены для работников образования, науки и производства. Будут полезны студентам, магистрантам и аспирантам университетов.=In this Electronic collected materials “National and European dimension in research. Technology” works in the fields of geodesy, chemical technology, mechanical engineering, information technology, civil engineering, and radio-engineering are presented. It is intended for trainers, researchers and professionals. It can be useful for university graduate and post-graduate students

    CBSE: an implementation case study

    Get PDF
    Over the last couple of years, the shift towards component based software engineering (CBSE) methods has become a cost effective way to get an application to implementation stage much earKer. Adoption of Component Based Development methods acknowledges the use of third party components wherever possible to reduce the cost of software development, shorten the development phase and provide a richer set of processing options for the end user. The use of these tools is particularly relevant in Web based applications, where commercial off the shelf (COTS) products are so prevalent. However, there are a number of risks associated with the use of component based development methods. This thesis investigates these risks within the context of a software engineering project and attempts to provide a means to minimise and or at least manage the risk potential when using component based development method
    corecore