Filter your results
- 6
- 6
- 6
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 2
- 1
- 1
- 1
- 3
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
6 results
|
|
sorted by
|
|
FRAGMENTED JPEG FILE RECOVERY USING PSEUDO HEADERS11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.215-231, ⟨10.1007/978-3-319-24123-4_13⟩
Conference papers
hal-01449060v1
|
||
|
Scale-Adaptable Recrawl Strategies for DHT-based Distributed Web Crawling SystemIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.91-105, ⟨10.1007/978-3-642-15672-4_9⟩
Conference papers
hal-01054954v1
|
||
|
Cognitive Radio Access Optimization Using Multi-parameter Match Ability Estimation9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.483-493, ⟨10.1007/978-3-642-21560-5_40⟩
Conference papers
hal-01583656v1
|
||
|
Semantic Video Carving Using Perceptual Hashing and Optical Flow13th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2017, Orlando, FL, United States. pp.223-244, ⟨10.1007/978-3-319-67208-3_13⟩
Conference papers
hal-01716410v1
|
||
|
Proof Guidance in PVS with Sequential Pattern Mining8th International Conference on Fundamentals of Software Engineering (FSEN), May 2019, Tehran, Iran. pp.45-60, ⟨10.1007/978-3-030-31517-7_4⟩
Conference papers
hal-03769130v1
|
||
|
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.129-142, ⟨10.1007/978-3-642-33962-2_9⟩
Conference papers
hal-01523716v1
|