969 resultados para computer evidence


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis examines whether the rules for of evidence, which were developed around paper over centuries, are adequate for the authentication of electronic evidence. The history of documentary evidence is examined, and the nature of electronic evidence is explored, particularly recent types of electronic evidence such as social media and 'the Cloud'. The old rules are then critically applied to the varied types of electronic evidence to determine whether or not these old rules are indeed adequate.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Jacalin [Artocarpus integrifolia (jack fruit) agglutinin] is made up of two types of chains, heavy and light, with M(r) values of 16,200 +/- 1200 and 2090 +/- 300 respectively (on the basis of gel-permeation chromatography under denaturing conditions). Its complete amino acid sequence was determined by manual degradation using a 4-dimethylaminoazobenzene 4'-isothiocyanate double-coupling method. Peptide fragments for sequence analysis were obtained by chemical cleavages of the heavy chain with CNBr, hydroxylamine hydrochloride and iodosobenzoic acid and enzymic cleavage with Staphylococcus aureus proteinase. The peptides were purified by a combination gel-permeation and reverse-phase chromatography. The light chains, being only 20 residues long, could be sequenced without fragmentation. Amino acid analyses and carboxypeptidase-Y-digestion C-terminal analyses of the subunits provided supportive evidence for their sequence. Computer-assisted alignment of the jacalin heavy-chain sequence failed to show sequence similarity to that of any lectin for which the complete sequence is known. Analyses of the sequence showed the presence of an internal repeat spanning residues 7-64 and 76-130. The internal repeat was found to be statistically significant.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A Monte Carlo simulation is performed to study the dependence of collision frequency on interparticle distance for a system composed of two hard-sphere particles. The simulation quantitatively shows that the collision frequency drops down sharply as the distance between two particles increases. This characteristic provides a useful evidence for the collision-reaction dynamics of aggregation process for the two-particle system described in the other reference.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

There is increasing adoption of computer-based tools to support the product development process. Tolls include computer-aided design, computer-aided manufacture, systems engineering and product data management systems. The fact that companies choose to invest in tools might be regarded as evidence that tools, in aggregate, are perceived to possess business value through their application to engineering activities. Yet the ways in which value accrues from tool technology are poorly understood.

This report records the proceedings of an international workshop during which some novel approaches to improving our understanding of this problem of tool valuation were presented and debated. The value of methods and processes were also discussed. The workshop brought together British, Dutch, German and Italian researchers. The presenters included speakers from industry and academia (the University of Cambridge, the University of Magdeburg and the Politechnico de Torino)

The work presented showed great variety. Research methods include case studies, questionnaires, statistical analysis, semi-structured interviews, deduction, inductive reasoning, the recording of anecdotes and analogies. The presentations drew on financial investment theory, the industrial experience of workshop participants, discussions with students developing tools, modern economic theories and speculation on the effects of company capabilities.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

C.G.G. Aitken, Q. Shen, R. Jensen and B. Hayes. The evaluation of evidence for exponentially distributed data. Computational Statistics & Data Analysis, vol. 51, no. 12, pp. 5682-5693, 2007.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

J. Keppens, Q. Shen and B. Schafer. Probabilistic abductive computation of evidence collection strategies in crime investigation. Proceedings of the 10th International Conference on Artificial Intelligence and Law, pages 215-225.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div can determine whether one of them was generated by the forger. Surprisingly, this is possible even after the adversary has inconspicuously learned (exposed) some-or even all-the secrets in the system. In this case, it might be impossible to tell which signature is generated by the legitimate signer and which by the forger. But at least the fact of the tampering will be made evident. We define several variants of tamper-evidence, differing in their power to detect tampering. In all of these, we assume an equally powerful adversary: she adaptively controls all the inputs to the legitimate signer (i.e., all messages to be signed and their timing), and observes all his outputs; she can also adaptively expose all the secrets at arbitrary times. We provide tamper-evident schemes for all the variants and prove their optimality. Achieving the strongest tamper evidence turns out to be provably expensive. However, we define a somewhat weaker, but still practical, variant: α-synchronous tamper-evidence (α-te) and provide α-te schemes with logarithmic cost. Our α-te schemes use a combinatorial construction of α-separating sets, which might be of independent interest. We stress that our mechanisms are purely cryptographic: the tamper-detection algorithm Div is stateless and takes no inputs except the two signatures (in particular, it keeps no logs), we use no infrastructure (or other ways to conceal additional secrets), and we use no hardware properties (except those implied by the standard cryptographic assumptions, such as random number generators). Our constructions are based on arbitrary ordinary signature schemes and do not require random oracles.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The dorsomedial prefrontal cortex (DMPFC) plays a central role in aspects of cognitive control and decision making. Here, we provide evidence for an anterior-to-posterior topography within the DMPFC using tasks that evoke three distinct forms of control demands--response, decision, and strategic--each of which could be mapped onto independent behavioral data. Specifically, we identify three spatially distinct regions within the DMPFC: a posterior region associated with control demands evoked by multiple incompatible responses, a middle region associated with control demands evoked by the relative desirability of decision options, and an anterior region that predicts control demands related to deviations from an individual's preferred decision-making strategy. These results provide new insight into the functional organization of DMPFC and suggest how recent controversies about its role in complex decision making and response mapping can be reconciled.

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This Acknowledgement refers to the special issue "Formal Approaches to Legal Evidence" of the Artificial Intelligence and Law, September 2001, Vol. 9, Issue 2-3, which was guest edited by Ephraim Nissan.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This special issue "Formal Approaches to Legal Evidence" of the Artificial Intelligence and Law, September 2001, Vol. 9, Issue 2-3, which was guest edited by Ephraim Nissan.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Can learning quality be maintained in the face of increasing class size by the use of Computer Supported Co-operative Learning (CSCL) technologies? In particular, can Computer-Mediated Communication promote critical thinking in addition to surface information transfer? We compared face-to-face seminars with asynchronous computer conferencing in the same Information Management class. From Garrison's theory of critical thinking and Henri's critical reasoning skills, we developed two ways of evaluating critical thinking: a student questionnaire and a content analysis technique. We found evidence for critical thinking in both situations, with some subtle differences in learning style. This paper provides an overview of this work.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Can learning quality be maintained in the face of increasing class size by the use of Computer Supported Co-operative Learning (CSCL) technologies? In particular, can Computer-Mediated Communication promote critical thinking in addition to surface information transfer? We compared face-to-face seminars with asynchronous computer conferencing in the same Information Management class. From Garrison's theory of critical thinking and Henri's critical reasoning skills, we developed two ways of evaluating critical thinking: a student questionnaire and a content analysis technique. We found evidence for critical thinking in both situations, with some subtle differences in learning style. This paper provides an overview of this work.

Relevância:

30.00% 30.00%

Publicador: