Muutke küpsiste eelistusi

E-raamat: Computational Forensics: Second International Workshop, IWCF 2008, Washington, DC, USA, August 7-8, 2008, Proceedings

Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This Lecture Notes in Computer Science (LNCS) volume contains the papers presented at the Second International Workshop on Computational Forensics (IWCF 2008), held August 78, 2008. It was a great honor for the organizers to host this scienti c event at the renowned National Academy of Sciences: Keck Center in Washington, DC, USA. Computational Forensics is an emerging research domain focusing on the investigation of forensic problems using computational methods. Its primary goalis the discoveryand advancement of forensicknowledgeinvolving modeling, computer simulation, and computer-based analysis and recognition in studying and solving forensic problems. The Computational Forensics workshop series is intended as a forum for researchers and practitioners in all areas of computational and forensic sciences. This forum discusses current challenges in computer-assisted forensic investi- tions and presents recent progress and advances. IWCF addresses a broad spectrum of forensic disciplines that use computer tools for criminal investigation. This years edition covers presentations on c- putational methods for individuality studies, computer-based3D processing and analysis of skulls and human bodies, shoe print preprocessing and analysis, n- ural language analysis and information retrieval to support law enforcement, analysis and group visualization of speech recordings, scanner and print device forensics, and computer-based questioned document and signature analysis.
Trends and Challenges.- Computational Forensics: An Overview.-
Computational Methods for Determining Individuality.- Scanner, Printer, and
Prints.- Survey of Scanner and Printer Forensics at Purdue University.-
Evaluation of Graylevel-Features for Printing Technique Classification in
High-Throughput Document Management Systems.- Document Signature Using
Intrinsic Features for Counterfeit Detection.- Human Identification.-
Automatic Feature Extraction from 3D Range Images of Skulls.- 3D Processing
and Visualization of Scanned Forensic Data.- Person Identification Based on
Barefoot 3D Sole Shape.- Shoeprints.- Computerized Matching of Shoeprints
Based on Sole Pattern.- Shoe-Print Extraction from Latent Images Using CRF.-
Linguistics.- Finding Identity Group Fingerprints in Documents.- Supporting
Law Enforcement in Digital Communities through Natural Language Analysis.- An
Intelligent System for Semantic Information Retrieval Information from
Textual Web Documents.- Decision Making and Search.- Support of Interviewing
Techniques in Physical Access Control Systems.- Application of q-Gram
Distance in Digital Forensic Search.- Speech Analysis.- Similarity
Visualization for the Grouping of Forensic Speech Recordings.- Handwritten
Signature and Speech: Preliminary Experiments on Multiple Source and
Classifiers for Personal Identity Verification.- Signatures and Handwriting.-
Signature Verification Using a Bayesian Approach.- Stroke-Morphology Analysis
Using Super-Imposed Writing Movements.- Invariants Discretization for
Individuality Representation in Handwritten Authorship.