Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Michael McCarrin"'
Autor:
Woen-Sug Choi, Derek R. Olson, Duane Davis, Mabel Zhang, Andy Racson, Brian Bingham, Michael McCarrin, Carson Vogt, Jessica Herman
Publikováno v:
Frontiers in Robotics and AI, Vol 8 (2021)
One of the key distinguishing aspects of underwater manipulation tasks is the perception challenges of the ocean environment, including turbidity, backscatter, and lighting effects. Consequently, underwater perception often relies on sonar-based meas
Externí odkaz:
https://doaj.org/article/45a4cee9db3e43318a783d51f0b90782
Autor:
Duane Davis, Michael McCarrin, Brian Bingham, Andy Racson, Woen-Sug Choi, Carson Vogt, Mabel M. Zhang, Jessica Herman, Derek R. Olson
Publikováno v:
Frontiers in Robotics and AI, Vol 8 (2021)
Frontiers in Robotics and AI
Frontiers in Robotics and AI
17 USC 105 interim-entered record; under review. The article of record as published may be found at https://doi.org/10.3389/frobt.2021.706646 One of the key distinguishing aspects of underwater manipulation tasks is the perception challenges of the o
Autor:
Joseph T. Klamo, Brian Bingham, Tyler Lum, Carlos Aguero, Joshua Malia, Kevin Allen, Michael McCarrin, Rumman Waqar, Marshall Rawson
Publikováno v:
OCEANS 2019 MTS/IEEE SEATTLE.
Simulation plays an important role in the development, testing and evaluation of new robotic applications, reducing implementation time, cost and risk. For much of the robotics community, the open-source Gazebo robot simulator has emerged as the de f
A shortened version of this paper appeared in the Proceedings of the Ninth EAI International Conference on Digital Forensics and Computer Crime, Prague, Czech Republic, October 2017. The article of record as published may be found at http://dx.doi.or
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ae5d28f0c8cf2c5a6036b5e729a703c4
https://hdl.handle.net/10945/61135
https://hdl.handle.net/10945/61135
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319736969
ICDF2C
ICDF2C
Memory acquisition is essential to defeat anti-forensic operating system features and investigate clever cyberattacks that leave little or no evidence on physical storage media. The forensic community has developed tools to acquire physical memory fr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f00db5580e2102cec50679935d071ed9
https://doi.org/10.1007/978-3-319-73697-6_13
https://doi.org/10.1007/978-3-319-73697-6_13
Autor:
Michael McCarrin, Simson L. Garfinkel
Publikováno v:
IEEE Security & Privacy. 12:22-28
On 27 December 2013, the US Court of Appeals for the Ninth Circuit issued an opinion that intercepting data from unencrypted wireless local area networks--Wi-Fi sniffing--can violate the US Wiretap Act. The case centers on a Wi-Fi sniffer that was pr
Drives found during investigations often have useful information in the form of email addresses which can be acquired by search in the raw drive data independent of the file system. Using this data we can build a picture of the social networks that a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d379ebda5ea749e1cbe8492ae36aaa85
https://hdl.handle.net/10945/50618
https://hdl.handle.net/10945/50618
Autor:
Simson L. Garfinkel, Michael McCarrin
The article of record as published may be found at https://doi.org/10.1016/j.diin.2015.05.001 Hash-based carving is a technique for detecting the presence of specific “target files” on digital media by evaluating the hashes of individual data blo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b42822c0e45fa8717af4ea83afe90636
https://hdl.handle.net/10945/65217
https://hdl.handle.net/10945/65217
This document provides a definition of and terminology for approximate matching. Approximate matching is a promising technology designed to identify similarities between two digital artifacts. It is used to find objects that resemble each other or to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2faa807d20b3101818b3f8b96008b74f
https://doi.org/10.6028/nist.sp.800-168
https://doi.org/10.6028/nist.sp.800-168
Autor:
LIANHUA CHI1 lianhuac@au1.ibm.com, XINGQUAN ZHU2 xzhu3@fau.edu
Publikováno v:
ACM Computing Surveys. Jan2018, Vol. 50 Issue 1, p1-36. 36p. 13 Diagrams, 8 Charts.