Search Results

You are looking at 1 - 3 of 3 items for :

  • Computer Sciences, other x
Clear All
Open access

Stephan Heuser, Bradley Reaves, Praveen Kumar Pendyala, Henry Carter, Alexandra Dmitrienko, William Enck, Negar Kiyavash, Ahmad-Reza Sadeghi and Patrick Traynor

-Cartigny.Closed-circuit unobservable Voice over IP. In Annual Computer Security Applications Conference. IEEE, 2007. [5] Android Developers Documentation. Android Debug Bridge. [6] V. A. Balasubramaniyan, A. Poonawalla, M. Ahamad, M. T.Hunter, and P. Traynor. PinDr0P: using single-ended audio features to determine call provenance. In ACM Conference on Computer and Communications Security, 2010. [7] M. Baugher. The Secure Real-time Transport Protocol (SRTP). IETF RFC 3711, Mar. 2013. https

Open access

Weijia Xu, Maria Esteva, Jessica Trelogan and Dan Wu

between machine learning, cyberinfrastructure and digital library is an important step to achieve smart data and information management. However, there is lack of mediums and forums that bring together researchers and practitioners to share visions, questions, latest advances in methodology, application experiences, and best practices. Library and archival professionals are often unfamiliar with cyberinfrastructure. In turn, cyberinfrastructure experts lack experience in traditional digital library and archives practices such as metadata, provenance, publishing

Open access

Maria Esteva, Ramona L. Walls, Andrew B. Magill, Weijia Xu, Ruizhu Huang, James Carson and Jawon Song

functions create a representation of a dataset’s provenance and evolution. IDS can be used by researchers to track data stored at multiple locations, and vice versa, by repositories and data stores to continue tracking the evolution of the datasets. This paper is organized as follows. In the Related Work section, we discuss authenticity as the conceptual framework for IDS, and review how different repository and data management projects support identity functions and implement data models. Along with each point, we clarify the novel contributions brought by IDS. In the