Skip to search formSkip to main contentSkip to account menu

DoD Cyber Crime Center

Known as: DCCI, Defense Computer Forensics Laboratory, Department of Defense Cyber Crime Center 
DC3 is designated as a national cyber center by National Security Presidential Directive 54/Homeland Security Presidential Directive 27, as a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Since its start in 1971, the United Arab Emirates (UAE) has continually been distinguished as a portrait for innovation. It is… 
2016
2016
Field-programmable gate arrays are becoming one of the implementation platforms of choice for computationally intensive embedded… 
2015
2015
This study presents investment cost estimates for three different gasification based biofuel production systems producing… 
2015
2015
Work, to an increasing amount, is based on collaboration between different partners; collaboration emphasizes the importance of… 
2015
2015
Federico Scarpaa, Andrea P. Reverberib, Luca A. Tagliaficoa, Bruno Fabiano*,c aUniversity of Genoa, DIME/TEC Thermal Energy and… 
2013
2013
Contexts are often inconsistent in pervasive computing environments, owing to many heterogeneous devices with limited processing… 
2011
2011
For the purposes of this essay, I have tried to adhere to a few conventions to make the reading easier. When referring… 
2004
2004
$^{a}$C.-W. Chen, T.-C. Tsai, and B.-C. Chang, Chem. Phys. Lett. 347, 73 (2001). $^{b}$C.-L. Lee, M.-L. Liu, and B.-C. Chang, J… 
1997
1997
Most computer system problems today are caused by change. Change is an innate characteristic of an active computer system. This…