Wirespeed: Extending the AFF4 Forensic Container Format for Scalable Acquisition and Live Analysis

Total Page:16

File Type:pdf, Size:1020Kb

Wirespeed: Extending the AFF4 Forensic Container Format for Scalable Acquisition and Live Analysis Digital Investigation 14 (2015) S45eS54 Contents lists available at ScienceDirect Digital Investigation journal homepage: www.elsevier.com/locate/diin DFRWS 2015 US Wirespeed: Extending the AFF4 forensic container format for scalable acquisition and live analysis Bradley L. Schatz Schatz Forensic, Level 10 149 Wickham Tce Brisbane, QLD 4000, Australia abstract Keywords: Current approaches to forensic acquisition are failing to scale to large devices and fast Digital forensics storage interfaces. The research described in this paper identifies limitations in current Evidence containers widely deployed forensic image formats which limit both the ability to acquire evidence at Live forensics maximal rates, and to undertake live analysis in today's environment. Extensions to the Acquisition AFF4 forensic file format are proposed which address these limitations. The proposals have Imaging AFF4 been implemented and proof of concept demonstrated by demonstrating that non-linear partial images may be taken at rates that exceed current physical acquisition ap- proaches, and by demonstrating linear acquisition at rates significantly exceeding current approaches: in the range of 400 MB/se500 MB/s (24e30 GB/min). © 2015 The Authors. Published by Elsevier Ltd on behalf of DFRWS. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Introduction in regard to acquisition throughput. Zimmerman (2013) observes far lower rates of in the low 100's of MB/s, and Within the field of digital forensics the volume problem Bertasi and Zago (2013) observes peak rates of 110 MB/s. is well recognized: more devices and larger storage com- Source devices with I/O rates exceeding the commodity pound the amount of data to preserve and analyse per case. SATA hard drive threshold of around 200 MB/s are In 2015, storage technology exhibits a significant amount of increasingly common. Formerly it may have only been diversity: the capacity of spinning disk hard drives grows at servers with RAID subsystems which produced this load; a rate faster than I/O rates; SSD's are capable of I/O rates today's SSD's, and in-cloud virtual attached storage many times faster than their spinning disk cousins; and commonly double this rate. Acquisition of such devices storage is increasingly absent a direct attachment, located commonly proceeds at rates far lower than the maximum I/ across comparatively low I/O rate networks, such as cloud O rate of such devices. based storage. The above trends result in bandwidth constrained Forensic acquisition has failed to scale with this growth spinning disks longer acquisition times, and in the band- in both volume and I/O rates. In practice, forensic imaging width rich devices, sub optimal acquisition durations. Both remains generally reliant on the imaging approach defined of these contribute to latency between the identification of over a decade ago e the linear and complete image, target evidential devices and the gaining of meaningful integrity protected by a hash, and optionally block com- analytic results, due in part to lack of cohesion between pressed (Rosen, 2002). In the field, the dominant methods forensic processing steps (Roussev et al., 2013). of imaging generally achieve I/O rates in the realm of Current responses to minimize this latency when facing 100e150 MB/s, with hardware imaging tool manufacturers very large sets of evidence fail to be wholly satisfactory to beginning to promise speeds of a maximum of 250 MB/s the practitioner: preserve a limited subset of available ev- (Tableau, 2014). Few empirical studies exist in the literature idence and run the risk of not preserving potentially rele- vant evidence (triage), or cause significant availability E-mail address: [email protected]. impacts on computing resources while complete imaging http://dx.doi.org/10.1016/j.diin.2015.05.016 1742-2876/© 2015 The Authors. Published by Elsevier Ltd on behalf of DFRWS. This is an open access article under the CC BY-NC-ND license (http:// creativecommons.org/licenses/by-nc-nd/4.0/). S46 B.L. Schatz / Digital Investigation 14 (2015) S45eS54 of everything proceeds. Current research proposals hard disk. These interactive accesses are prioritized by a addressing this end to end latency issue are scarce. The scheduler ahead of other accesses. LOTA (Roussev et al., 2013) proposal goes far in conceptu- The analyst might also task the acquisition of various alizing the problem as a real time processing problem, categories of data via a separate GUI controlling the however, due to the requirement for low hundreds of CPU acquisition process: our current implementation allows for cores per target device being processed, the proposed file subsets such as event logs, registries & page files, and approach is generally only applicable to in-lab usage, wider categories such as all allocated data, and unallocated limiting its application to evidence seized (collected) from data. This enables the analyst to successively widen the the field and processed within the laboratory. scope of acquisition as their live analysis activities proceed. The primary hypotheses of this research are that latency Further, live analysis might result in the determination that between the beginning of acquisition and the obtaining of the target device is not relevant, and the acquisition process analysis results can be reduced by reframing acquisition as terminated, the resulting partial image remaining as a basis a (potentially) partial and non-linear activity, and by for reproducing the said analysis. employing a forensic image format that enables the former while not creating bottlenecks. We posit that for contexts where seizure is not an option Maximizing acquisition rate (for example Civil, covert, Incident Response, and at scale of hundreds of machines) this latency can be minimized in Maximizing the rate at which the above non-linear two ways. First, by employing a forensic container format sequence of blocks might be assembled into a forensic that enables acquisition to proceed at maximal I/O rates. image is a systems problem involving a range of variables, Secondly, by re-conceptualizing forensic acquisition as a including: process which occurs hand in hand with live analysis. Computationally feasible analysis tasks, and live analysis The maximal I/O rate of the target device; tasks which traditionally fall in the domain of triage ac- The maximal I/O rate of the target device interface; tivities or live preview, are applied as a priority, contrib- The method of hashing; uting to the incremental building of a partial (or eventually The number of cores and CPU speed; full) physical image. The method of compression; Improvements to the AFF4 forensic container which The path taken in reading disk blocks; resolve the identified shortcomings are proposed, and their The available I/O interconnects to the image storage effectiveness evaluated through a systematic set of exper- device; iments focused on high input rate acquisition. The maximal write rate of the filesystem implementation Motivation The maximal write rate of the evidence container device. This section describes at a high level our acquisition and live analysis system (which we call Wirespeed), the Depending on budgetary constraints, it is reasonable to implementation and testing of which has identified the believe that on a small scale the examiner may be able to shortcomings in existing forensic containers described control the majority of these. For example an analyst later in this paper. We note that the architecture of the employing a removed dead disk acquisition using a forensic Wirespeed system is the subject of a separate publication. media duplicator (“drive cloner”) in the field has control over many of the above but the maximal I/O rates of the target device and its storage interface. Acquisition as an interactive & batch process In the field and at a scale of numerous devices, examiners are regularly faced with far less control over these variables: Fundamental to our proposal is the idea that the scope budgetary constraints will limit the number of forensic du- of acquisition should be subject to change and prioritized plicators able to copy removed dead disks in parallel. Com- based on live analysis activities of the examiner, and more mon responses to these pressures are the usage of forensic generally by categories of forensic data identified for live-CD's to employ in-situ dead disk techniques, necessi- acquisition. Starting with an empty forensic image, the tating the usage of the CPU and I/O channels of the target image is successively built from target blocks, first of vol- system. For such approaches, combined with old server ume metadata and then filesystem metadata. A non-linear, hardware, acquiring via USB2 (max 40 MB/s) is, while not partial image is foundational to such an approach. desirable, still in 2015 a reasonable option. Blocks are then preserved into the image based on two It is well understood in the literature that for at least separate activities. spinning disks, the I/O rate of reads from the disk is An analyst might conduct a live analysis of the storage maximal for reads of long runs of consecutive blocks, device via a virtual disk (i.e. iSCSI) interface to the image e with seeks imposing a significant penalty in throughput. blocks present in the partial image are returned to the Accordingly, we adopt a priority based scheduling analyst's preferred tool directly via the virtual hard disk, approach that prioritises interactive analysis over non- and blocks not present in the image are scheduled for interactive acquisition goals, and scheduling the reading reading from the target device, and when read, stored in of blocks and caching in RAM to minimize disk seeks in the image and returned to the analyst's tool via the virtual acquiring non-linear block sequences.
Recommended publications
  • ZN1A-M4 M6DTFN3 Specifications
    ganzsecurity.com 1080p & 5 MP IR IP Mini Domes w/ GXi Embedded Intelligence ZN1A-M4DTFN3 / M6DTFN3 Features: • 1080p & 5 Megapixel @ 30fps • VCA Technology Video Analytics Network Devices • 1/2.8” SONY STARVIS Exmor Sensor • Superior Low Light Performance • True Day / Night and WDR • SMART Bitrate Control & Region of Interest • 2.8mm Fixed Lens • 2 IR LEDs up to 59’ Range ganzsecurity.com ZN1A-M4/6DTFN3 1080p & 5MP IR IP Mini Domes w/ GXi Embedded Intelligence Specifications (Part 1) Model ZN1A-M4DTFN3 ZN1A-M6DTFN3 Image Sensor 1/2.8” SONY STARVIS Exmor 2.13MP CMOS 1/2.8” SONY STARVIS Exmor 5MP CMOS Effective Pixels 1920 x 1080 2592 x 1944 Scanning System Progressive scanning AGC Control Auto Iris Type Auto-Iris Minimum Illumination Color: 0.03 Lux (DSS on) / B/W : 0 Lux (IR on) Camera Lens 2.8mm, F2.0 Fixed Lens Angle of View Horizontal: Approx. 115° / Vertical Approx. 64° Shutter Speed Automatic / Manual: 1/30 ~ 1/32,000, Anti-Flicker, Slow Shutter (1/2, 1/3, 1/5, 1/6, 1/7.5, 1/10) Day/Night Performance True Day / Night (ICR) Wide Dynamic Range True WDR, 120dB S/N Ratio 50 dB Video Compression H.265, H.264 Baseline, Main, High profile, MJPEG (Motion JPEG) Multiple Profile 2592 x 1944 @30fps & 480 @30 fps 1080p @30fps & D1(704x480 or 704x576) @30fps Streaming Performance with H.264, H265 & MJPEG with H.264, H.265 & MJPEG Max Resolution 1920 x 1080 2592 x 1944 Video Bit Rate 100Kbps ~ 10Mbps Multi-rate for Preview and Recording Video Bit Rate Control Multi Streaming CBR/VBR @ H.264 (Controllable frame rate and Bandwidth) Digital Noise
    [Show full text]
  • Abkürzungs-Liste ABKLEX
    Abkürzungs-Liste ABKLEX (Informatik, Telekommunikation) W. Alex 1. Juli 2021 Karlsruhe Copyright W. Alex, Karlsruhe, 1994 – 2018. Die Liste darf unentgeltlich benutzt und weitergegeben werden. The list may be used or copied free of any charge. Original Point of Distribution: http://www.abklex.de/abklex/ An authorized Czechian version is published on: http://www.sochorek.cz/archiv/slovniky/abklex.htm Author’s Email address: [email protected] 2 Kapitel 1 Abkürzungen Gehen wir von 30 Zeichen aus, aus denen Abkürzungen gebildet werden, und nehmen wir eine größte Länge von 5 Zeichen an, so lassen sich 25.137.930 verschiedene Abkür- zungen bilden (Kombinationen mit Wiederholung und Berücksichtigung der Reihenfol- ge). Es folgt eine Auswahl von rund 16000 Abkürzungen aus den Bereichen Informatik und Telekommunikation. Die Abkürzungen werden hier durchgehend groß geschrieben, Akzente, Bindestriche und dergleichen wurden weggelassen. Einige Abkürzungen sind geschützte Namen; diese sind nicht gekennzeichnet. Die Liste beschreibt nur den Ge- brauch, sie legt nicht eine Definition fest. 100GE 100 GBit/s Ethernet 16CIF 16 times Common Intermediate Format (Picture Format) 16QAM 16-state Quadrature Amplitude Modulation 1GFC 1 Gigabaud Fiber Channel (2, 4, 8, 10, 20GFC) 1GL 1st Generation Language (Maschinencode) 1TBS One True Brace Style (C) 1TR6 (ISDN-Protokoll D-Kanal, national) 247 24/7: 24 hours per day, 7 days per week 2D 2-dimensional 2FA Zwei-Faktor-Authentifizierung 2GL 2nd Generation Language (Assembler) 2L8 Too Late (Slang) 2MS Strukturierte
    [Show full text]
  • Ciena Acronyms Guide.Pdf
    The Acronyms Guide edited by Erin Malone Chris Janson 1st edition Publisher Acknowledgement: This is the first edition of this book. Please notify us of any acronyms we may have missed by submitting them via the form at www.ciena.com/acronymsguide. We will be happy to include them in further editions of “The Acronyms Guide”. For additional information on Ciena’s Carrier Ethernet or Optical Communications Certification programs please contact [email protected]. Table of Contents Numerics ..........................1 A .......................................1 B .......................................2 C .......................................3 D .......................................5 E .......................................7 F........................................9 G .....................................10 H .....................................11 I .......................................12 J ......................................14 K .....................................14 L ......................................14 M ....................................15 N .....................................17 O.....................................18 P .....................................20 Q.....................................22 R .....................................22 S......................................23 T .....................................26 U .....................................28 V .....................................29 W ....................................29 X .....................................30 Z......................................30
    [Show full text]
  • " Who Controls the Vocabulary, Controls the Knowledge"
    Acronyms from Future-Based Consultancy & Solutions "Translation" of some Business, Finance, ICDT acronyms (including several SAP ones), initialims, tech term oddities and techronyms, loaded words and buzzwords to ease the reading of courses, books, magazines and papers: see "anacronym", "ASS" and many others ... (third main version since 1997) ( www.fbc-e.com , updated & corrected twice a month. Release 02-10-2009) " Who controls the vocabulary , 6170+ controls the knowledge " George ORWELL in "1984" Instruction To ease your researches , we are inviting you to use the " search " function within the Menu " edit " Pour faciliter vos recherches, utilisez la fonction " rechercher " disponible dans le menu " Edition " Information Underligned names are identifying authors, editors and / or copyrighted applications ©, ®, ™ FBWPA Free Business White Page Available (www.fbc-e.com ) Acronym Rose salmon is related to acronyms and assimilated terms and concepts. IL / InLin Internet Lingo also called " PC talk" Intelligence Light green color is related to intelligence, business intelligence ( BI , CI ) FBC>s Yellow color is related to FBC>s concepts and methodologies (more on www.fbc-e.com ) Finance Deep blue color is related to Finance and Accounting ( FI ) Note: BOLD acronyms KM Deep green color is related to Knowledge Management ( KM ) and texts are "translated" HR & R Lemon green color is related to HR and recruitment in the list. Mobility Light blue color is related to mobile communication ( MoMo ) Security Red color is related to security and risks management ( RM ) Note : US spelling Virtual Pink color is related to virtual / virtuality ( VR ) & ampersand $$$ temporary files Feel free to copy and distribute this "computer-babble *.001 Hayes JT Fax translator" provided that it is distributed only in its 0 Day FTP server supposed to be moved within original and unmodified state with our name, address, the next 24 hours to another IP .
    [Show full text]
  • Air Traffic Management Abbreviation Compendium
    Air Traffic Management Abbreviation Compendium List of Aviation, Aerospace and Aeronautical Acronyms DLR-IB-FL-BS-2021-1 Institute of Air Traffic Management Abbreviation Compendium Flight Guidance Document properties Title Air Traffic Management Abbreviation Compendium Subject List of Aviation, Aerospace and Aeronautical Acronyms Institute Institute of Flight Guidance, Braunschweig, German Aerospace Center, Germany Authors Nikolai Rieck, Marco-Michael Temme IB-Number DLR-IB-FL-BS-2021-1 Date 2021-01-28 Version 1.0 Title: Air Traffic Management Abbreviation Compendium Date: 2021-01-28 Page: 2 Version: 1.0 Authors: N. Rieck & M.-M. Temme Institute of Air Traffic Management Abbreviation Compendium Flight Guidance Index of contents 2.1. Numbers and Punctuation Marks _______________________________________________________ 6 2.2. Letter - A ___________________________________________________________________________ 7 2.3. Letter - B ___________________________________________________________________________ 55 2.4. Letter - C __________________________________________________________________________ 64 2.5. Letter - D _________________________________________________________________________ 102 2.6. Letter - E __________________________________________________________________________ 128 2.7. Letter - F __________________________________________________________________________ 152 2.8. Letter - G _________________________________________________________________________ 170 2.9. Letter - H _________________________________________________________________________
    [Show full text]
  • 4MP WDR IR Mini-Dome Network Camera IP-D4FC-SS
    4MP WDR IR Mini-Dome Network Camera 4Mp H.265+ IP-D4FC-SS 30m IR IP67 Vandal-proof Features Wide Dynamic Range (WDR) · 1/3” 4Megapixel progressive CMOS The camera achieves vivid images, even in the most intense contrast · H.265& H.264 dual-stream encoding lighting conditions, using industry-leading wide dynamic range (WDR) technology. For applications with both bright and low lighting · 20fps@4M(2688×1520) &25/30fps@3M(2304×1296) conditions that change quickly, true WDR (120 dB) optimizes both the bright and dark areas of a scene at the same time to provide usable · WDR(120dB), Day/Night(ICR), 3DNR, AWB, AGC, BLC video. · Multiple network monitoring: Web viewer, Smart IR Technology Snappy Universal CMS With IR illumination, detailed images can be captured in low light or · 2.8 mm fixed lens (3.6 mm optional) total darkness. The camera's Smart IR technology adjusts the intensity of camera's infrared LEDs to compensate the distance of an object. · Max IR LEDs Length 30m Smart IR technology prevents IR LEDs from whitening out images as they come closer to the camera. The camera's integrated infrared · IP67, IK10, PoE illumination provides high performance in extreme low-light environ- ments up to 30m (98ft). System Overview The IR Megapixel Fixed camera delivers 4MP resolution with a 2.8mm/ Protection (IP67, IK10, wide voltage) 3.6mm fixed lens. The camera's elegant blend of aesthetics combined The camera allows for ±25% input voltage tolerance, suitable for the with a range of easy mounting solutions provides an excellent choice most unstable conditions for outdoor applications.
    [Show full text]
  • Download Book
    ® BOOKS FOR PROFESSIONALS BY PROFESSIONALS Akramullah Digital Video Concepts, Methods, and Metrics Digital Video Concepts, Methods, and Metrics: Quality, Compression, Performance, and Power Trade-off Analysis is a concise reference for professionals in a wide range of applications and vocations. It focuses on giving the reader mastery over the concepts, methods, and metrics of digital video coding, so that readers have sufficient understanding to choose and tune coding parameters for optimum results that would suit their particular needs for quality, compression, speed, and power. The practical aspects are many: Uploading video to the Internet is only the begin- ning of a trend where a consumer controls video quality and speed by trading off various other factors. Open source and proprietary applications such as video e-mail, private party content generation, editing and archiving, and cloud asset management would give further control to the end-user. What You’ll Learn: • Cost-benefit analysis of compression techniques • Video quality metrics evaluation • Performance and power optimization and measurement • Trade-off analysis among power, performance, and visual quality • Emerging uses and applications of video technologies ISBN 978-1-4302-6712-6 53999 Shelve in Graphics/Digital Photography User level: Beginning–Advanced 9781430 267126 For your convenience Apress has placed some of the front matter material after the index. Please use the Bookmarks and Contents at a Glance links to access them. Contents at a Glance About the Author ............................................................................
    [Show full text]
  • Zn1a-B4dmz52u / B6dmz52u
    ganzsecurity.com 1080p & 5 MP IR IP Bullets w/ GXi Imbedded Intelligence ZN1A-B4DMZ52U / B6DMZ52U Features: Network Devices • 1080p & 5 Megapixel @ 30fps • Intelligent Video Analytics • 1/2.8” SONY STARVIS Exmor Sensor • Superior Low Light Performance • True Day / Night and WDR • ProSet Remote Zoom and Focus • 6~50mm P-Iris Lens • 6 IR LEDs up to 120’ Range ganzsecurity.com ZN1A-B4/6DMZ52U 1080p & 5MP IR IP Bullets w/ GXi Imbedded Intelligence Specifications (Part 1) Model ZN1A-B4DMZ52U ZN1A-B6DMZ52U Image Sensor 1/2.8” SONY STARVIS Exmor 2.13MP CMOS 1/2.8” SONY STARVIS Exmor 5MP CMOS Effective Pixels 1080p (1920 x 1080) 5MP (2592 x 1944) Scanning System Progressive scanning AGC Control Auto Iris Type P-Iris Minimum Illumination Color: 0.08 Lux (DSS on) / B/W : 0 Lux (IR on) Camera Lens 6mm ~ 50mm, F1.6 with ProSet Motorized Focus & Zoom Angle of View Horizontal: Approx. 40.8° (Wide) to 6.9° (Tele) Shutter Speed Automatic / Manual: 1/30 ~ 1/32,000, Anti-Flicker, Slow Shutter (1/2, 1/3, 1/5, 1/6, 1/7.5, 1/10) Day/Night Performance True Day / Night (ICR) Wide Dynamic Range True WDR, 120dB or above S/N Ratio 50 dB Video Compression H.265, H.264 Baseline, Main, High profile, MJPEG (Motion JPEG) Multiple Profile 1080p @30fps & D1(704x480 or 704x576) @30fps 2592 x 1944 @30fps & 480 @30 fps Streaming Performance with H.264, H265 & MJPEG with H.264, H.265 & MJPEG Max Resolution 1920 x 1080 2592 x 1944 Video Bit Rate 100Kbps ~ 10Mbps Multi-rate for Preview and Recording Bit Rate Control Multi Streaming CBR/VBR (Controllable frame rate and Bandwidth)
    [Show full text]
  • IBM/Cisco Multiprotocol Routing: an Introduction and Implementation
    Front cover IBM/Cisco Multiprotocol Routing: An Introduction and Implementation Learn about the IBM/Cisco multiprotocol products and solutions Understand how to implement FCIP, VSANs, and IVR Discover how to implement iSCSI Jon Tate Michael Engelbrecht Jacek Koman ibm.com/redbooks International Technical Support Organization IBM/Cisco Multiprotocol Routing: An Introduction and Implementation March 2009 SG24-7543-01 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. Second Edition (March 2009) This edition applies to Version 4.1.n of the Cisco Fabric Manager and Device Manager, and NX-OS operating system. © Copyright International Business Machines Corporation 2009. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . x Preface . xi The team that wrote this book . xi Become a published author . xiii Comments welcome. xiv Summary of changes . xv December 2008, Second Edition . xv Chapter 1. SAN routing introduction . 1 1.1 SAN routing definitions . 3 1.1.1 Fibre Channel . 3 1.1.2 Fibre Channel switching . 4 1.1.3 Fibre Channel routing . 4 1.1.4 Tunneling . 4 1.1.5 Routers and gateways . 5 1.1.6 Fibre Channel routing between physical or virtual fabrics. 5 1.2 Routed gateway protocols. 5 1.2.1 FCIP . 5 1.2.2 iSCSI . 8 1.3 Routing issues. 10 1.3.1 Frame size . 10 1.3.2 TCP congestion control. 11 1.3.3 Round-trip delay . 11 1.3.4 Write acceleration .
    [Show full text]
  • Cisco Prime Infrastructure 3.1 Reference Guide April 2016
    Cisco Prime Infrastructure 3.1 Reference Guide April 2016 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number: THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • [ENTRY ARTIFICIAL INTELLIGENCE] Authors: Oliver Knill: March 2000 Literature
    ENTRY ARTIFICIAL INTELLIGENCE [ENTRY ARTIFICIAL INTELLIGENCE] Authors: Oliver Knill: March 2000 Literature: Peter Norvig, Paradigns of Artificial Intelligence Programming Daniel Juravsky and James Martin, Speech and Language Processing Adaptive Simulated Annealing [Adaptive Simulated Annealing] A language interface to a neural net simulator. artificial intelligence [artificial intelligence] (AI) is a field of computer science concerned with the concepts and methods of symbolic knowledge representation. AI attempts to model aspects of human thought on computers. Aspectrs of AI: • computer vision • language processing • pattern recognition • expert systems • problem solving • roboting • optical character recognition • artificial life • grammars • game theory Babelfish [Babelfish] Online translation system from Systran. Chomsky [Chomsky] Noam Chomsky is a pioneer in formal language theory. He is MIT Professor of Linguistics, Linguistic Theory, Syntax, Semantics and Philosophy of Language. Eliza [Eliza] One of the first programs to feature English output as well as input. It was developed by Joseph Weizenbaum at MIT. The paper appears in the January 1966 issue of the "Communications of the Association of Computing Machinery". Google [Google] A search engine emerging at the end of the 20'th century. It has AI features, allows not only to answer questions by pointing to relevant webpages but can also do simple tasks like doing arithmetic computations, convert units, read the news or find pictures with some content. GPS [GPS] General Problem Solver. A program developed in 1957 by Alan Newell and Herbert Simon. The aim was to write a single computer program which could solve any problem. One reason why GPS was destined to fail is now at the core of computer science.
    [Show full text]
  • TAOS Glossary Release 9.2 Or Later
    TAOS Glossary Part Number: 7820-0648-006 For software version 9.2 or later March 2002 Copyright © 1998-2002 Lucent Technologies Inc. All rights reserved. This material is protected by the copyright laws of the United States and other countries. It may not be reproduced, distributed, or altered in any fashion by any entity (either internal or external to Lucent Technologies), except in accordance with applicable agreements, contracts, or licensing, without the express written consent of Lucent Technologies. For permission to reproduce or distribute, please email your request to [email protected]. Notice Every effort was made to ensure that the information in this document was complete and accurate at the time of printing, but information is subject to change. European Community (EC) RTTE compliance Hereby, Lucent Technologies, declares that the equipment documented in this publication is in compliance with the essential require- ments and other relevant provisions of the Radio and Telecommunications Technical Equipment (RTTE) Directive 1999/5/EC. To view the official Declaration of Conformity certificate for this equipment, according to EN 45014, access the Lucent INS online documentation library at http://www.lucentdocs.com/ins. Safety, compliance, and warranty Information Before handling any Lucent Access Networks hardware product, read the Edge Access Safety and Compliance Guide included in your product package. See that guide also to determine how products comply with the electromagnetic interference (EMI) and network compatibility requirements of your country. See the warranty card included in your product package for the limited warranty that Lucent Technologies provides for its products. Security statement In rare instances, unauthorized individuals make connections to the telecommunications network through the use of access features.
    [Show full text]