A Platform Independent Investigative Process Model for Smartphones

Total Page:16

File Type:pdf, Size:1020Kb

A Platform Independent Investigative Process Model for Smartphones A platform independent investigative process model for smartphones By Frances Chevonne Dancer A Dissertation Submitted to the Faculty of Mississippi State University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Computer Science in the Department of Computer Science and Engineering Mississippi State, Mississippi December 2012 Copyright by Frances Chevonne Dancer 2012 A platform independent investigative process model for smartphones By Frances Chevonne Dancer Approved: _________________________________ ______________________________ David A. Dampier Rayford Vaughn Professor of Computer Science and William L. Giles Distinguished Engineering Professor of Computer Science and (Director of Dissertation) Engineering (Committee Member) _________________________________ ________________________________ J. Edward Swan II Yoginder Dandass Professor of Computer Science and Associate Professor of Computer Engineering Science and Engineering (Committee Member) (Committee Member) _________________________________ ________________________________ Edward Allen Sarah A. Rajala Associate Professor of Computer Dean of the Bagley College of Science and Engineering Engineering (Graduate Coordinator) Name: Frances Chevonne Dancer Date of Degree: December 15, 2012 Institution: Mississippi State University Major Field: Computer Science Major Professor: Dr. David A. Dampier Title of Study: A platform independent investigative process model for smartphones Pages of Study: 181 Candidate for Degree of Doctor of Philosophy A properly conducted forensic examination is one of the most fundamental aspects of a digital investigation. Examiners are obligated to obtain the skills necessary to use forensic tools and methodologies and rely on sound judgment when analyzing a digital device. Anytime during this process, the quality of the methods, skills, and expertise of the examiner may be challenged, thus, placing the forensic value of the evidence collected during the process in jeopardy. In order to combat the potential challenges posed as a result of the forensic examination process, the digital forensics community must ensure that suitable protocols are used throughout the analysis process. Currently, there is no standard methodology forensic examiners use to analyze a digital device. Examiners have made use of a model derived from the Digital Forensic Research Workshop in 2001 and the application of ad-hoc techniques has become routine. While these approaches may reveal potential data of evidentiary value when applying them to digital devices, their core purpose specifically involves the analysis of computers. It is not clear how effective these methods have been when examining other digital technologies, in particular Small Scale Digital Devices (SSDDs). Due to these mitigating factors, it is critical to develop standard scientifically sound methodologies in the area of digital forensics that allow us to evaluate various digital technologies while considering their distinctive characteristics. This research addresses these issues by introducing the concept of an extendable forensic process model applicable to smartphones regardless of platform. The model has been developed using the property of invariance to construct a core components list which serves as the foundation of the proposed methodology. This dissertation provides a description of the forensic process, the models currently used, the developed model, and experiments to show its usefulness. DEDICATION First and foremost, I would like to give thanks to my Lord and Savior Jesus Christ, for with Him all things are possible. This research is dedicated to my family and the late Mr. Earl Thomas. ii ACKNOWLEDGMENTS The author wishes to express gratitude to the many people for all of their support and guidance throughout this process. Beginning with my husband, Mr. Daniel Keith Lopez Dancer, I would like to say thank you for all of the support and encouragement you have given me throughout the years. You never made it seem as if I neglected my family obligations, even though I did at times. Next, I would like to thank my entire family; you all have been my rock since the beginning of this process and without you, this would never have come to fruition. Dr. Dave A. Dampier, I would like to tell you how much I really appreciate you for supporting and guiding me through my educational, professional, and personal challenges. I would also like to thank Dr’s Vaughn, Swan, and Dandass for serving as my committee members and offering invaluable advice regarding this research. This section would not be complete without thanking the following people: Dr. Gordon Skelton, Director of the Center for Defense Integrated Data and Chair of the Department of Computer Science at Jackson State University; Mr. Chris Staten, mentor, Dr. Peggy West, Instructor of Mathematics and Computer Science at Mississippi Gulf Coast Community College Jefferson Davis Campus and mentor; Dr. Ora Rawls, Security Officer at Jackson State University and mentor; Dr. Evelyn Leggette, Dean of Undergraduate Studies at Jackson State University and mentor. I would also like to thank all of my colleagues, past and present at the following state agencies: the Mississippi iii Department of Environmental Quality (MDEQ), Mississippi Gulf Coast Community College, Jackson State University, and the Center for Defense Integrated Data. iv TABLE OF CONTENTS Page DEDICATION .................................................................................................................... ii ACKNOWLEDGMENTS ................................................................................................. iii LIST OF TABLES ........................................................................................................... viii LIST OF FIGURES ........................................................................................................... xi I. INTRODUCTION ...................................................................................................1 1.1 Digital Forensics 3 1.1.1 Computer Crime vs. Digital Crime 5 1.1.2 Small Scale Digital Device Forensics 9 1.2 Digital Forensic Investigative Process 13 1.2.1 Documentation 15 1.2.2 Validation 16 1.2.3 Preservation 18 1.2.4 Identification 18 1.2.5 Collection 19 1.2.6 Analysis 22 1.2.7 Interpretation 24 1.2.8 Presentation 25 1.3 Motivation 26 1.4 The Initial Proposal Plan 30 1.4.1 Methodology and Key Elements 33 1.4.1.1 Review investigative process models and related computer forensics literature. 33 1.4.1.2 Identify candidate devices and obtain them for analysis. 33 1.4.1.3 Compare the characteristics of each device to identify the invariant properties. 33 1.4.1.4 Conduct experiments using the devices obtained. 34 1.4.1.5 Construct new process model for smartphones 34 1.4.1.6 Evaluate the potential effectiveness of the proposed model 35 1.4.1.7 Publish the findings. 35 1.4.2 Hypotheses 35 II. RELATED WORK ................................................................................................37 v 2.1 Digital Investigative Process Models 37 2.1.2 Objectives Based Approach 40 2.1.3 Physical Crime Scene Based Approach 44 2.1.4 Technology Specific Approach 49 2.1.5 Based on Information Flows 53 2.1.6 Cost-Effective Based Approach 55 2.1.7 Legal Approach 58 2.1.8 Technologically and Crime Independent Approach 63 2.2 Invariance 65 2.2.1 Invariants in Mathematics 65 2.2.2 Invariants in Computer Science 68 2.2.3 Applying Invariants to Digital Forensics 69 2.3 Smartphone OS Architectures 70 2.3.1 Linux 70 2.3.2 Windows 71 2.3.3 Palm 74 2.3.4 Symbian 76 2.3.5 RIM 77 2.3.6 Generic Hardware Architecture 79 III. PROPOSED MODEL ............................................................................................81 3.1 Invariance in Smartphone Forensics 81 3.2 PIFPM 85 IV. RESEARCH DESIGN ...........................................................................................94 4.1 Research Questions 94 4.1.1 Qualitative Case Study 97 4.1.2 Experimental Study Design 110 4.1.3 Experimental Analysis Results 115 4.1.4.1 Experiment 1: File Size Difference 115 4.1.4.2 Experiment 2: Average Change in File Content 128 4.1.4 Modified PIFPM 138 4.1.5 Qualitative Study Design 141 4.1.6 Qualitative Analysis Results 142 V. CONCLUSIONS..................................................................................................161 5.1 Contributions 161 5.2 Publications 163 5.3 Recommendations for Future Work 163 REFERENCES ................................................................................................................165 APPENDIX A: Pre Survey ..............................................................................................170 APPENDIX B: Post Survey .............................................................................................173 APPENDIX C: Qualitative Study Participant Form ........................................................176 vi APPENDIX D: Informed Consent Form .........................................................................178 vii LIST OF TABLES 2.1 DFRWS Framework ...................................................................................... 38 2.2 Levels of Proof .............................................................................................. 59 3.1 Omnia Specifications ..................................................................................... 82 3.2 Storm Specifications .....................................................................................
Recommended publications
  • Linux on the Road
    Linux on the Road Linux with Laptops, Notebooks, PDAs, Mobile Phones and Other Portable Devices Werner Heuser <wehe[AT]tuxmobil.org> Linux Mobile Edition Edition Version 3.22 TuxMobil Berlin Copyright © 2000-2011 Werner Heuser 2011-12-12 Revision History Revision 3.22 2011-12-12 Revised by: wh The address of the opensuse-mobile mailing list has been added, a section power management for graphics cards has been added, a short description of Intel's LinuxPowerTop project has been added, all references to Suspend2 have been changed to TuxOnIce, links to OpenSync and Funambol syncronization packages have been added, some notes about SSDs have been added, many URLs have been checked and some minor improvements have been made. Revision 3.21 2005-11-14 Revised by: wh Some more typos have been fixed. Revision 3.20 2005-11-14 Revised by: wh Some typos have been fixed. Revision 3.19 2005-11-14 Revised by: wh A link to keytouch has been added, minor changes have been made. Revision 3.18 2005-10-10 Revised by: wh Some URLs have been updated, spelling has been corrected, minor changes have been made. Revision 3.17.1 2005-09-28 Revised by: sh A technical and a language review have been performed by Sebastian Henschel. Numerous bugs have been fixed and many URLs have been updated. Revision 3.17 2005-08-28 Revised by: wh Some more tools added to external monitor/projector section, link to Zaurus Development with Damn Small Linux added to cross-compile section, some additions about acoustic management for hard disks added, references to X.org added to X11 sections, link to laptop-mode-tools added, some URLs updated, spelling cleaned, minor changes.
    [Show full text]
  • Call Your Netbsd
    Call your NetBSD BSDCan 2013 Ottawa, Canada Pierre Pronchery ([email protected]) May 17th 2013 Let's get this over with ● Pierre Pronchery ● French, based in Berlin, Germany ● Freelance IT-Security Consultant ● OSDev hobbyist ● NetBSD developer since May 2012 (khorben@) Agenda 1.Why am I doing this? 2.Target hardware: Nokia N900 3.A bit of ARM architecture 4.NetBSD on ARM 5.Challenges of the port 6.Current status 7.DeforaOS embedded desktop 8.Future plans 1. A long chain of events ● $friend0 gives me Linux CD ● Computer not happy with Linux ● Get FreeBSD CD shipped ● Stick with Linux for a while ● Play with OpenBSD on Soekris hardware ● $friend1 gets Zaurus PDA ● Switch desktop and laptop to NetBSD ● I buy a Zaurus PDA ● I try OpenBSD on Zaurus PDA 1. Chain of events, continued ● $gf gets invited to $barcamp ● I play with my Zaurus during her presentation ● $barcamp_attender sees me doing this ● Begin to work on the DeforaOS desktop ● Get some of it to run on the Zaurus ● Attend CCC Camp near Berlin during my bday ● $gf offers me an Openmoko Neo1973 ● Adapt the DeforaOS desktop to Openmoko 1. Chain of events, unchained ● $barcamp_attender was at the CCC Camp, too ● We begin to sell the Openmoko Freerunner ● Create a Linux distribution to support it ● Openmoko is EOL'd and we split ways ● $friend2 gives me sparc64 boxes ● Get more involved with NetBSD ● Nokia gives me a N900 during a developer event ● $barcamp_attender points me to a contest ● Contest is about creating an OSS tablet 1. Chain of events (out of breath) ● Run DeforaOS on NetBSD on the WeTab tablet ● Co-win the contest this way ● $friend3 boots NetBSD on Nokia N900 ● Give a talk about the WeTab tablet ● Promise to work on the Nokia N900 next thing ● Apply to BSDCan 2013 ● Taste maple syrup for the first time in Canada ● Here I am in front of you Pictures: Sharp Zaurus Pictures: Openmoko Freerunner Pictures: WeTab Pictures: DeforaOS 2.
    [Show full text]
  • Documento Completo
    UNIVERSIDAD AUTÓNOMA DE CIUDAD JUÁREZ Instituto de Ingeniería y Tecnología Departamento de Ingeniería Eléctrica y Computación Caracterización de firewall de alta disponibilidad con filtro de contenido en un ambiente virtualizado. Reporte Técnico de Investigación presentado por: Alejandra Juana Torres Pérez 98709 Lucero Martínez Castrillo 98750 Requisito para la obtención del título de INGENIERO EN SISTEMAS COMPUTACIONALES Profesor Responsable: Mtro. Eduardo Castillo Luna Mayo de 2015 ii iii iv Índice de contenidos Autorización de Impresión…………………………………………………………....¡Error! Marcador no definido. Declaración de Originalidad………………………………………………………….¡Error! Marcador no definido. Lista de Figuras ... ……………………………………………………………………….viii Lista de Tablas .... ………………………………………………………………………..iix Introducción ......…………………………………………………………………………...1 Capítulo 1. Planteamiento del problema ......………………………………………………2 1.1 Antecedentes ......……………………………………………………………………2 1.2 Definición del problema......………………………………………………………...4 1.3 Objetivos de la investigación .....…………………………………………………....4 1.4 Preguntas de investigación.....……………………………………………………....5 1.5 Justificación de la investigación ....………………………………………………....5 1.6 Limitaciones y delimitaciones de la investigación ....……………………………...6 Capítulo 2. Marco Teórico .....……………………………………………………………..7 2.1 Seguridad informática ....……………………………………………………………7 2.1.1 Tipos de Seguridad……………………………………………………………..8 2.1.2 Seguridad en redes de comunicación………………………………………......9 2.2 Firewall ......………………………………………………………………………..10 2.2.1
    [Show full text]
  • Wearable Personal Data Information Capture System
    University of New Orleans ScholarWorks@UNO University of New Orleans Theses and Dissertations Dissertations and Theses 12-17-2004 Wearable Personal Data Information Capture System Jiangpeng Shi University of New Orleans Follow this and additional works at: https://scholarworks.uno.edu/td Recommended Citation Shi, Jiangpeng, "Wearable Personal Data Information Capture System" (2004). University of New Orleans Theses and Dissertations. 197. https://scholarworks.uno.edu/td/197 This Thesis is protected by copyright and/or related rights. It has been brought to you by ScholarWorks@UNO with permission from the rights-holder(s). You are free to use this Thesis in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights- holder(s) directly, unless additional rights are indicated by a Creative Commons license in the record and/or on the work itself. This Thesis has been accepted for inclusion in University of New Orleans Theses and Dissertations by an authorized administrator of ScholarWorks@UNO. For more information, please contact [email protected]. WEARABLE PERSONAL DATA INFORMATION CAPTURE SYSTEM A Thesis Submitted to the Graduate Faculty of the University of New Orleans in partial fulfillment of the requirements for the degree of Master of Science in Department of Computer Science by Jiangpeng Shi B.S., University of International Business and Economy, 2000 B.S., WuHan Technology Institute of Chemistry Equipment and Machine, 1992 December 2004 Table of Contents Chapter 1 Introduction.................................................................................................................. 1 1.1 Wearable Personal Data Information Capture System ......................................... 3 1.2 The Motivation of the Project..............................................................................
    [Show full text]
  • Linux on Cellphones
    Linux on cellphones Pavel Machek Phones are everywhere ● everyone has their cellphone ● and carries it whereever they go ● cellphones are not just phones any more ● they browse web ● can read mail ● play mp3s and videos ● play radio ● they show maps, and you can use them for navigation Phones are sensitive ● They contain your contacts ● ...your passwords ● ...your emails ● ...can eavesdrop on you ● ...can steal your money and transfer them to attacker ● Backups are important because they break down ● non-smart phones do not have adequate ways to backup more than contacts Phones are working against their owner ● Cellphone operators have „interesting“ requirements before they'll sell a cellphone ● Branded phones are actively evil here ● right button takes you right into provider's portal, and you pay for it ● without confirmation ● without chance to change that ● branding is non-removable, so you are stuck with looking at red wallpaper ● you can't use it with other operator ● MMS / push to talk are designed to be expensive ● Voice-over-IP is a big no-no for a phone Phones are working against their owner ● You can only transfer pictures out of a phone using MMS ● You can only download applications using GPRS ● You can't transfer pictures/apps/songs between phones ● Have to confirm actions even of your own apps Phones are limited ● (but maybe that's a good thing?) ● Java applications work everywhere ● but they can't do interresting stuff ● usually can't access microphone, camera ● can't go background ● can't interact with one another ● Symbian
    [Show full text]
  • Mobile Malware Attacks and Defense Copyright © 2009 by Elsevier, Inc
    Elsevier, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents. The Work is sold AS IS and WITHOUT WARRANTY. You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®, “Career Advancement Through Skill Enhancement®,” “Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Elsevier, Inc. “ Syngress: The Definition of a Serious Security Library”™, “Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Elsevier, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies. Unique Passcode 28475016 PUBLISHED BY Syngress Publishing, Inc. Elsevier, Inc. 30 Corporate Drive Burlington, MA 01803 Mobile Malware Attacks and Defense Copyright © 2009 by Elsevier, Inc. All rights reserved. Printed in the United States of America. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication.
    [Show full text]
  • Análisis De Uso De Dispositivos Celulares Para Apoyo a La Gestión Empresarial, Creación De Un Prototipo”
    UNIVERSIDAD POLITECNICA SALESIANA UN IVERSIDAD POLITÉCNICA SALESIANA SEDE CUENCA CARRERA DE INGENIERÍA DE SISTEMAS Tesis previa a la obtención del Título de: Ingeniero de Sistemas. Tema: “Análisis de uso de dispositivos celulares para apoyo a la gestión empresarial, creación de un prototipo” Autores: Jorge Cabrera Pablo Villa Director de Tesis: Ing. Diego Quinde F. Cuenca, julio del 2012 1 UNIVERSIDAD POLITECNICA SALESIANA DECLARACION DE RESPONSABILIDAD Los conceptos desarrollados, análisis realizados y las conclusiones del presente trabajo, son de exclusiva responsabilidad de los autores. CUENCA, 23 de Julio del 2012. (f)_____________ Pablo Daniel Villa (f)_____________ Jorge Vinicio Cabrera Yo, Diego Marcelo Quinde Falconí, Docente de Carrera de Ingeniería de Sistemas de la Universidad Politécnica Salesiana, CERTIFICO que he leído íntegramente el presente trabajo de grado, comprobando que se cumplen los objetivos planteados en el proyecto. Así mismo declaro que los autores Pa blo Villa y Jorge Cabrera son los únicos responsables de la originalidad del trabajo desarrollado. (f)__________________ Ing. Diego Quinde Falconí 2 UNIVERSIDAD POLITECNICA SALESIANA Dedicatoria . Durante la vida estudiantil he tenido varias caídas que lo he superado gracias al esfuerzo, dedicación y fe , además cada uno de nosotros somos indispensables gracias a los conocimientos , valores, etc., adquiridos en la Universidad sin tomar presente los prejuicios de algunos docentes que al final fue una fortaleza y reto pa ra demostrar que somos capaces. Estas líneas son escritas con el fin de dedicar a las personas que hicieron posible el cumplimiento de mis objetivos , gracias a mi Mami Rosa ya que fue la persona que estuvo presente en mis penas y alegrías, también a mi pa pá Carlos que de una u otra manera su apoyo y consejos fueron mi fortaleza.
    [Show full text]
  • Università Degli Studi Di Parma Service Oriented
    UNIVERSITÀ DEGLI STUDI DI PARMA DIPARTIMENTO DI INGEGNERIA DELL’INFORMAZIONE Dottorato di Ricerca in Tecnologie dell’Informazione XXII Ciclo Maria Chiara Laghi SERVICE ORIENTED MOBILE COMPUTING DISSERTAZIONE PRESENTATA PER IL CONSEGUIMENTO DEL TITOLO DI DOTTORE DI RICERCA GENNAIO 2010 UNIVERSITÀ DEGLI STUDI DI PARMA Dottorato di Ricerca in Tecnologie dell’Informazione XXII Ciclo SERVICE ORIENTED MOBILE COMPUTING Coordinatore: Chiar.mo Prof. Carlo Morandi Tutor: Chiar.mo Prof. Gianni Conte Dottorando: Maria Chiara Laghi Gennaio 2010 To my family and my friends Contents Introduction1 1 State of the Art5 1.1 Pervasive and ubiquitous computing.................8 1.1.1 Pervasive computing emerging paradigms.......... 11 1.2 Mobile Computing.......................... 13 1.2.1 Mobile hardware....................... 24 1.2.2 Mobile software platforms and applications......... 37 1.2.3 Java Micro Edition (J2ME).................. 47 1.2.4 Comparison between most diffused devices and platforms. 49 1.3 Service oriented infrastructures for pervasive computing...... 55 1.3.1 Ubiquitous peer-to-peer sharing of services......... 56 1.3.2 Web Services on resource-constrained devices....... 58 2 Framework 61 2.1 Networked Autonomic Machine................... 61 2.1.1 Services as NAM resources................. 63 2.1.2 Service composition..................... 65 2.1.3 Related works......................... 67 2.1.4 NSAM for p2p service-oriented infrastructure........ 71 2.2 Code Mobility............................. 74 2.2.1 Resource and Service migration............... 76 ii Contents 3 Middleware and Applications 77 3.1 Ubiquitous p2p sharing of services: JXTA-SOAP mobile...... 78 3.1.1 Service deployment...................... 80 3.1.2 Service publication and lookup................ 82 3.1.3 Service invocation.....................
    [Show full text]
  • Before the Patent Trial and Appeal Board ______
    UNITED STATES PATENT AND TRADEMARK OFFICE ___________________ BEFORE THE PATENT TRIAL AND APPEAL BOARD ___________________ KYOCERA CORPORATION MOTOROLA MOBILITY LLC Petitioners v. SOFTVIEW LLC Patent Owner ___________________ CASE IPR2013-00004 CASE IPR2013-00257 Patent 7,831,926. ___________________ PATENT OWNER'S CLAIM CONSTRUCTION BRIEF 2899184 Table of Exhibits Exhibit Description SoftView Ex. 2001 Declaration of Morgan Chu in Support of SoftView's Unopposed Motions for Pro Hac Vice Admission in IPR2013-00004 and IPR2013-00007 SoftView Ex. 2002 Declaration of Alan J. Heinrich in Support of SoftView's Unopposed Motions for Pro Hac Vice Admission in IPR2013-00004 and IPR2013-00007 SoftView Ex. 2003 Declaration of Glenn Reinman, Ph.D., dated July 19, 2013 SoftView Ex. 2004 html.cpp file distributed with version 0.9-1 of Pad++ SoftView Ex. 2005 Deposition Transcript of Jack Grimes in IPR2013-00004 & IPR2013-00007, dated June 25, 2013 SoftView Ex. 2006 Jazz: An Extensible 2D+Zooming Graphics Toolkit in Java, HCIL Technical Report No. 99-07 (May 1999); retrieved from http://hcil2.cs.umd.edu/trs/99-07/99-07.pdf SoftView Ex. 2007 Karin Petersen, Tcl/Tk for a Personal Digital Assistant, In USENIX Symposium on Very High Level Languages, 1994, retrieved from http://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.43.8 953 SoftView Ex. 2008 Wikipedia, User:Synthetik/Scratch/Sharp Zaurus, retrieved from http://en.wikipedia.org/wiki/User:Synthetik/Scratch/Sharp_Z aurus SoftView Ex. 2009 http://www.zaumaga.net/hard/mi-c1/old/hard/vs506.htm (English translation) SoftView Ex. 2010 SoftSource Press Release, Company Wins Venture OnStage Competition at CIO Perspectives Conference, May 8, 2001 SoftView Ex.
    [Show full text]
  • Approximate Ensemble Methods for Physical Activity Recognition Applications
    Approximate Ensemble Methods for Physical Activity Recognition Applications A dissertation submitted by Pierluigi Casale at Universitat de Barcelona to fulfil the degree of Ph.D. in Applied Mathematics. Barcelona, November, 2011 Director: Oriol Pujol and Petia Radeva Dept. of Applied Mathematics and Analysis, University of Barcelona & Computer Vision Center This document was typeset by the author using LATEX 2ε. The research described in this book was carried out at the Computer Vision Center and University of Barcelona. Copyright c MMX by Pierluigi Casale. All rights reserved. No part of this publi- cation may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the author. ISBN 978–84–938351–6–3 Deposito Legal: B-37.482-2011 Printed by Ediciones Gr´aficas Rey, S.L. A Mireia 0.1 Acknowledgements I would like to thank the Computer Vision Center and projects TIN2006-15308- C02, FIS-PI061290, CONSOLIDER- INGENIO 2010 (CSD2007-00018), MI 1509/2005, TIN2009-14404-C02, La Marat`ode TV3 082131 for supporting this research. I would thank Petia and Oriol, my supervisors. Without them this work would not have been possible. Many thanks Petia. Many thanks Oriol. I am very grateful. Tambi´enquiero agradecer a todas las personas que he conocido en estos a˜nos, a todos los compa˜neros y compa˜neras de la Universidad de Barcelona y del Centro de Visi´onpor Computador, a los estudiantes y a todos aquellos con que he tenido la oportunidad de intercambiar ideas y opiniones.
    [Show full text]
  • Unbreakable Enterprise Kernel Release Notes for Unbreakable Enterprise Kernel Release 6 Update 2
    Unbreakable Enterprise Kernel Release Notes for Unbreakable Enterprise Kernel Release 6 Update 2 F38480-03 August 2021 Oracle Legal Notices Copyright © 2021, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • Gui in Python
    GUI IN PYTHON By : Sangeeta M Chauhan , Gwalior www.pythonclassroomdiary.wordpress.com © Sangeeta M Chauhan, Gwalior Best Python GUI Frameworks which supports multiple platforms (Windows, Linux and Mac). These all GUI frameworks are easy to use and popular, some of them are open-source. • Kivy :OpenGL ES 2, supports multiple platforms namely Windows, MacOSX, Linux, Android iOS and Raspberry Pi. Open source • PyQT : Cross-platform ,Supports Unix/Linux, Windows, Mac OS X and Sharp Zaurus. It is available in both, commercial as well as GPL license. Although some features may not be available in the free version, but you can use it under the free license with open source. • WxPython open source wrapper for cross-platform GUI library WxWidgets (earlier known as WxWindows) and implemented as a Python extension module. With WxPython you as a developer can create native applications for Windows, Mac OS and Unix. If you’re just beginning to develop applications in WxPython, here is a good simple tutorial you can go through. www.pythonclassroomdiary.wordpress.com © Sangeeta M Chauhan, Gwalior • PyGUI cross-platform framework for Unix, Macintosh and Windows. lightweight,. • PySide free and cross-platform GUI toolkit Qt initiated and sponsored by Nokia, ,currently supports Linux/X11, Mac OS X, Maemo and Windows and, support for Android is in the plans for the near future. PySide provides tools to works with multimedia, XML documents, network, databases and GUI. A key feature of PySide is its API compatibility with PyQt4, so if you wish to migrate to PySide then the process will be hassle- free. • Tkinter bundled with Python, Python’s standard GUI framework.
    [Show full text]