Sciweavers

32 search results - page 2 / 7
» An LSB Data Hiding Technique Using Prime Numbers
Sort
View
CANS
2006
Springer
136views Cryptology» more  CANS 2006»
13 years 8 months ago
Watermarking Essential Data Structures for Copyright Protection
Software watermarking is a new research area that aims at providing copyright protection for commercial software. It minimizes software piracy by hiding copyright signatures inside...
Qutaiba Albluwi, Ibrahim Kamel
CAV
2010
Springer
239views Hardware» more  CAV 2010»
13 years 8 months ago
Model Checking of Linearizability of Concurrent List Implementations
Abstract. Concurrent data structures with fine-grained synchronization are notoriously difficult to implement correctly. The difficulty of reasoning about these implementations do...
Pavol Cerný, Arjun Radhakrishna, Damien Zuf...
IJDE
2006
95views more  IJDE 2006»
13 years 4 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
ICCD
2006
IEEE
92views Hardware» more  ICCD 2006»
14 years 1 months ago
Fast Speculative Address Generation and Way Caching for Reducing L1 Data Cache Energy
— L1 data caches in high-performance processors continue to grow in set associativity. Higher associativity can significantly increase the cache energy consumption. Cache access...
Dan Nicolaescu, Babak Salamat, Alexander V. Veiden...
BMCBI
2007
156views more  BMCBI 2007»
13 years 4 months ago
Large-scale clustering of CAGE tag expression data
Background: Recent analyses have suggested that many genes possess multiple transcription start sites (TSSs) that are differentially utilized in different tissues and cell lines. ...
Kazuro Shimokawa, Yuko Okamura-Oho, Takio Kurita, ...