Sciweavers

159 search results - page 19 / 32
» Appearance preserving octree-textures
Sort
View
IRI
2005
IEEE
15 years 5 months ago
Exploiting efficient data mining techniques to enhance intrusion detection systems
- Security is becoming a critical part of organizational information systems. Intrusion Detection System (IDS) is an important detection that is used as a countermeasure to preserv...
Chang-Tien Lu, Arnold P. Boedihardjo, Prajwal Mana...
MMSEC
2005
ACM
114views Multimedia» more  MMSEC 2005»
15 years 5 months ago
Watermarking of MPEG-2 video in compressed domain using VLC mapping
In this work we propose a new algorithm for fragile, high capacity yet file-size preserving watermarking of MPEG-2 streams. Watermarking is done entirely in the compressed domain,...
Bijan G. Mobasseri, Michael P. Marcinak
CC
2005
Springer
120views System Software» more  CC 2005»
15 years 5 months ago
Data Slicing: Separating the Heap into Independent Regions
In this paper, we present a formal description of data slicing, which is a type-directed program transformation technique that separates a program’s heap into several independent...
Jeremy Condit, George C. Necula
PLDI
2004
ACM
15 years 5 months ago
A generalized algorithm for graph-coloring register allocation
Graph-coloring register allocation is an elegant and extremely popular optimization for modern machines. But as currently formulated, it does not handle two characteristics common...
Michael D. Smith, Norman Ramsey, Glenn H. Holloway
FASE
2004
Springer
15 years 5 months ago
A Formal Treatment of Context-Awareness
Context-aware computing refers to a computing paradigm in which the behavior of individual components is determined by the circumstances in which they find themselves to an extent...
Gruia-Catalin Roman, Christine Julien, Jamie Payto...