Sciweavers

694 search results - page 128 / 139
» Comparison of software architecture reverse engineering meth...
Sort
View
CCS
2010
ACM
14 years 8 months ago
A control point for reducing root abuse of file-system privileges
We address the problem of restricting root’s ability to change arbitrary files on disk, in order to prevent abuse on most current desktop operating systems. The approach first...
Glenn Wurster, Paul C. van Oorschot
EUROMICRO
2000
IEEE
15 years 1 months ago
Efficient Image Compression of Medical Images Using the Wavelet Transform and Fuzzy c-means Clustering on Regions of Interest
This paper suggests a novel image compression scheme, using the discrete wavelet transformation (DWT) and the fuzzy c-means clustering technique. The goal is to achieve higher com...
Dimitris A. Karras, S. A. Karkanis, Dimitrios E. M...
81
Voted
TIFS
2010
128views more  TIFS 2010»
14 years 8 months ago
Steganalysis by subtractive pixel adjacency matrix
This paper presents a novel method for detection of steganographic methods that embed in the spatial domain by adding a low-amplitude independent stego signal, an example of which...
Tomás Pevný, Patrick Bas, Jessica J....
91
Voted
COMPUTER
2007
153views more  COMPUTER 2007»
14 years 9 months ago
The Discipline of Embedded Systems Design
ems, using abstractions that actually remove physical constraints from consideration. At the other, embedded systems design goes beyond the traditional expertise of electrical engi...
Thomas A. Henzinger, Joseph Sifakis
KYOTODL
2000
87views more  KYOTODL 2000»
14 years 11 months ago
Modeling Customizable Web Applications
The web is more and more used as a platform for fullfledged, increasingly complex applications, where a huge amount of change-intensive data is managed by underlying database syst...
Gerti Kappel, Werner Retschitzegger, Wieland Schwi...