Sciweavers

4820 search results - page 29 / 964
» Implementing Signatures for C
Sort
View
TIFS
2010
171views more  TIFS 2010»
14 years 6 months ago
A method for automatic identification of signatures of steganography software
Abstract--A fully automated, blind, media-type agnostic approach to steganalysis is presented here. Steganography may sometimes be exposed by detecting automatically characterized ...
Graeme Bell, Yeuan-Kuen Lee
GECCO
2006
Springer
144views Optimization» more  GECCO 2006»
15 years 3 months ago
When lisp is faster than C
This paper compares the performance of the program evaluation phase of genetic programming using C and Common Lisp. A simple experiment is conducted, and the conclusion is that ge...
Børge Svingen
ENTCS
2008
114views more  ENTCS 2008»
14 years 11 months ago
Term-graph Rewriting in Tom Using Relative Positions
In this paper, we present the implementation in Tom of a de Bruijn indices generalization allowing the representation of term-graphs over an algebraic signature. By adding pattern...
Emilie Balland, Paul Brauner
AHS
2006
IEEE
100views Hardware» more  AHS 2006»
15 years 5 months ago
Wormhole Routing with Virtual Channels using Adaptive Rate Control for Network-on-Chip (NoC)
This paper presents a new approach in realizing Virtual Channels tailored for Network on Chip implementations. The technique makes use of a flow control mechanism based on adaptiv...
Ioannis Nousias, Tughrul Arslan
CIIA
2009
15 years 26 days ago
Software Platform based Embedded Multiprocessor SoC Prototyping
This paper describes our experience in processor/threads synchronization using the POSIX API standard for MPSoC virtual applications prototyping. Spin-Lock (Binary Semaphore) imple...
Benaoumeur Senouci, Ali El Moussaoui, Bernard Goos...