Sciweavers

853 search results - page 85 / 171
» New test approach for embedded applications
Sort
View
SSWMC
2004
15 years 2 months ago
Searching for the stego-key
Steganalysis in the wide sense consists of first identifying suspicious objects and then further analysis during which we try to identify the steganographic scheme used for embedd...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
APCCAS
2002
IEEE
95views Hardware» more  APCCAS 2002»
15 years 6 months ago
Reducing power consumption of instruction ROMs by exploiting instruction frequency
This paper proposes a new approach to reducing the power consumption of instruction ROMs for embedded systems. The power consumption of instruction ROMs strongly depends on the sw...
Koji Inoue, Vasily G. Moshnyaga, Kazuaki Murakami
CASES
2006
ACM
15 years 7 months ago
Scalable subgraph mapping for acyclic computation accelerators
Computer architects are constantly faced with the need to improve performance and increase the efficiency of computation in their designs. To this end, it is increasingly common ...
Nathan Clark, Amir Hormati, Scott A. Mahlke, Sami ...
DIMVA
2007
15 years 3 months ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...
COLING
2008
15 years 3 months ago
Anomalies in the WordNet Verb Hierarchy
The WordNet verb hierarchy is tested, with a view to improving the performance of its applications, revealing topological anomalies and casting doubt on its semantic categories. E...
Tom Richens