Sciweavers

1031 search results - page 27 / 207
» codes 2004
Sort
View
GPCE
2004
Springer
15 years 5 months ago
Compiling Process Graphs into Executable Code
Abstract. Model-driven architecture envisions a paradigm shift as dramatic as the one from low-level assembler languages to high-level programming languages. In order for this visi...
Rainer Hauser, Jana Koehler
NAA
2004
Springer
178views Mathematics» more  NAA 2004»
15 years 5 months ago
Performance Optimization and Evaluation for Linear Codes
In this paper, we develop a probabilistic model for estimation of the numbers of cache misses during the sparse matrix-vector multiplication (for both general and symmetric matrice...
Pavel Tvrdík, Ivan Simecek
88
Voted
ICISC
2004
122views Cryptology» more  ICISC 2004»
15 years 1 months ago
Steganography for Executables and Code Transformation Signatures
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techn...
Bertrand Anckaert, Bjorn De Sutter, Dominique Chan...
89
Voted
PST
2004
15 years 1 months ago
Detection of New Malicious Code Using N-grams Signatures
Signature-based malicious code detection is the standard technique in all commercial anti-virus software. This method can detect a virus only after the virus has appeared and cause...
Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray...
92
Voted
UCS
2004
Springer
15 years 5 months ago
Dependable Coding of Fiducial Tags
Fiducial tags can be recognised successfully and decoded by computer vision systems in order to produce location information. We term a system dependable if its observable results ...
Andrew C. Rice, Christopher B. Cain, John K. Fawce...