Sciweavers

1031 search results - page 46 / 207
» codes 2004
Sort
View
104
Voted
ISW
2004
Springer
15 years 5 months ago
The Obfuscation Executive
Abstract. Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-te...
Kelly Heffner, Christian S. Collberg
102
Voted
CJ
2004
93views more  CJ 2004»
15 years 11 days ago
An Architecture for Kernel-Level Verification of Executables at Run Time
Digital signatures have been proposed by several researchers as a way of preventing execution of malicious code. In this paper we propose a general architecture for performing the...
Luigi Catuogno, Ivan Visconti
ICIP
2004
IEEE
16 years 2 months ago
Wavelet-based contourlet transform and its application to image coding
In this paper, we first propose a new family of geometrical image transforms that decompose images both radially and angularly. Our construction comprises two stages of filter ban...
Ramin Eslami, Hayder Radha
66
Voted
ICCAD
2004
IEEE
135views Hardware» more  ICCAD 2004»
15 years 9 months ago
Soft self-synchronising codes for self-calibrating communication
Self-calibrating designs are gaining momentum in both the computation and communication worlds. Instead of relying on the worst-case characterisation of design parameters, self-ca...
Frederic Worm, Paolo Ienne, Patrick Thiran
125
Voted
PARA
2004
Springer
15 years 5 months ago
Cache Optimizations for Iterative Numerical Codes Aware of Hardware Prefetching
Cache optimizations typically include code transformations to increase the locality of memory accesses. An orthogonal approach is to enable for latency hiding by introducing prefet...
Josef Weidendorfer, Carsten Trinitis