Sciweavers

1031 search results - page 46 / 207
» codes 2004
Sort
View
ISW
2004
Springer
15 years 3 months ago
The Obfuscation Executive
Abstract. Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-te...
Kelly Heffner, Christian S. Collberg
79
Voted
CJ
2004
93views more  CJ 2004»
14 years 10 months ago
An Architecture for Kernel-Level Verification of Executables at Run Time
Digital signatures have been proposed by several researchers as a way of preventing execution of malicious code. In this paper we propose a general architecture for performing the...
Luigi Catuogno, Ivan Visconti
117
Voted
ICIP
2004
IEEE
15 years 12 months ago
Wavelet-based contourlet transform and its application to image coding
In this paper, we first propose a new family of geometrical image transforms that decompose images both radially and angularly. Our construction comprises two stages of filter ban...
Ramin Eslami, Hayder Radha
ICCAD
2004
IEEE
135views Hardware» more  ICCAD 2004»
15 years 7 months ago
Soft self-synchronising codes for self-calibrating communication
Self-calibrating designs are gaining momentum in both the computation and communication worlds. Instead of relying on the worst-case characterisation of design parameters, self-ca...
Frederic Worm, Paolo Ienne, Patrick Thiran
PARA
2004
Springer
15 years 3 months ago
Cache Optimizations for Iterative Numerical Codes Aware of Hardware Prefetching
Cache optimizations typically include code transformations to increase the locality of memory accesses. An orthogonal approach is to enable for latency hiding by introducing prefet...
Josef Weidendorfer, Carsten Trinitis