Sciweavers

134 search results - page 18 / 27
» Data hiding using trellis coded quantization
Sort
View
ACSAC
2006
IEEE
14 years 1 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
VIS
2007
IEEE
169views Visualization» more  VIS 2007»
14 years 8 months ago
Transform Coding for Hardware-accelerated Volume Rendering
Hardware-accelerated volume rendering using the GPU is now the standard approach for real-time volume rendering, although limited graphics memory can present a problem when renderi...
Nathaniel Fout, Kwan-Liu Ma
SOCIALCOM
2010
13 years 2 months ago
A Multi-factor Approach to Securing Software on Client Computing Platforms
Protecting the integrity of software platforms, especially in unmanaged consumer computing systems is a difficult problem. Attackers may attempt to execute buffer overflow attacks ...
Raghunathan Srinivasan, Vivek Iyer, Amit Kanitkar,...
TIT
1998
216views more  TIT 1998»
13 years 7 months ago
Data Compression and Harmonic Analysis
In this article we review some recent interactions between harmonic analysis and data compression. The story goes back of course to Shannon’s R(D) theory in the case of Gaussian...
David L. Donoho, Martin Vetterli, Ronald A. DeVore...
CAD
2005
Springer
13 years 7 months ago
Lossless compression of predicted floating-point geometry
The size of geometric data sets in scientific and industrial applications is constantly increasing. Storing surface or volume meshes in standard uncompressed formats results in la...
Martin Isenburg, Peter Lindstrom, Jack Snoeyink