Sciweavers

325 search results - page 53 / 65
» Detecting Merging and Splitting using Origin Analysis
Sort
View
WCRE
2010
IEEE
13 years 5 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
ARTCOM
2009
IEEE
14 years 15 days ago
Text Fusion Watermarking in Medical Image with Semi-reversible for Secure Transfer and Authentication
Nowadays, the transmission of digitized medical information has become very convenient due to the generality of Internet. Internet has created the biggest benefit to achieve the tr...
P. Viswanathan, P. Venkata Krishna
PLDI
2005
ACM
14 years 28 days ago
Pin: building customized program analysis tools with dynamic instrumentation
Robust and powerful software instrumentation tools are essential for program analysis tasks such as profiling, performance evaluation, and bug detection. To meet this need, we ha...
Chi-Keung Luk, Robert S. Cohn, Robert Muth, Harish...
ANLP
1997
106views more  ANLP 1997»
13 years 8 months ago
Incremental Finite-State Parsing
This paper describes a new finite-state shallow parser. It merges constructive and reductionist approaches within a highly modular architecture. Syntactic information is added at ...
Salah Ait-Mokhtar, Jean-Pierre Chanod
TMM
2008
167views more  TMM 2008»
13 years 7 months ago
Mining Appearance Models Directly From Compressed Video
In this paper, we propose an approach to learning appearance models of moving objects directly from compressed video. The appearance of a moving object changes dynamically in vide...
Datong Chen, Qiang Liu, Mingui Sun, Jie Yang