Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techn...
Bertrand Anckaert, Bjorn De Sutter, Dominique Chan...
: The established techniques for legal-for-trade registration of weight values meet the legal requirements, but in praxis they show serious disadvantages. We report on the first im...
Alexander Wiesmaier, Ulrich Rauchschwalbe, Christo...
123 African American men in America are 65% more likely to develop prostate cancer and are two to three times more likely to die of the disease than Caucasian men [1]. While resear...
Patrick Bobbie, Renee Reams, Sandra Suther, C. Per...
The topic of software architecture (SA) based testing has recently raised some interest. Recent work on the topic has used the SA as a reference model for code conformance testing,...
Henry Muccini, Marcio S. Dias, Debra J. Richardson
This paper proposes a hybrid communication medium for on-chip communication targeting adaptive SoC architectures. Unlike the work carried out in literature, where the term “hybr...