Sciweavers

210 search results - page 22 / 42
» Research on Data Hiding Capacity
Sort
View
ACSAC
2006
IEEE
14 years 3 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
IV
2006
IEEE
82views Visualization» more  IV 2006»
14 years 3 months ago
Two sides of the story: Visualising Products and Processes in Engineering Design
This paper describes research on the use of multiple views for modelling products and processes in the design of complex products. Single visual representations of design models o...
René Keller, Tomás L. Flanagan, Clau...
EUROPAR
2005
Springer
14 years 3 months ago
Grid-BGC: A Grid-Enabled Terrestrial Carbon Cycle Modeling System
Grid-BGC is a Grid-enabled terrestrial biogeochemical cycle simulator collaboratively developed by the National Center for Atmospheric Research (NCAR) and the University of Colorad...
Jason Cope, Craig Hartsough, Peter Thornton, Henry...
IFIP11
2004
141views Business» more  IFIP11 2004»
13 years 11 months ago
Identity Management for Self-Portrayal
Identity management systems help users to organise their digital profiles in order to communicate parts of them, whenever needed and wanted, to communication partners like internet...
Tobias Baier, Christian P. Kunze
PDPTA
2004
13 years 11 months ago
An Integrated Global Service for File Transfer and Management in a Network (FTM)
The management and access of distributed informational resources has emerged as an important requirement for scientific simulations using high-performance computing facilities. Bot...
Jim Almond, Peggy Lindner