Sciweavers

909 search results - page 40 / 182
» Reversible data hiding
Sort
View
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
14 years 4 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
CVPR
2007
IEEE
15 years 3 days ago
In Situ Evaluation of Tracking Algorithms Using Time Reversed Chains
Automatic evaluation of visual tracking algorithms in the absence of ground truth is a very challenging and important problem. In the context of online appearance modeling, there ...
Hao Wu, Aswin C. Sankaranarayanan, Rama Chellappa
ICSE
2000
IEEE-ACM
14 years 1 months ago
Reverse engineering: a roadmap
By the early 1990s the need for reengineering legacy systems was already acute, but recently the demand has increased significantly with the shift toward web-based user interfaces...
Hausi A. Müller, Jens H. Jahnke, Dennis B. Sm...
IWPC
2002
IEEE
14 years 3 months ago
An Open Visualization Toolkit for Reverse Architecting
Maintenance and evolution of complex software systems (such as large telecom embedded devices) involve activities such as reverse engineering (RE) and software visualization. Alth...
Alexandru Telea, Alessandro Maccari, Claudio Riva
CONPAR
1992
14 years 2 months ago
Analysis of an Efficient Distributed Algorithm for Mutual Exclusion (Average-Case Analysis of Path Reversal)
The algorithm designed in [12, 15] was the very first distributed algorithm to solve the mutual exclusion problem in complete networks by using a dynamic logical tree structure as...
Christian Lavault