Sciweavers

909 search results - page 47 / 182
» Reversible data hiding
Sort
View
DAGSTUHL
2001
13 years 11 months ago
An Overview of the GXL Graph Exchange Language
GXL (Graph eXchange Language) is designed to be a standard exchange format for graph-based tools. GXL is defined as an XML sublanguage, which offers support for exchanging instanc...
Andreas Winter, Bernt Kullbach, Volker Riediger
VLDB
2007
ACM
191views Database» more  VLDB 2007»
14 years 10 months ago
Multidimensional reverse k NN search
Given a multidimensional point q, a reverse k nearest neighbor (RkNN) query retrieves all the data points that have q as one of their k nearest neighbors. Existing methods for proc...
Yufei Tao, Dimitris Papadias, Xiang Lian, Xiaokui ...
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
14 years 4 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
NAR
2000
78views more  NAR 2000»
13 years 10 months ago
Human Immunodeficiency Virus Reverse Transcriptase and Protease Sequence Database
The HIV reverse transcriptase and protease sequence database is an on-line relational database that catalogues evolutionary and drug-related sequence variation in the human immuno...
Robert W. Shafer, Duane R. Jung, Bradley J. Betts,...
TVLSI
2010
13 years 4 months ago
A Reverse-Encoding-Based On-Chip Bus Tracer for Efficient Circular-Buffer Utilization
Hardware debuggers and logic analyzers must be able to record a continuous trace of data. Since the trace data are tremendous, to save space, these traces are often compressed. The...
Fu-Ching Yang, Cheng-Lung Chiang, Ing-Jer Huang