• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 530,060
Next 10 →

Data Hiding in Windows Executable Files

by Daemin Shin, Yeog Kim, Keunduck Byun, Sangjin Lee
"... A common technique for hiding information in executable files is the embedding a limited amount of information in program binaries. The hiding technique is commonly achieved by using special software tools as e.g. the tools presented by Hydan and Stilo in (Rakan, 2004, Bertrand, 2005). These tools c ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
A common technique for hiding information in executable files is the embedding a limited amount of information in program binaries. The hiding technique is commonly achieved by using special software tools as e.g. the tools presented by Hydan and Stilo in (Rakan, 2004, Bertrand, 2005). These tools

Signatures for Library Functions in Executable Files

by Mike Van Emmerik , 1993
"... A method for efficiently generating signatures for detecting library functions in executable files is described. The signatures are used to automatically detect such functions in dcc, the reverse compiler at the Queensland University of Technology. Difficulties arise from the variability of the sign ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
A method for efficiently generating signatures for detecting library functions in executable files is described. The signatures are used to automatically detect such functions in dcc, the reverse compiler at the Queensland University of Technology. Difficulties arise from the variability

Executive Compensation

by Kevin J. Murphy , 1999
"... This paper summarizes the empirical and theoretical research on executive compensation and provides a comprehensive and up-to-date description of pay practices (and trends in pay practices) for chief executive officers (CEOs). Topics discussed include the level and structure of CEO pay (including de ..."
Abstract - Cited by 603 (19 self) - Add to MetaCart
This paper summarizes the empirical and theoretical research on executive compensation and provides a comprehensive and up-to-date description of pay practices (and trends in pay practices) for chief executive officers (CEOs). Topics discussed include the level and structure of CEO pay (including

Rewriting Executable Files to Measure Program Behavior

by James R. Larus, Thomas Ball - SOFTWARE PRACTICE & EXPERIENCE , 1994
"... ..."
Abstract - Cited by 123 (11 self) - Add to MetaCart
Abstract not found

The Google File System

by Sanjay Ghemawat, Howard Gobioff, Shun-tak Leung - ACM SIGOPS Operating Systems Review
"... We have designed and implemented the Google File Sys-tem, a scalable distributed file system for large distributed data-intensive applications. It provides fault tolerance while running on inexpensive commodity hardware, and it delivers high aggregate performance to a large number of clients. While ..."
Abstract - Cited by 1470 (2 self) - Add to MetaCart
We have designed and implemented the Google File Sys-tem, a scalable distributed file system for large distributed data-intensive applications. It provides fault tolerance while running on inexpensive commodity hardware, and it delivers high aggregate performance to a large number of clients. While

Disconnected Operation in the Coda File System

by James J. Kistler, M. Satyanarayanan - ACM Transactions on Computer Systems , 1992
"... Disconnected operation is a mode of operation that enables a client to continue accessing critical data during temporary failures of a shared data repository. An important, though not exclusive, application of disconnected operation is in supporting portable computers. In this paper, we show that di ..."
Abstract - Cited by 1014 (36 self) - Add to MetaCart
that disconnected operation is feasible, efficient and usable by describing its design and implementation in the Coda File System. The central idea behind our work is that caching of data, now widely used for performance, can also be exploited to improve availability.

Bin-Carver: Automatic Recovery of Binary Executable Files

by Scott H, Zhiqiang Lin A, Guofei Gu B, Bhavani Thuraisingham A
"... File carving is the process of reassembling files from disk fragments based on the file content in the absence of file system metadata. By leveraging both file header and footer pairs, traditional file carving mainly focuses on document and image files such as PDF and JPEG. With the vast amount of m ..."
Abstract - Add to MetaCart
of malware code appearing in the wild daily, recovery of binary executable files becomes an important problem, especially for the case in which malware deletes itself after compromising a computer. However, unlike image files that usually have both a header and footer pair, executable files only have header

I. Definitions A. Executable File

by D. Mailmarshal , 2007
"... A program or file that automatically performs computer functions once opened, executed, or run. B. Law Enforcement Databases Any program or source of data accessed or used by Division personnel for law enforcement purposes. This includes but is not limited to Accurint, LEADS, and OHLEG. C. Local Ope ..."
Abstract - Add to MetaCart
A program or file that automatically performs computer functions once opened, executed, or run. B. Law Enforcement Databases Any program or source of data accessed or used by Division personnel for law enforcement purposes. This includes but is not limited to Accurint, LEADS, and OHLEG. C. Local

Page within Executable File Using Statistical Steganography

by A. A. Zaidan, Sultan Idris , 2016
"... ABSTRACT — A Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology, it become easy to attack systems, and detection of encryption methods became necessary to find ..."
Abstract - Add to MetaCart
is embedded in. It is the result from the researches to embed information in executable files, but when will use the executable file for cover they have many challenges must be taken into consideration which is any changes made to the file will be firstly detected by untie viruses, secondly the functionality

Scale and performance in a distributed file system

by John H. Howard, Michael L. Kazar, Sherri G. Menees, A. Nichols, M. Satyanarayanan, Robert N. Sidebotham, Michael J. West - ACM Transactions on Computer Systems , 1988
"... The Andrew File System is a location-transparent distributed tile system that will eventually span more than 5000 workstations at Carnegie Mellon University. Large scale affects performance and complicates system operation. In this paper we present observations of a prototype implementation, motivat ..."
Abstract - Cited by 937 (47 self) - Add to MetaCart
The Andrew File System is a location-transparent distributed tile system that will eventually span more than 5000 workstations at Carnegie Mellon University. Large scale affects performance and complicates system operation. In this paper we present observations of a prototype implementation
Next 10 →
Results 1 - 10 of 530,060
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University