Overwriting (computer science)

Known as: Over writing, Overwriting 
Overwriting is a process of writing a binary set of data in computer data storage and is a term used to describe when new information replaces old… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1977-2018
0102019772018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Stochastic Gradient Descent (SGD) is a popular algorithm that can achieve stateof-the-art performance on a variety of machine… (More)
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
2008
2008
Despite having been around for more than 25 years, buffer overflow attacks are still a major security threat for deployed… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
Highly Cited
2007
Highly Cited
2007
  • Andrew D. Ker
  • IEEE Transactions on Information Forensics and…
  • 2007
This paper proposes steganalysis methods for extensions of least-significant bit (LSB) overwriting to both of the two lowest bit… (More)
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Toward enhancing the reliability of the Linux file system, we are developing a new log-structured file system (NILFS) for the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We suggest a graph-theoretic approach to steganography based on the idea of exchanging rather than overwriting pixels. We… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
Is this relevant?
2005
2005
Many important applications exhibit large amounts of data parallelism, and modern computer systems are designed to take advantage… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Conventional security exploits have relied on overwriting the saved return pointer on the stack to hijack the path of execution… (More)
Is this relevant?
2001
2001
Many devices, like mobile phones, use contextual profiles like “in the car” or “in a meeting” to quickly switch between behaviors… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
Highly Cited
1997
Highly Cited
1997
We propose a new model for exible composition of objects from a set of features Features are similar to abstract subclasses but… (More)
Is this relevant?
1997
1997
m Current World Wide Web (WWW or Web) standards provide simple support for applications that allow remote editing of typed data… (More)
Is this relevant?