Sciweavers

1640 search results - page 256 / 328
» Deriving Private Information from Randomized Data
Sort
View
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 4 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
ITNG
2007
IEEE
15 years 4 months ago
Performance Analysis of Error Control Codes for Wireless Sensor Networks
In wireless sensor networks, the data transmitted from the sensor nodes are vulnerable to corruption by errors induced by noisy channels and other factors. Hence it is necessary t...
Gopinath Balakrishnan, Mei Yang, Yingtao Jiang, Yo...
ICBA
2004
Springer
143views Biometrics» more  ICBA 2004»
15 years 3 months ago
Externalized Fingerprint Matching
The 9/11 tragedy triggered an increased interest in biometric passports. According to several sources [2], the electronic ID market is expected to increase by more than 50% per ann...
Claude Barral, Jean-Sébastien Coron, David ...
ICAD
2004
14 years 11 months ago
Reeds: A Responsive Sound Installation
This paper discusses the responsive sound installation Reeds. The Melbourne International Festival of the Arts commissioned the Reeds project in 2000, for exhibition on the Orname...
Garth Paine
ACCV
2009
Springer
14 years 11 months ago
Adaptive-Scale Robust Estimator Using Distribution Model Fitting
We propose a new robust estimator for parameter estimation in highly noisy data with multiple structures and without prior information on the noise scale of inliers. This is a diag...
Trung Ngo Thanh, Hajime Nagahara, Ryusuke Sagawa, ...