Sciweavers

429 search results - page 59 / 86
» General Pseudo-random Generators from Weaker Models of Compu...
Sort
View
97
Voted
SAC
2010
ACM
15 years 7 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
91
Voted
FOCS
2003
IEEE
15 years 6 months ago
On the Implementation of Huge Random Objects
We initiate a general study of pseudo-random implementations of huge random objects, and apply it to a few areas in which random objects occur naturally. For example, a random obj...
Oded Goldreich, Shafi Goldwasser, Asaf Nussboim
CORR
2010
Springer
210views Education» more  CORR 2010»
15 years 25 days ago
Exploiting Statistical Dependencies in Sparse Representations for Signal Recovery
Signal modeling lies at the core of numerous signal and image processing applications. A recent approach that has drawn considerable attention is sparse representation modeling, in...
Tomer Faktor, Yonina C. Eldar, Michael Elad
MOBICOM
2004
ACM
15 years 6 months ago
Detecting and correcting malicious data in VANETs
In order to meet performance goals, it is widely agreed that vehicular ad hoc networks (VANETs) must rely heavily on node-to-node communication, thus allowing for malicious data t...
Philippe Golle, Daniel H. Greene, Jessica Staddon
118
Voted
SIGGRAPH
1989
ACM
15 years 4 months ago
Goal-directed, dynamic animation of human walking
This paper presents a hybrid approach to the animation of human locomotion which combines goal-directed and dynamic motion control. Knowledge about a locomotion cycle is incorpora...
Armin Bruderlin, Thomas W. Calvert