In our previous work (`An Algebraic Watchdog for Wireless Network Coding'), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police th...
Heap spraying is an attack technique commonly used in hijacking browsers to download and execute malicious code. In this attack, attackers first fill a large portion of the victim...
Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei ...
In this paper, we describe LightWave, a sensing approach that turns ordinary compact fluorescent light (CFL) bulbs into sensors of human proximity. Unmodified CFL bulbs are shown ...
Sidhant Gupta, Ke-Yu Chen, Matthew S. Reynolds, Sh...
This paper introduces an affine invariant shape descriptor for maximally stable extremal regions (MSER). Affine invariant feature descriptors are normally computed by sampling the...
In this contribution, we are concerned with the detection and re ned localization of 3D point landmarks. We propose multi-step di erential procedures for subvoxel localization of 3...