Sciweavers

523 search results - page 30 / 105
» codes 2011
Sort
View
115
Voted
CORR
2011
Springer
175views Education» more  CORR 2011»
14 years 4 months ago
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol descripti...
Mihhail Aizatulin, Andrew D. Gordon, Jan Jürj...
212
Voted
ICASSP
2011
IEEE
14 years 3 months ago
Auto-regressive model based error concealment scheme for stereoscopic video coding
Stereoscopic video is an important manner for 3-D video applications, and robust stereoscopic video transmission has posed a technical challenge for stereoscopic video coding. In ...
Xinguang Xiang, Debin Zhao, Siwei Ma, Wen Gao
173
Voted
ESORICS
2011
Springer
14 years 6 days ago
Linear Obfuscation to Combat Symbolic Execution
Abstract. Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful t...
Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao
80
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Very low bit-rate F0 coding for phonetic vocoder using MSD-HMM with quantized F0 context
This paper presents a very low bit-rate F0 coding technique for speaker-dependent phonetic vocoder based on hidden Markov model (HMM) using quantized F0 context. In the proposed t...
Takashi Nose, Takao Kobayashi
ICASSP
2011
IEEE
14 years 4 months ago
Informed secure watermarking using optimal transport
This paper presents several watermarking methods preventing the estimation of the secret key by an adversary. The constraints for secure embedding using distribution matching, whe...
Patrick Bas