Sciweavers

326 search results - page 10 / 66
» Automatic binary deobfuscation
Sort
View
DRM
2008
Springer
13 years 9 months ago
A decision theoretic framework for analyzing binary hash-based content identification systems
Content identification has many applications, ranging from preventing illegal sharing of copyrighted content on video sharing websites, to automatic identification and tagging of ...
Avinash L. Varna, Ashwin Swaminathan, Min Wu
ICASSP
2011
IEEE
12 years 11 months ago
Investigations into the incorporation of the Ideal Binary Mask in ASR
While much work has been dedicated to exploring how best to incorporate the Ideal Binary Mask (IBM) in automatic speech recognition (ASR) for noisy signals, we demonstrate that th...
William Hartmann, Eric Fosler-Lussier
CVPR
2010
IEEE
14 years 3 months ago
Dynamical Binary Latent Variable Models for 3D Human Pose Tracking
We introduce a new class of probabilistic latent variable model called the Implicit Mixture of Conditional Restricted Boltzmann Machines (imCRBM) for use in human pose tracking. K...
Graham Taylor, Leonid Sigal, David Fleet, Geoffrey...
CORR
2007
Springer
110views Education» more  CORR 2007»
13 years 7 months ago
On formulas for decoding binary cyclic codes
— We address the problem of the algebraic decoding of any cyclic code up to the true minimum distance. For this, we use the classical formulation of the problem, which is to fin...
Daniel Augot, Magali Bardet, Jean-Charles Faug&egr...
CGO
2006
IEEE
14 years 1 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...