Sciweavers

909 search results - page 146 / 182
» Games for extracting randomness
Sort
View
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
14 years 3 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
NTMS
2009
IEEE
14 years 3 months ago
An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements
—New approaches that generate secret keys from radio channel characteristics have been recently proposed. The security of these schemes usually relies on the reciprocity principl...
Sana Tmar Ben Hamida, Jean-Benoît Pierrot, C...
INFOCOM
2009
IEEE
14 years 3 months ago
Greedy Routing with Bounded Stretch
—Greedy routing is a novel routing paradigm where messages are always forwarded to the neighbor that is closest to the destination. Our main result is a polynomial-time algorithm...
Roland Flury, Sriram V. Pemmaraju, Roger Wattenhof...
ACCV
2009
Springer
14 years 3 months ago
Visual Saliency Based Object Tracking
Abstract. This paper presents a novel method of on-line object tracking with the static and motion saliency features extracted from the video frames locally, regionally and globall...
Geng Zhang, Zejian Yuan, Nanning Zheng, Xingdong S...
ACCV
2009
Springer
14 years 3 months ago
Weighted Map for Reflectance and Shading Separation Using a Single Image
In real world, a scene is composed by many characteristics. Intrinsic images represent these characteristics by two components, reflectance (the albedo of each point) and shading (...
Sung-Hsien Hsieh, Chih-Wei Fang, Te-Hsun Wang, Chi...