Sciweavers

429 search results - page 59 / 86
» General Pseudo-random Generators from Weaker Models of Compu...
Sort
View
SAC
2010
ACM
14 years 2 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
FOCS
2003
IEEE
14 years 1 months ago
On the Implementation of Huge Random Objects
We initiate a general study of pseudo-random implementations of huge random objects, and apply it to a few areas in which random objects occur naturally. For example, a random obj...
Oded Goldreich, Shafi Goldwasser, Asaf Nussboim
CORR
2010
Springer
210views Education» more  CORR 2010»
13 years 7 months ago
Exploiting Statistical Dependencies in Sparse Representations for Signal Recovery
Signal modeling lies at the core of numerous signal and image processing applications. A recent approach that has drawn considerable attention is sparse representation modeling, in...
Tomer Faktor, Yonina C. Eldar, Michael Elad
MOBICOM
2004
ACM
14 years 1 months ago
Detecting and correcting malicious data in VANETs
In order to meet performance goals, it is widely agreed that vehicular ad hoc networks (VANETs) must rely heavily on node-to-node communication, thus allowing for malicious data t...
Philippe Golle, Daniel H. Greene, Jessica Staddon
SIGGRAPH
1989
ACM
13 years 11 months ago
Goal-directed, dynamic animation of human walking
This paper presents a hybrid approach to the animation of human locomotion which combines goal-directed and dynamic motion control. Knowledge about a locomotion cycle is incorpora...
Armin Bruderlin, Thomas W. Calvert