Rk Reddy | Columbia College Chicago (original) (raw)

Address: United States

less

Uploads

Papers by Rk Reddy

Research paper thumbnail of Zeros of successive derivatives of entire functions

Bulletin of The American Mathematical Society, 1973

Research paper thumbnail of A multicenter, randomized trial of daily, high dose interferon-alpha 2b for the treatment of chronic hepatitis C: Prospective stratification by viral burden and genotype

Gastroenterology, 1998

presented a method for implementing the DES block cipher such that it becomes hard to extract the... more presented a method for implementing the DES block cipher such that it becomes hard to extract the embedded secret key in a white-box attack context. In such a context, an attacker has full access to the implementation and its execution environment. In order to provide an extra level of security, an implementation shielded with external encodings was introduced by Chow et al. and improved by Link and Neumann . In this paper, we present an algorithm to extract the secret key from such white-box DES implementations. The cryptanalysis is a differential attack on obfuscated rounds, and works regardless of the shielding external encodings that are applied. The cryptanalysis has a average time complexity of 2 14 and a negligible space complexity.

Research paper thumbnail of Biphasic Transthoracic Defibrillation Causes Fewer ECG ST-Segment Changes After Shock

Annals of Emergency Medicine, 1997

Automatically generated tags and geotags hold great promise to improve access to video collection... more Automatically generated tags and geotags hold great promise to improve access to video collections and online communities. We overview three tasks offered in the MediaEval 2010 benchmarking initiative, for each, describing its use scenario, definition and the data set released. For each task, a reference algorithm is presented that was used within MediaEval 2010 and comments are included on lessons learned. The Tagging Task, Professional involves automatically matching episodes in a collection of Dutch television with subject labels drawn from the keyword thesaurus used by the archive staff. The Tagging Task, Wild Wild Web involves automatically predicting the tags that are assigned by users to their online videos. Finally, the Placing Task requires automatically assigning geo-coordinates to videos. The specification of each task admits the use of the full range of available information including user-generated metadata, speech recognition transcripts, audio, and visual features.

Research paper thumbnail of How Computer Vision Can Help in Outdoor Positioning

Localization technologies have been an important focus in ubiquitous computing. This paper explor... more Localization technologies have been an important focus in ubiquitous computing. This paper explores an underrepresented area, namely computer vision technology, for outdoor positioning. More specifically we explore two modes of positioning in a challenging real world scenario: single snapshot based positioning, improved by a novel highdimensional feature matching method, and continuous positioning enabled by combination of snapshot and incremental positioning. Quite interestingly, vision enables localization accuracies comparable to GPS. Furthermore the paper also analyzes and compares possibilities offered by the combination of different subsets of positioning technologies such as WiFi, GPS and dead reckoning in the same real world scenario as for vision based positioning.

Research paper thumbnail of Zeros of successive derivatives of entire functions

Bulletin of The American Mathematical Society, 1973

Research paper thumbnail of A multicenter, randomized trial of daily, high dose interferon-alpha 2b for the treatment of chronic hepatitis C: Prospective stratification by viral burden and genotype

Gastroenterology, 1998

presented a method for implementing the DES block cipher such that it becomes hard to extract the... more presented a method for implementing the DES block cipher such that it becomes hard to extract the embedded secret key in a white-box attack context. In such a context, an attacker has full access to the implementation and its execution environment. In order to provide an extra level of security, an implementation shielded with external encodings was introduced by Chow et al. and improved by Link and Neumann . In this paper, we present an algorithm to extract the secret key from such white-box DES implementations. The cryptanalysis is a differential attack on obfuscated rounds, and works regardless of the shielding external encodings that are applied. The cryptanalysis has a average time complexity of 2 14 and a negligible space complexity.

Research paper thumbnail of Biphasic Transthoracic Defibrillation Causes Fewer ECG ST-Segment Changes After Shock

Annals of Emergency Medicine, 1997

Automatically generated tags and geotags hold great promise to improve access to video collection... more Automatically generated tags and geotags hold great promise to improve access to video collections and online communities. We overview three tasks offered in the MediaEval 2010 benchmarking initiative, for each, describing its use scenario, definition and the data set released. For each task, a reference algorithm is presented that was used within MediaEval 2010 and comments are included on lessons learned. The Tagging Task, Professional involves automatically matching episodes in a collection of Dutch television with subject labels drawn from the keyword thesaurus used by the archive staff. The Tagging Task, Wild Wild Web involves automatically predicting the tags that are assigned by users to their online videos. Finally, the Placing Task requires automatically assigning geo-coordinates to videos. The specification of each task admits the use of the full range of available information including user-generated metadata, speech recognition transcripts, audio, and visual features.

Research paper thumbnail of How Computer Vision Can Help in Outdoor Positioning

Localization technologies have been an important focus in ubiquitous computing. This paper explor... more Localization technologies have been an important focus in ubiquitous computing. This paper explores an underrepresented area, namely computer vision technology, for outdoor positioning. More specifically we explore two modes of positioning in a challenging real world scenario: single snapshot based positioning, improved by a novel highdimensional feature matching method, and continuous positioning enabled by combination of snapshot and incremental positioning. Quite interestingly, vision enables localization accuracies comparable to GPS. Furthermore the paper also analyzes and compares possibilities offered by the combination of different subsets of positioning technologies such as WiFi, GPS and dead reckoning in the same real world scenario as for vision based positioning.

Log In