Sciweavers

3951 search results - page 167 / 791
» Automatic amortized analysis
Sort
View
132
Voted
ICSE
2005
IEEE-ACM
16 years 5 months ago
Automatic discovery of API-level exploits
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
IROS
2009
IEEE
132views Robotics» more  IROS 2009»
15 years 11 months ago
Automatic selection of task spaces for imitation learning
Abstract— Previous work [1] shows that the movement representation in task spaces offers many advantages for learning object-related and goal-directed movement tasks through imit...
Manuel Mühlig, Michael Gienger, Jochen J. Ste...
MHCI
2009
Springer
15 years 11 months ago
Automatic mobile menu customization based on user operation history
Mobile devices are becoming more and more difficult to use due to the sheer number of functions now supported. In this paper, we propose a menu customization system that ranks fun...
Yusuke Fukazawa, Mirai Hara, Masashi Onogi, Hideto...
SCIA
2009
Springer
183views Image Analysis» more  SCIA 2009»
15 years 11 months ago
A Hybrid Image Quality Measure for Automatic Image Quality Assessment
Abstract. Automatic image quality assessment has many diverse applications. Existing quality measures are not accurate representatives of the human perception. We present a hybrid ...
Atif Bin Mansoor, Maaz Haider, Ajmal S. Mian, Shoa...
ACSAC
2006
IEEE
15 years 11 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh