Sciweavers

1344 search results - page 71 / 269
» Automatic performance analysis with periscope
Sort
View
MHCI
2009
Springer
15 years 6 months ago
Automatic mobile menu customization based on user operation history
Mobile devices are becoming more and more difficult to use due to the sheer number of functions now supported. In this paper, we propose a menu customization system that ranks fun...
Yusuke Fukazawa, Mirai Hara, Masashi Onogi, Hideto...
SCIA
2009
Springer
183views Image Analysis» more  SCIA 2009»
15 years 6 months ago
A Hybrid Image Quality Measure for Automatic Image Quality Assessment
Abstract. Automatic image quality assessment has many diverse applications. Existing quality measures are not accurate representatives of the human perception. We present a hybrid ...
Atif Bin Mansoor, Maaz Haider, Ajmal S. Mian, Shoa...
ACSAC
2006
IEEE
15 years 5 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
CCS
2005
ACM
15 years 5 months ago
Automatic placement of authorization hooks in the linux security modules framework
We present a technique for automatic placement of authorization hooks, and apply it to the Linux security modules (LSM) framework. LSM is a generic framework which allows diverse ...
Vinod Ganapathy, Trent Jaeger, Somesh Jha
USS
2008
15 years 1 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam