Loading...
Search for: websites
0.008 seconds
Total 62 records

    Login to internet websites by next generation game console

    , Article 2006 2nd IEEE/IFIP International Conference in Central Asia on Internet, ICI 2006, Tashkent, 19 September 2006 through 21 September 2006 ; 2006 ; 1424405432 (ISBN); 9781424405435 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    By a great leap, the computer game industry has today reached fame as big as filmmaking industry. Upon introduction of the new generation of game consoles, this industry will witness spectacular progress. One of these next generation consoles is Nintendo console named "Wii". This console has a new game pad which utilizes motion sensors. On the other hand, facilities such as internet connection are added in new consoles and they are not merely for playing. It is observed that placing password for creating usernames by game consoles is difficult. By the use of the specifications of Wii console game pads, a method for user authentication and entering password is proposed in this paper. By using... 

    Analysing legal status of electronic agents in contracting through interactive websites: Comparative study of american, english and EU laws developing iranian legal system

    , Article Information and Communications Technology Law ; Volume 25, Issue 2 , 2016 , Pages 150-172 ; 13600834 (ISSN) Habibzadeh, T ; Sharif University of Technology
    Routledge  2016
    Abstract
    In the modern world, electronic communications play a significant role in national and international electronic transactions. This issue has forced all legal systems to face up to many emerging legal problems in the context of electronic communications, such as the legal status of electronic agents in contracting electronically. Regarding the legal validity of e-contracts made through interactive websites, the legal status of electronic agents which play an important role in this process is questionable to see whether they are akin to real agents in the physical world or they are only a mere tool of communication. The current article tries to analyse this question by criticising a number of... 

    Improving the quality of code snippets in stack overflow

    , Article 31st Annual ACM Symposium on Applied Computing, 4 April 2016 through 8 April 2016 ; Volume 04-08-April-2016 , 2016 , Pages 1492-1497 ; 9781450337397 (ISBN) Tavakoli, M. R ; Heydarnoori, A ; Ghafari, M ; ACM Special Interest Group on Applied Computing (SIGAPP) ; Sharif University of Technology
    Association for Computing Machinery 
    Abstract
    Question and answer (Q&A) websites like Stack Overflow are one of the important sources of code examples in which developers can ask their questions and leave their answers about programming issues. Since the number of programmers who use these websites are increasing and a large number of questions and answers are being posted there by them, verifying the quality of all the answers and particularly the code snippets in them is impossible. Consequently, some code snippets might be of low quality and/or with faults. To mitigate this issue, we introduce ExRec (Example Recommender), an Eclipse plugin with which programmers can contribute in improving the quality of code snippets in the answers... 

    Performance evaluation of shared hosting security methods

    , Article Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications ; 2012 , Pages 1310-1315 ; 9780769547459 (ISBN) Mirheidari, S. A ; Arshad, S ; Khoshkdahan, S ; Sharif University of Technology
    2012
    Abstract
    Shared hosting is a kind of web hosting in which multiple websites reside on one webserver. It is cost-effective and makes the administration easier for websites' owners. However, shared hosting has some performance and security issues. In default shared hosting configuration, all websites' scripts are executed under the webserver's user account regardless of their owners. Therefore, a website is able to access other websites' resources. This security problem arises from lack of proper isolation between different websites hosted on the same webserver. In this survey, we have examined different methods for handling mentioned security issue. Also we evaluated the performance of mentioned... 

    Different aspects of social network analysis

    , Article 2006 IEEE/WIC/ACM International Conference on Web Intelligence, WI'06, Hong Kong, 18 December 2006 through 22 December 2006 ; 2006 , Pages 66-72 ; 0769527477 (ISBN); 9780769527475 (ISBN) Jamali, M ; Abolhassani, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2006
    Abstract
    A social network is a set of people (or organizations or other social entities) connected by a set of social relationships, such as friendship, co-working or information exchange. Social network analysis focuses on the analysis of patterns of relationships among people, organizations, states and such social entities. Social network analysis provides both a visual and a mathematical analysis of human relationships. Web can also be considered as a social network. Social networks are formed between Web pages by hyperlinking to other Web pages. In this paper a state of the art survey of the works done on social network analysis ranging from pure mathematical analyses in graphs to analyzing the... 

    A categorization scheme for semantic web search engines

    , Article IEEE International Conference on Computer Systems and Applications, 2006, Sharjah, 8 March 2006 through 8 March 2006 ; Volume 2006 , 2006 , Pages 171-178 ; 1424402123 (ISBN); 9781424402120 (ISBN) Sheykh Esmaili, K ; Abolhassani, H ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    Semantic web search engines are evolving and many prototype systems and some implementation have been developed. However, there are some different views on what a semantic search engine should do. In this paper, a categorization scheme for semantic web search engines are introduced and elaborated. For each category, its components are described according to a proposed general architecture and various approaches employed in these components are discussed. We also propose some factors to evaluate systems in each category. © 2006 IEEE  

    A hybrid approach for refreshing web page repositories

    , Article 10th International Conference on Database Systems for Advanced Applications, DASFAA 2005, Beijing, 17 April 2005 through 20 April 2005 ; Volume 3453 , 2005 , Pages 588-593 ; 03029743 (ISSN) Ghodsi, M ; Hassanzadeh, O ; Kamali, Sh ; Monemizadeh, M ; Sharif University of Technology
    Springer Verlag  2005
    Abstract
    Web pages change frequently and thus crawlers have to down-load them often. Various policies have been proposed for refreshing local copies of web pages. In this paper, we introduce a new sampling method that excels over other change detection methods in experiment. Change Frequency (CF) is a method that predicts the change frequency of the pages and, in the long run, achieves an optimal efficiency in comparison with the sampling method. Here, we propose a new hybrid method that is a combination of our new sampling approach and CF and show how our hybrid method improves the efficiency of change detection. © Springer-Verlag Berlin Heidelberg 2005  

    Predicting subjective features from questions on qa websites using BERT

    , Article 6th International Conference on Web Research, ICWR 2020, 22 April 2020 through 23 April 2020 ; 2020 , Pages 240-244 Annamoradnejad, I ; Fazli, M ; Habibi, J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Community Question-Answering websites, such as StackOverflow and Quora, expect users to follow specific guidelines in order to maintain content quality. These systems mainly rely on community reports for assessing contents, which has serious problems, such as the slow handling of violations, the loss of normal and experienced users' time, the low quality of some reports, and discouraging feedback to new users. Therefore, with the overall goal of providing solutions for automating moderation actions in QA websites, we aim to provide a model to predict 20 quality or subjective aspects of questions in QA websites. To this end, we used data gathered by the CrowdSource team at Google Research in... 

    Requirements for automating moderation in community question-answering websites

    , Article 15th Innovations in Software Engineering Conference, ISEC 2022, 24 February 2022 through 26 February 2022 ; 2022 ; 9781450396189 (ISBN) Annamoradnejad, I ; ACM; ACM India SIGSOFT ; Sharif University of Technology
    Association for Computing Machinery  2022
    Abstract
    In recent years, community Q&A websites have attracted many users and have become reliable sources among experts from various fields. These platforms have specific rules to maintain their content quality in addition to general user agreements. Due to the vast expanse of these systems in terms of the number of users and posts, manual checking and verification of new contents by the administrators and official moderators are not feasible, and these systems require scalable solutions. In major Q&A networks, the current strategy is to use crowdsourcing with reliance on reporting systems. This strategy has serious problems, including the slow handling of violations, the loss of new and... 

    Multimedia-supported virtual experiment for online user–system trust studies

    , Article Multimedia Systems ; 2016 , Pages 1-15 ; 09424962 (ISSN) Semsar, A ; Nazari Shirehjini, A. A ; Sharif University of Technology
    Springer Verlag  2016
    Abstract
    Ambient Intelligence environments detect and respond to users needs, actions, behaviors and feelings. In the presence of interaction conflicts, user trust plays an important role in accepting Ambient Intelligence environments for living, working, etc. In this paper, we propose a multimedia-supported virtual experiment for online user–system trust studies. We conduct web-based experiments to gather data from a large number of online participants. Subjects experience the environment through an intelligent environment web-based 3D simulator. Our proposed approach can be utilized to measure trust not only in the presence of interaction conflicts, but also in the presence of any other variability... 

    Multimedia-supported virtual experiment for online user–system trust studies

    , Article Multimedia Systems ; Volume 23, Issue 5 , 2017 , Pages 583-597 ; 09424962 (ISSN) Semsar, A ; Nazari Shirehjini, A. A ; Sharif University of Technology
    Abstract
    Ambient Intelligence environments detect and respond to users needs, actions, behaviors and feelings. In the presence of interaction conflicts, user trust plays an important role in accepting Ambient Intelligence environments for living, working, etc. In this paper, we propose a multimedia-supported virtual experiment for online user–system trust studies. We conduct web-based experiments to gather data from a large number of online participants. Subjects experience the environment through an intelligent environment web-based 3D simulator. Our proposed approach can be utilized to measure trust not only in the presence of interaction conflicts, but also in the presence of any other variability... 

    A new human interactive proofs system for deaf persons

    , Article International Conference on Information Technology: New Generations, ITNG 2008, Las Vegas, NV, 7 April 2008 through 9 April 2008 ; 2008 , Pages 807-810 ; 0769530990 (ISBN); 9780769530994 (ISBN) Shirali Shahreza, S ; Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    Nowadays the Internet users are from different ages and groups. Disabled people are a group of the Internet users. Some websites are especially created for disabled people and public access to them is undesirable. In this paper, for the first time, a method is introduced for distinguishing between deaf persons and other users using a new HIP (Human Interactive Proofs) system. In this method, the sign language is used. A word is shown as a movie using a sign language. The user should recognize the word and select it from a list. Only deaf persons can understand sign language and recognize the word, therefore other persons and also computer programs cannot enter the website. This project has... 

    Survey on news mining tasks

    , Article 2nd International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, CISSE 2006, Bridgeport, CT, 4 December 2006 through 14 December 2006 ; 2007 , Pages 219-224 ; 9781402062674 (ISBN) Sayyadi, H ; Salehi, S ; AbolHassani, H ; Sharif University of Technology
    Kluwer Academic Publishers  2007
    Abstract
    Nowadays, there are plenty of online websites related to news. Hence, new technologies, tools and special search engines are created for having access to the news on these websites. Online news is a special type of public information which has exclusive characteristics. These characteristics contribute news engines tasks such as discovering, collecting and searching to be different with similar tasks in traditional web search engines. Clustering plays conspicuous role in news engines tasks. In this paper we study various tasks in news engines and also focusing on clustering applications in them. © 2007 Springer  

    Java applets copy protection by steganography

    , Article 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2006, Pasadena, CA, 18 December 2006 through 20 December 2006 ; 2006 , Pages 388-391 ; 0769527450 (ISBN); 9780769527451 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    Following the expansion of Internet, many software were produced that could launch through Internet without prior installation on computers. This included game software and software that deal with financial affairs. These softwares are mainly in Java language and can be found on web pages as Java Applets. Some software owners want that their products only able to execute through their own web pages so that no one could put them on other web pages. In this paper, a new method has been presented to protect Java Applets from copying by using "Steganography in HTML web pages" method. In this method, a special 8-character string is hidden in the HTML page by a secret key. The string and the... 

    Tree-Based method for classifying websites using extended hidden markov models

    , Article 13th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2009, Bangkok, 27 April 2009 through 30 April 2009 ; Volume 5476 LNAI , 2009 , Pages 780-787 ; 03029743 (ISSN); 3642013066 (ISBN); 9783642013065 (ISBN) Yazdani, M ; Eftekhar, M ; Abolhassani, H ; National Electronics and Computer Technology Center (NECTEC); Thailand Convention and Exhibition Bureau (TCEB); Air Force Office of Scientific Research,; Asian Office of Aerospace Research and Development (AFOSR/AOARD) ; Sharif University of Technology
    2009
    Abstract
    One important problem proposed recently in the field of web mining is website classification problem. The complexity together with the necessity to have accurate and fast algorithms yield to many attempts in this field, but there is a long way to solve these problems efficiently, yet. The importance of the problem encouraged us to work on a new approach as a solution. We use the content of web pages together with the link structure between them to improve the accuracy of results. In this work we use Naïve-bayes models for each predefined webpage class and an extended version of Hidden Markov Model is used as website class models. A few sample websites are adopted as seeds to calculate... 

    A Solution Recommender for Exceptions in an Integrated Development Environment

    , M.Sc. Thesis Sharif University of Technology Amintabar, Vahid (Author) ; Heydarnoori, Abbas (Supervisor)
    Abstract
    Exceptions are an indispensable part of a software development process. Developers usually rely on imprecise results from a web search to resolve the exceptions. More specifically, they manually design a query based on the information indicated by the exception message and the stack trace of that exception. Afterwards, they choose and adapt a solution from the web search results. In this scenario, there is a gap between the development environment and web browsers. Moreover, manual search is very time consuming and a lot of useful information from the code is lost. In this thesis, we introduce Exception Tracer, an Eclipse plugin that helps developers find solutions of exceptions. Exception... 

    Enhancing the Confidentiality of Encrypted Traffic with the Adversarial-Learning Approach

    , M.Sc. Thesis Sharif University of Technology Tajalli, Hamid Reza (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    The importance of confidentiality and anonymity maintaining mechanisms are not hidden to anybody these days. With the worldwide web spreading rapidly, protecting the users' data flowing through it has become one of the most critical challenges to anonymity mechanisms. Nonetheless, machine learning algorithms have shown that they can reveal some explanatory information, even from encrypted traffic. Website fingerprinting attacks are a group of traffic analysis attacks that aim to detect the website which the monitored user has already visited. The current research takes a brief survey over website fingerprinting attacks presented in recent studies plus the defenses which took devised against... 

    Defending Traffic Unobservability through Thwarting Statistical Features

    , M.Sc. Thesis Sharif University of Technology Karimi, Mohammad Reza (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Governments and organizations need to classify network trac using deep packet inspection systems, by protocols, applications, and user’s behavior, to monitor, control, and enforce law and governance to the online behavior of its citizens and human resources. The high capacity of machine learning in the classication problem has led trac monitoring systems to use machine learning.The development of machine learning-based trac monitoring systems in the eld of research has reached relative maturity and has reached the border of industrial, commercial and governmental use. In the latest trac classi-cation studies using neural networks, as the most ecient machine learning methods, the classication... 

    Analyzing TOR Network Data Through Deep Learning

    , M.Sc. Thesis Sharif University of Technology Hemmatyar, Mohammad Mahdi (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    Today, we live in an information age where all people can access the vast amount of data in the world by connecting to the Internet.Since the Internet has expanded significantly to share information, some individuals and organizations seek to be able to prevent the possible sabotage of some people by monitoring network users. Analysis of computer network traffic is one of the importance issues that many activities have been done in this area. One of the most important questions in traffic analysis is to identify the main content of traffic on the encrypted network. Numerous studies have shown that the traffic of websites visited through the Tor network, including Specific information that... 

    Two novel server-side attacks against log file in Shared Web Hosting servers

    , Article 2012 International Conference for Internet Technology and Secured Transactions, ICITST 2012 ; 2012 , Pages 318-323 ; 9781908320087 (ISBN) Mirheidari, S. A ; Arshad, S ; Khoshkdahan, S ; Jalili, R ; Sharif University of Technology
    Abstract
    Shared Web Hosting service enables hosting multitude of websites on a single powerful server. It is a well-known solution as many people share the overall cost of server maintenance and also, website owners do not need to deal with administration issues is not necessary for website owners. In this paper, we illustrate how shared web hosting service works and demonstrate the security weaknesses rise due to the lack of proper isolation between different websites, hosted on the same server. We exhibit two new server-side attacks against the log file whose objectives are revealing information of other hosted websites which are considered to be private and arranging other complex attacks. In the...