Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2011

Research Collection School Of Computing and Information Systems

Discipline
Keyword

Articles 1 - 30 of 217

Full-Text Articles in Physical Sciences and Mathematics

Value Relevance Of Blog Visibility, Nan Hu, Ling Liu, Arindam Tripathy, Lee J. Yao Dec 2011

Value Relevance Of Blog Visibility, Nan Hu, Ling Liu, Arindam Tripathy, Lee J. Yao

Research Collection School Of Computing and Information Systems

This study empirically examines the effect of a non-traditional information source, namely a firm's blog visibility on the capital market valuation of firms. After controlling for earnings, book value of equity and other value relevant variables, such as traditional media exposure, R&D spending, and advertising expense, we find a positive association between a firm's blog visibility and its capital market valuation. In addition, we find blog visibility Grange causes trading, not vice versa. Our findings indicate that non-traditional information sources such as blogs help disseminate information and influence consumers' investment decisions by capturing their attention.


Four Perspectives On Architectural Strategy, C. Jason Woodard, Joel West Dec 2011

Four Perspectives On Architectural Strategy, C. Jason Woodard, Joel West

Research Collection School Of Computing and Information Systems

A recurring theme in the literature on technology and organizations is the concept of mirroring, which posits a duality between technological and organizational design decisions. In this paper we highlight a second, orthogonal duality between components and interfaces: designers of both products and organizations must decide what information to hide within component boundaries and what to expose to other designers. Although the component-interface duality appears in many settings, it presents especially vexing strategic challenges in the design and production of complex digital artifacts. We present a typology of four interlinked perspectives on these kinds of strategic design problems, and discuss …


Modeling 3d Articulated Motions With Conformal Geometry Videos (Cgvs), Dao T. P. Quynh, Ying He, Xiaoming Chen, Jiazhi Xia, Qian Sun, Steven C. H. Hoi Dec 2011

Modeling 3d Articulated Motions With Conformal Geometry Videos (Cgvs), Dao T. P. Quynh, Ying He, Xiaoming Chen, Jiazhi Xia, Qian Sun, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

3D articulated motions are widely used in entertainment, sports, military, and medical applications. Among various techniques for modeling 3D motions, geometry videos (GVs) are a compact representation in that each frame is parameterized to a 2D domain, which captures the 3D geometry (x, y, z) to a pixel (r, g, b) in the image domain. As a result, the widely studied image/video processing techniques can be directly borrowed for 3D motion. This paper presents conformal geometry videos (CGVs), a novel extension of the traditional geometry videos by taking into the consideration of the isometric nature of 3D articulated motions. We …


Understanding And Protecting Privacy: Formal Semantics And Principled Audit Mechanisms, Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry Deyoung, Deepak Garg, Limin Jia, Dilsun Kaynar, Arunesh Sinha Dec 2011

Understanding And Protecting Privacy: Formal Semantics And Principled Audit Mechanisms, Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry Deyoung, Deepak Garg, Limin Jia, Dilsun Kaynar, Arunesh Sinha

Research Collection School Of Computing and Information Systems

Privacy has become a significant concern in modern society as personal information about individuals is increasingly collected, used, and shared, often using digital technologies, by a wide range of organizations. Certain information handling practices of organizations that monitor individuals’ activities on the Web, data aggregation companies that compile massive databases of personal information, cell phone companies that collect and use location data about individuals, online social networks and search engines—while enabling useful services—have aroused much indignation and protest in the name of privacy. Similarly, as healthcare organizations are embracing electronic health record systems and patient portals to enable patients, employees, …


Determination Of Sin2Θeff W Using Jet Charge Measurements In Hadronic Z Decays, D. Buskulic, M. Thulasidas Dec 2011

Determination Of Sin2Θeff W Using Jet Charge Measurements In Hadronic Z Decays, D. Buskulic, M. Thulasidas

Research Collection School Of Computing and Information Systems

The electroweak mixing angle is determined with high precision from measurements of the mean dierence between forward and backward hemisphere charges in hadronic decays of the Z. A data sample of 2:5 million hadronic Z decays recorded over the period 1990 to 1994 in the ALEPH detector at LEP is used. The mean charge separation between event hemispheres containing the original quark and antiquark is measured for b b and cc events in subsamples selected by their long lifetimes or using fast D 's. The corresponding average charge separation for light quarks is measured in an inclusive sample from the …


Tracking Web Video Topics: Discovery, Visualization, And Monitoring, Juan Cao, Chong-Wah Ngo, Yong-Dong Zhang, Jin-Tao Li Dec 2011

Tracking Web Video Topics: Discovery, Visualization, And Monitoring, Juan Cao, Chong-Wah Ngo, Yong-Dong Zhang, Jin-Tao Li

Research Collection School Of Computing and Information Systems

Despite the massive growth of web-shared videos in Internet, efficient organization and monitoring of videos remains a practical challenge. While nowadays broadcasting channels are keen to monitor online events, identifying topics of interest from huge volume of user uploaded videos and giving recommendation to emerging topics are by no means easy. Specifically, such process involves discovering of new topic, visualization of the topic content, and incremental monitoring of topic evolution. This paper studies the problem from three aspects. First, given a large set of videos collected over months, an efficient algorithm based on salient trajectory extraction on a topic evolution …


Galaxy Browser: Exploratory Search Of Web Videos, Lei Pang, Song Tan, Hung-Khoon Tan, Chong-Wah Ngo Dec 2011

Galaxy Browser: Exploratory Search Of Web Videos, Lei Pang, Song Tan, Hung-Khoon Tan, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

Most search engines return a ranked list of items in response to a query. The list however tells very little about the relationship among items. For videos especially, users often read to spend significant amount of time to navigate the search result. Exploratory search presents a new paradigm for browsing where the browser takes up the role of information exploring and presents a well-organized browsing structure for users to navigate. The proposed interface Galaxy Browser adopts the recent advances in near-duplicate detection and then synchronizes the detected near-duplicate information with comprehensive background knowledge derived from online external resources. The result …


Context-Based Friend Suggestion In Online Photo-Sharing Community, Ting Yao, Chong-Wah Ngo, Tao Mei Dec 2011

Context-Based Friend Suggestion In Online Photo-Sharing Community, Ting Yao, Chong-Wah Ngo, Tao Mei

Research Collection School Of Computing and Information Systems

With the popularity of social media, web users tend to spend more time than before for sharing their experience and interest in online photo-sharing sites. The wide variety of sharing behaviors generate different metadata which pose new opportunities for the discovery of communities. We propose a new approach, named context-based friend suggestion, to leverage the diverse form of contextual cues for more effective friend suggestion in the social media community. Different from existing approaches, we consider both visual and geographical cues, and develop two user-based similarity measurements, i.e., visual similarity and geo similarity for characterizing user relationship. The problem of …


On The Pooling Of Positive Examples With Ontology For Visual Concept Learning, Shiai Zhu, Chong-Wah Ngo, Yu-Gang Jiang Dec 2011

On The Pooling Of Positive Examples With Ontology For Visual Concept Learning, Shiai Zhu, Chong-Wah Ngo, Yu-Gang Jiang

Research Collection School Of Computing and Information Systems

A common obstacle in effective learning of visual concept classifiers is the scarcity of positive training examples due to expensive labeling cost. This paper explores the sampling of weakly tagged web images for concept learning without human assistance. In particular, ontology knowledge is incorporated for semantic pooling of positive examples from ontologically neighboring concepts. This effectively widens the coverage of the positive samples with visually more diversified content, which is important for learning a good concept classifier. We experiment with two learning strategies: aggregate and incremental. The former strategy re-trains a new classifier by combining existing and newly collected examples, …


Modeling Social Strength In Social Media Community Via Kernel-Based Learning, Jinfeng Zhuang, Tao Mei, Steven C. H. Hoi, Xian-Sheng Hua, Shipeng Li Dec 2011

Modeling Social Strength In Social Media Community Via Kernel-Based Learning, Jinfeng Zhuang, Tao Mei, Steven C. H. Hoi, Xian-Sheng Hua, Shipeng Li

Research Collection School Of Computing and Information Systems

Modeling continuous social strength rather than conventional binary social ties in the social network can lead to a more precise and informative description of social relationship among people. In this paper, we study the problem of social strength modeling (SSM) for the users in a social media community, who are typically associated with diverse form of data. In particular, we take Flickr---the most popular online photo sharing community---as an example, in which users are sharing their experiences through substantial amounts of multimodal contents (e.g., photos, tags, geo-locations, friend lists) and social behaviors (e.g., commenting and joining interest groups). Such heterogeneous …


Sire: A Social Image Retrieval Engine, Steven C. H. Hoi, Pengcheng Wu Dec 2011

Sire: A Social Image Retrieval Engine, Steven C. H. Hoi, Pengcheng Wu

Research Collection School Of Computing and Information Systems

With the explosive growth of social media applications on the internet, billions of social images have been made available in many social media web sites nowadays. This has presented an open challenge of web-scale social image search. Unlike existing commercial web search engines that often adopt text based retrieval, in this demo, we present a novel web-based multimodal paradigm for large-scale social image retrieval, termed "Social Image Retrieval Engine" (SIRE), which effectively exploits both textual and visual contents to narrow down the semantic gap between high-level concepts and low-level visual features. A relevance feedback mechanism is also equipped to learn …


From Primordial Soup To Platform-Based Competition: Exploring The Emergence Of Products, Systems, And Platforms, C. Jason Woodard, Eric K. Clemons Dec 2011

From Primordial Soup To Platform-Based Competition: Exploring The Emergence Of Products, Systems, And Platforms, C. Jason Woodard, Eric K. Clemons

Research Collection School Of Computing and Information Systems

We use an agent-based NK model to explore the conditions under which standard platforms emerge among competing products. Our findings were inconclusive. We find that the usual Darwinian conditions needed for the emergence of complexity are sufficient to yield a limited reliance upon platforms with a core of common components, simply because evolution causes the population to converge on a set of products that contain combinations that "work well," yielding what we call "coincidental platform emergence." Economies of scale yield more use of common components, or "production platform emergence." Positive participation externalities initially induce the highest degree of platform emergence …


Four-Jet Final State Production In E+E- Collisions At Centre-Of-Mass Energies Of 130 And 136 Gev, D. Buskulic, M. Thulasidas Dec 2011

Four-Jet Final State Production In E+E- Collisions At Centre-Of-Mass Energies Of 130 And 136 Gev, D. Buskulic, M. Thulasidas

Research Collection School Of Computing and Information Systems

The four-jet final state is analyzed to search for hadronic decays of pair-produced heavy particles. The analysis uses the ALEPH data collected at LEP in November 1995 at centre-of-mass energies of 130 and 136 GeV, corresponding to a total integrated luminosity of 5.7 pb1 . An excess of four-jet events is observed with respect to the standard model predictions. In addition, these events exhibit an enhancement in the sum of the two di-jet masses around 105 GeV/c 2 . The properties of these events are studied and compared to the expectations from standard processes and to pair production hypotheses


New Theories And Methods For Technology Adoption Research, Robert J. Kauffman, Angsana A. Techatassanasoontorn Dec 2011

New Theories And Methods For Technology Adoption Research, Robert J. Kauffman, Angsana A. Techatassanasoontorn

Research Collection School Of Computing and Information Systems

This special issue includes six articles on different aspects of technology adoption that represent the development and application of different theoretical and methodological approaches to the business problems that they treat. In terms of theory, three of the articles use behavioral and organizational theories, including adaptive structuration theory, management fashion theory, the unified theory of technology acceptance, the technology acceptance model, and diffusion of innovation theory. The other two are based on economic theory, including network effects theory, and economic growth theory. The methods used are also dramatically different in each of the studies. Three studies use field research and …


Tag-Based Social Image Search With Visual-Text Joint Hypergraph Learning, Yue Gao, Meng Wang, Huanboo Luan, Jialie Shen, Shuicheng Yan, Dacheng Tao Dec 2011

Tag-Based Social Image Search With Visual-Text Joint Hypergraph Learning, Yue Gao, Meng Wang, Huanboo Luan, Jialie Shen, Shuicheng Yan, Dacheng Tao

Research Collection School Of Computing and Information Systems

Tag-based social image search has attracted great interest and how to order the search results based on relevance level is a research problem. Visual content of images and tags have both been investigated. However, existing methods usually employ tags and visual content separately or sequentially to learn the image relevance. This paper proposes a tag-based image search with visual-text joint hypergraph learning. We simultaneously investigate the bag-of-words and bag-of-visual-words representations of images and accomplish the relevance estimation with a hypergraph learning approach. Each textual or visual word generates a hyperedge in the constructed hypergraph. We conduct experiments with a real-world …


Capir: Collaborative Action Planning With Intention Recognition, Nguyen T., Hsu D., Lee W., Tze-Yun Leong, Kaelbling L., Lozano-Perez T., Grant A. Dec 2011

Capir: Collaborative Action Planning With Intention Recognition, Nguyen T., Hsu D., Lee W., Tze-Yun Leong, Kaelbling L., Lozano-Perez T., Grant A.

Research Collection School Of Computing and Information Systems

We apply decision theoretic techniques to construct nonplayer characters that are able to assist a human player in collaborative games. The method is based on solving Markov decision processes, which can be difficult when the game state is described by many variables. To scale to more complex games, the method allows decomposition of a game task into subtasks, each of which can be modelled by a Markov decision process. Intention recognition is used to infer the subtask that the human is currently performing, allowing the helper to assist the human in performing the correct task. Experiments show that the method …


Discussion Of "Biomedical Ontologies: Toward Scientific Debate", Brochhausen M., Burgun A., Ceusters W., Hasman A., Tze-Yun Leong, Musen M., Oliveira J., Peleg M., Rector A., Schulz S. Dec 2011

Discussion Of "Biomedical Ontologies: Toward Scientific Debate", Brochhausen M., Burgun A., Ceusters W., Hasman A., Tze-Yun Leong, Musen M., Oliveira J., Peleg M., Rector A., Schulz S.

Research Collection School Of Computing and Information Systems

With these comments on the paper “Biomedical Ontologies: Toward scientific debate”, written by Victor Maojo et al., Methods of Information in Medicine wants to stimulate a discussion on advantages and challenges of biomedical ontologies. An international group of experts have been invited by the editor of Methods to comment on this paper. Each of the invited commentaries forms one section of this paper.


Content Contribution Under Revenue Sharing And Reputation Concern In Social Media: The Case Of Youtube, Qian Tang, Bin Gu, Andrew B. Whinston Dec 2011

Content Contribution Under Revenue Sharing And Reputation Concern In Social Media: The Case Of Youtube, Qian Tang, Bin Gu, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

A key feature of social media is that it allows individuals and businesses to contribute contents for public viewing. However, little is known about how content providers derive payoffs from such activities. In this study, we build a dynamic structural model to recover the utility function for content providers. Our model distinguishes short-term payoffs based on ad revenue sharing from long-term payoffs driven by content providers’ reputation. The model was estimated using a panel data of 914 top 1000 providers and 381 randomly selected providers on YouTube from Jun 7th, 2010, to Aug 7th, 2011. The two different sets of …


Assessing The Impact Of Recommendation Agents On On-Line Consumer Unplanned Purchase Behavior, R. Eric Hostler, Victoria Y. Yoon, Zhiling Guo, Tor Guimaraes, Guisseppi Forgionne Dec 2011

Assessing The Impact Of Recommendation Agents On On-Line Consumer Unplanned Purchase Behavior, R. Eric Hostler, Victoria Y. Yoon, Zhiling Guo, Tor Guimaraes, Guisseppi Forgionne

Research Collection School Of Computing and Information Systems

Recommendation agents (RAs) have been used by many Internet businesses such as Amazon and Netflix. However, few authors have studied how consumer behavior is affected by those that make suggestions to online consumers based on their recent shopping behavior. Fewer still have examined the role that RAs play in influencing impulse purchasing decisions online. Our study developed a theoretical model to illustrate the impact of RAs on online consumer behavior. The model was tested through an online shopping simulation which used a collaborative filtering based product RA. Particular attention was paid to the effects of an RA on consumer behavior; …


Case Study On Using A Programming Practice Tool For Evaluating University Applicants, Shannon Christopher Boesch, Kevin Steppe Dec 2011

Case Study On Using A Programming Practice Tool For Evaluating University Applicants, Shannon Christopher Boesch, Kevin Steppe

Research Collection School Of Computing and Information Systems

We used a programming practice tool to test basic programming skills of prospective students. A live competition was used to test those skills. Students who did well were asked for further interviews. Most students had no prior background and reported learning the basics of two programming languages within two weeks of self-study.


On Two Rfid Privacy Notions And Their Relations, Yingjiu Li, Robert H. Deng, Junzuo Lai, Changshe Ma Dec 2011

On Two Rfid Privacy Notions And Their Relations, Yingjiu Li, Robert H. Deng, Junzuo Lai, Changshe Ma

Research Collection School Of Computing and Information Systems

Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions in the literature: one based on the indistinguishability of two tags, denoted as ind-privacy, and the other based on the unpredictability of the output of an RFID protocol, denoted as unp*-privacy. In this article, we first revisit the existing unpredictability-based RFID privacy models and point out their limitations. We then propose a new RFID privacy model, denoted as unp*-privacy, based on the indistinguishability of a real tag and a virtual tag. We formally clarify its relationship with the ind-privacy …


Retrieval-Based Face Annotation By Weak Label Regularized Local Coordinate Coding, Dayong Wang, Steven C. H. Hoi, Ying He, Jianke Zhu Dec 2011

Retrieval-Based Face Annotation By Weak Label Regularized Local Coordinate Coding, Dayong Wang, Steven C. H. Hoi, Ying He, Jianke Zhu

Research Collection School Of Computing and Information Systems

Retrieval-based face annotation is a promising paradigm in mining massive web facial images for automated face annotation. Such an annotation paradigm usually encounters two key challenges. The first challenge is how to efficiently retrieve a short list of most similar facial images from facial image databases, and the second challenge is how to effectively perform annotation by exploiting these similar facial images and their weak labels which are often noisy and incomplete. In this paper, we mainly focus on tackling the second challenge of the retrieval-based face annotation paradigm. In particular, we propose an effective Weak Label Regularized Local Coordinate …


An Effective Approach For Topicspecific Opinion Summarization, Binyang Li, Lanjun Zhou, Wei Gao, Kam-Fai Wong, Zhongyu Wei Dec 2011

An Effective Approach For Topicspecific Opinion Summarization, Binyang Li, Lanjun Zhou, Wei Gao, Kam-Fai Wong, Zhongyu Wei

Research Collection School Of Computing and Information Systems

Topic-specific opinion summarization (TOS) plays an important role in helping users digest online opinions, which targets to extract a summary of opinion expressions specified by a query, i.e. topic-specific opinionated information (TOI). A fundamental problem in TOS is how to effectively represent the TOI of an opinion so that salient opinions can be summarized to meet user’s preference. Existing approaches for TOS are either limited by the mismatch between topic-specific information and its corresponding opinionated information or lack of ability to measure opinionated information associated with different topics, which in turn affect the performance seriously. In this paper, we represent …


Automated Removal Of Cross Site Scripting Vulnerabilities In Web Applications, Lwin Khin Shar, Hee Beng Kuan Tan Dec 2011

Automated Removal Of Cross Site Scripting Vulnerabilities In Web Applications, Lwin Khin Shar, Hee Beng Kuan Tan

Research Collection School Of Computing and Information Systems

Context: Cross site scripting (XSS) vulnerability is among the top web application vulnerabilities according to recent surveys. This vulnerability occurs when a web application uses inputs received from users in web pages without properly checking them. This allows an attacker to inject malicious scripts in web pages via such inputs such that the scripts perform malicious actions when a client visits the exploited web pages. Such an attack may cause serious security violations such as account hijacking and cookie theft. Current approaches to mitigate this problem mainly focus on effective detection of XSS vulnerabilities in the programs or prevention of …


Wsm 2011: Third Acm Workshop On Social Media, Steven C. H. Hoi, Michal Jacovi, Ioannis Kompatsiaris, Jiebo Luo, Konstantinos Tserpes Dec 2011

Wsm 2011: Third Acm Workshop On Social Media, Steven C. H. Hoi, Michal Jacovi, Ioannis Kompatsiaris, Jiebo Luo, Konstantinos Tserpes

Research Collection School Of Computing and Information Systems

The Third Workshop on Social Media (WSM2011) continues the series of Workshops on Social Media in 2009 and 2010 and has been established as a platform for the presentation and discussion of the latest, key research issues in social media analysis, exploration, search, mining, and emerging new social media applications. It is held in conjunction with the ACM International Multimedia Conference (MM'11) at Scottsdale, Arizona, USA, 2011 and has attracted contributions on various aspects of social media including data mining from social media, content organization, geo-localization, personalization, recommendation systems, user experience, machine learning and social media approaches and architectures for …


Towards Textually Describing Complex Video Contents With Audio-Visual Concept Classifiers, Chun Chet Tan, Yu-Gang Jiang, Chong-Wah Ngo Dec 2011

Towards Textually Describing Complex Video Contents With Audio-Visual Concept Classifiers, Chun Chet Tan, Yu-Gang Jiang, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

Automatically generating compact textual descriptions of complex video contents has wide applications. With the recent advancements in automatic audio-visual content recognition, in this paper we explore the technical feasibility of the challenging issue of precisely recounting video contents. Based on cutting-edge automatic recognition techniques, we start from classifying a variety of visual and audio concepts in video contents. According to the classification results, we apply simple rule-based methods to generate textual descriptions of video contents. Results are evaluated by conducting carefully designed user studies. We find that the state-of-the-art visual and audio concept classification, although far from perfect, is able …


Cross Media Hyperlinking For Search Topic Browsing, Song Tan, Chong-Wah Ngo, Hung-Khoon Tan, Lei Pang Dec 2011

Cross Media Hyperlinking For Search Topic Browsing, Song Tan, Chong-Wah Ngo, Hung-Khoon Tan, Lei Pang

Research Collection School Of Computing and Information Systems

With the rapid growth of social media, there are plenty of information sources freely available online for use. Nevertheless, how to synchronize and leverage these diverse forms of information for multimedia applications remains a problem yet to be seriously studied. This paper investigates the synchronization of multiple media content in the physical form of hyperlinking them. The ultimate goal is to develop browsing systems that author search results with rich media information mined from various knowledge sources. The authoring enables the vivid visualization and exploration of different information landscapes inherent in search results. Several key techniques are studied in this …


Vireo@Trecvid 2011: Instance Search, Semantic Indexing, Multimedia Event Detection And Known-Item Search, Chong-Wah Ngo, Shi-Ai Zhu, Wei Zhang, Chun-Chet Tan, Ting Yao, Lei Pang, Hung-Khoon Tan Dec 2011

Vireo@Trecvid 2011: Instance Search, Semantic Indexing, Multimedia Event Detection And Known-Item Search, Chong-Wah Ngo, Shi-Ai Zhu, Wei Zhang, Chun-Chet Tan, Ting Yao, Lei Pang, Hung-Khoon Tan

Research Collection School Of Computing and Information Systems

The vireo group participated in four tasks: instance search, semantic indexing, multimedia event detection and known-item search. In this paper,we will present our approaches and discuss the evaluation results.


Agile Innovation Management, Arcot Desai Narasimhalu Nov 2011

Agile Innovation Management, Arcot Desai Narasimhalu

Research Collection School Of Computing and Information Systems

The volume and velocity of innovations are on the increase resulting in increased pressures on every company for attaining, retaining and increasing its market leadership. Many companies need to retool their innovation management processes to address two agility related objectives in order to survive and grow in such a rapidly changing innovation environment. The first objective would be the ability to assemble an innovation team within the shortest possible time. This can only be satisfied by companies that are capable of forming innovation teams rather quickly. The related second objective would be to reduce the I2M (Idea to Market) cycle …


Launching Return-Oriented Programming Attacks Against Randomized Relocatable Executables, Limin Liu, Jin Han, Debin Gao, Jiwu Jing, Daren Zha Nov 2011

Launching Return-Oriented Programming Attacks Against Randomized Relocatable Executables, Limin Liu, Jin Han, Debin Gao, Jiwu Jing, Daren Zha

Research Collection School Of Computing and Information Systems

Since the day it was proposed, return-oriented programming has shown to be an effective and powerful attack technique against the write or execute only (W ⊕ X) protection. However, a general belief in the previous research is, systems deployed with address space randomization where the executables are also randomized at run-time are able to defend against return-oriented programming, as the addresses of all instructions are randomized. In this paper, we show that due to the weakness of current address space randomization technique, there are still ways of launching return-oriented programming attacks against those well-protected systems efficiently. We demonstrate and evaluate …