Peer-to-peer (P2P) has become an important computing model because of its adaptation, selforganization and autonomy. But how to organize dynamic nodes in P2P networks efficiently for gaming message passing services is...
详细信息
Android's permission system offers an all-or-nothing installation choice for users. To make it more flexible, users may choose a popular app tool, called permission manager, to selectively grant or revoke an app...
详细信息
ISBN:
(纸本)9781450336239
Android's permission system offers an all-or-nothing installation choice for users. To make it more flexible, users may choose a popular app tool, called permission manager, to selectively grant or revoke an app's permissions at runtime. A fundamental requirement for such permission manager is that the granted or revoked permissions should be enforced faithfully. However, we discover that none of existing permission managers meet this requirement due to permission leaks. To address this problem, we propose CICC, a finegrained, semantic-aware, and transparent approach for any permission managers to defend against the permission leaks. Compared to existing solutions, CICC is fine-grained because it detects the permission leaks using call-chain information at the component instance level, instead of at the app level or component level. The fine-grained feature enables it to generate a minimal impact on the usability of running apps. CICC is semantic-aware in a sense that it manages call-chains in the whole lifecycle of each component instance. CICC is transparent to users and app developers, and it requires minor modification to permission managers. Our evaluation shows that CICC incurs relatively low performance overhead and power consumption. Copyright 2015 ACM.
The reliability of service is related to the kind and the number of service resources in grid. The kind and the number of service resources often change, so the service reliability is variable. In this paper, we propo...
详细信息
Silicosis is one of the most serious occupational diseases in China. Radiologist information comes from chest radiographs, in which the most important parts are lung fields and ribs. It is necessary to distinguish lun...
详细信息
ISBN:
(纸本)9781605588407
Silicosis is one of the most serious occupational diseases in China. Radiologist information comes from chest radiographs, in which the most important parts are lung fields and ribs. It is necessary to distinguish lung fields and ribs from other organs. The anatomical knowledge-based lung segmentation can improve the accuracy of segmentation and solve the problems of opened region and lost clavicle region. The curve model-based rib segmentation can acquire more accurate rib location information, and provide more efficient orientation for latter diagnosis. These two methods are also deployed in grid environment to get higher efficiency when processing massive and distributed medical data for silicosis diagnosis. Experiments show that the two proposed algorithms can meet the latter medical requirements for chest radiograph with higher accuracy. Copyright 2009 ACM.
The simulation grid has become a very important research topic. In order to ensure the QoS of resource management, we present a control mechanism in simulation grid, which is based on the prediction methods. In the co...
详细信息
Intrusion Prevention System (IPS) has been an effective tool to detect and prevent unwanted attempts, which are mainly through network and system vulnerabilities, at accessing and manipulating computer systems. Intrus...
详细信息
ISBN:
(纸本)9781605584058
Intrusion Prevention System (IPS) has been an effective tool to detect and prevent unwanted attempts, which are mainly through network and system vulnerabilities, at accessing and manipulating computer systems. Intrusion detection and prevention are two main functions of IPS. As attacks are becoming massive and complex, the traditional centralized IPSes are incapable of detecting all those attempts. The existing distributed IPSes, mainly based on mobile agent, have some serious problems, such as weak security of mobile agents, response latency, large code size. In this paper, we propose a customized intrusion prevention system, VMFence, in distributed virtual computing environment to simplify the complexity of the management. In VMFence, the states of detection processes vary with those of Virtual Machines (VMs), which are described by Deterministic Finite Automata (DFA). The detection processes, each of which detects one virtual machine, reside in a privileged virtual machine. The processes run synchronously and outside of VMs in order to achieve high performance and security. The experimental results also show VMFence has higher detection efficiency than traditional intrusion detection systems and little impact on the performance of the monitored VMs. Copyright 2009 ACM.
The prevalence of multicore processors and virtualization technology enables parallel soft real-time applications to run in virtualized environment. However, current hypervisors do not provide adequate support for the...
详细信息
Recently, many communities have published their domain knowledge in the form of graphs. A significant trend is that the relations between pairs of nodes in the graph have become so complex that these data can be treat...
详细信息
Transactional memory (TM) is a parallel programming concept which reduces challenges in parallel programming. Existing distributed transactional memory system consumes too much bandwidth and brings high latency. In th...
详细信息
In order to achieve low delay services in VoIP, we can use application-layer routing scheme, which is to find proper relay nodes to intermediate voice packets from the source peer to the destination peer. The difficul...
详细信息
ISBN:
(纸本)9781605581279
In order to achieve low delay services in VoIP, we can use application-layer routing scheme, which is to find proper relay nodes to intermediate voice packets from the source peer to the destination peer. The difficulty of the scheme is how to find the proper relay nodes, which we call relay problem. This paper presents a new application-layer routing scheme, called DPLM, to resolve relay problem. We introduced the mechanism in detail, and evaluated our mechanism in NS2 network simulation environment and got a high relay node hit ratio result, which confirms the feasibility of a real system. Also we make a comparison with traditional schemes, and the results show that DPLM scheme has good performances. Copyright 2008 ACM.
暂无评论