With the rapid increase of data volume, more and more applications have to be implemented in a distributed environment. In order to obtain high performance, we need to carefully divide the whole dataset into multiple ...
详细信息
Extracting multi-records from web pages is useful, it allows us to integrate information from multiple sources to provide value-added services. Existing techniques still have some limitations because of their several ...
详细信息
Although there have been many efforts for management of uncertain data, evaluating probabilistic inference queries, a known NP-hard problem, is still a big challenge, especially for querying data with highly correlati...
详细信息
In an effort to provide lawful interception for session initiation protocol (SIP) voice over Internet protocol (VoIP), an interception architecture using session border controller (SBC) is proposed. Moreover, a protot...
详细信息
Given a set of client locations, a set of facility locations where each facility has a service capacity, and the assumptions that: (i) a client seeks service from its nearest facility;(ii) a facility provides service ...
详细信息
Image tag relevance estimation aims to automatically deter- mine what people label about images is factually present in the pictorial content. Different from previous works, which either use only positive examples of ...
详细信息
Feature selection is a powerful tool of dimension reduction from datasets. In the last decade, more and more researchers have paid attentions on feature selection. Further, some researchers begin to focus on feature s...
详细信息
This abstract paper sketches our research towards Struc-tured Semantic Embedding of multimedia data. Though a tag may have multiple senses with completely different visual imagery, current semantic embedding methods r...
详细信息
data-centric storage is an effective and important technique in the wireless sensor networks. It stores the sensing data according to their values by mapping them to some point in the network in order to avoid routing...
详细信息
ISBN:
(纸本)9781595939111
data-centric storage is an effective and important technique in the wireless sensor networks. It stores the sensing data according to their values by mapping them to some point in the network in order to avoid routing all the values outside the network and flooding the queries. However, in most data-centric storage schemes, there is a "hotspot" problem due to the skewness of data and randomness of the mapping functions. Large number of sensor readings (events) may be routed to the same point by the predefined hashed function. In this paper, we propose a new Dynamic BAlanced data-centric Storage (DBAS) scheme, a cooperative strategy between the base station and the in-network processing in wireless sensor network. Our scheme, which utilizes the rich resources in the base station and is aware of the data distributions of the network, dynamically adjusts the mappings from readings to the storage points to balance the storage and workload in the network, as well as to reduce the cost of storing these readings. Moreover, it takes advantage of perimeter routing algorithm of the GPSR routing protocol to store multiple copies of readings to improve the robustness of the network with little overhead. Simulation results show that DBAS is more balanced and energy efficient than the traditional data-centric storage mechanism in wireless sensor network.
Enforcing a practical Mandatory Access Control (MAC) in a commercial operating system to tackle malware problem is a grand challenge but also a promising approach. The firmest barriers to apply MAC to defeat malware p...
详细信息
ISBN:
(纸本)9781450305648
Enforcing a practical Mandatory Access Control (MAC) in a commercial operating system to tackle malware problem is a grand challenge but also a promising approach. The firmest barriers to apply MAC to defeat malware programs are the incompatible and unusable problems in existing MAC systems. To address these issues, we start our work by analyzing the technical details of 2,600 malware samples one by one and performing experiments over two types of MAC enforced operating systems. Based on the preliminary studies, we design a novel MAC model incorporating intrusion detection and tracing in a commercial operating system, named Tracer, in order to disable malware on hosts while offering good compatibility to existing software and good usability to common users who are not system experts. The model conceptually consists of three actions: detecting, tracing and restricting suspected intruders. One novelty is that it leverages light-weight intrusion detection and tracing techniques to automate security label configuration that is widely acknowledged as a tough issue when applying a MAC system in practice. The other is that, rather than restricting information flow as a traditional MAC does, it traces intruders and restricts only their critical malware behaviors, where intruders represent processes and executables that are potential agents of a remote attacker. Our prototyping and experiments on Windows show that Tracer can effectively defeat all malware samples tested via blocking malware behaviors while not causing a significant compatibility problem. Copyright 2011 ACM.
暂无评论