Combining short instruction sequences originated only from existing code pieces, Return Oriented Programming (ROP) attacks can bypass the code-integrity effort model. To defeat this kind of attacks, current approaches...
详细信息
Due to the rapid growth of social net services (SNSs), research into SNSs continuance usage has recently emerged as an important issue in information systems adaption. This study develops an integrated model based on ...
详细信息
作者:
Hu, HeDu, XiaoyongSchool of Information
Renmin University of China Key Laboratory of Data Engineering and Knowledge Engineering MoE No. 59 Zhongguancun St. Beijing100872 China
Online tagging is crucial for the acquisition and organization of web knowledge. We present TYG (Tag-as-You-Go) in this paper, a web browser extension for online tagging of personal knowledge on standard web pages. We...
详细信息
It is insufficient to search temporal text by only focusing on either time attribute or keywords today as we pay close attention to the evolution of event with time. Both temporal and textual constraints need to be co...
详细信息
ISBN:
(纸本)9781450325981
It is insufficient to search temporal text by only focusing on either time attribute or keywords today as we pay close attention to the evolution of event with time. Both temporal and textual constraints need to be considered in one single query, called Top-k Interval Keyword Query (TIKQ). In this paper, we presents a cloud-based system named INK that supports efficient execution of TIKQs with appropriate effectiveness on Hadoop and HBase. In INK, an Adaptive Index Selector (AIS) is devised to choose the better execution plan for various TIKQs adaptively based on the proposed cost model, and leverage two novel hybrid index modules (TriI and IS-Tree) to combine keyword and interval filtration seamlessly.
Hadoop is now the de facto standard for storing and processing big data, not only for unstructured data but also for some structured data. As a result, providing SQL analysis functionality to the big data resided in H...
详细信息
Native code which is in the form of browser plugins and native binaries in browser extensions brings significant security threats and has attracted considerable attention in recent years. Many researches focus on dang...
详细信息
In an effort to provide lawful interception for session initiation protocol (SIP) voice over Internet protocol (VoIP), an interception architecture using session border controller (SBC) is proposed. Moreover, a protot...
详细信息
Web financial reviews are real-time, comprehensive and authentic. The construction and quantification of Web financial indexes based on Web financial reviews is of great significance for the financial early warning fo...
详细信息
This paper presents an analysis of strengths, weaknesses, opportunities, and threats (SWOT) for Chinese rural information society development (CRISD) policies in terms of its missions and strategies. After briefly des...
详细信息
Recently, a number of advanced data collection and processing methodologies have led to the proliferation of uncertain data. When discovering from such uncertain data, we should handle these uncertainties with caution...
详细信息
暂无评论