In recent WLAN standards (such as IEEE 802.11n), MIMO (Multiple Input Multiple Output) is deployed to provide high data transmission rate. It is however challenging to efficiently share the channel resources among dif...
详细信息
By amassing 'wisdom of the crowd', social tagging systems draw more and more academic attention in interpreting Internet folk knowledge. In order to uncover their hidden semantics, several researches have atte...
详细信息
Nowadays, more and more scientific applications are moving to cloud computing. The optimal deployment of scientific applications is critical for providing good services to users. Scientific applications are usually to...
详细信息
The malicious code detection based on behaviors has proved effective. But there are high false positives and high false negatives when using this method. Because the behaviors are always out-of-order and redundant. To...
详细信息
Malicious code detection based on behaviors is the development direction of anti-virus techniques. However, the current detection methods based on this theory expose several problems such as the unclearness of behavio...
详细信息
Wireless interference does not necessarily result in the lost of all the information of the desired signal. In this paper, we study the signature allocation in wireless networks by exploiting the retained signal featu...
详细信息
ISBN:
(纸本)9781612846842
Wireless interference does not necessarily result in the lost of all the information of the desired signal. In this paper, we study the signature allocation in wireless networks by exploiting the retained signal feature under interference. The commonly used node signature includes MAC address and PN sequence. However, both of them take a lot of time to identify the signature when the network scale is large. We propose a novel signature allocation method based on a multi-hash policy, using a set of hash functions and a mapping-table to identify the signature. The proposed method decreases significantly both the signature identification complexity and the signature conflict probability. We implement the algorithm in GNU Radio and evaluate the performance in a testbed of three USRP nodes. The result shows that, under typical settings,
Open Source Forge (OSF) websites provide information on massive open source software projects, extracting these web data is important for open source research. Traditional extraction methods use string matching among ...
详细信息
Open Source Forge (OSF) websites provide information on massive open source software projects, extracting these web data is important for open source research. Traditional extraction methods use string matching among pages to detect page template, which is time-consuming. A recent work published in VLDB exploits redundant entities among websites to detect web page coordinates of these entities. The experiment gives good results when these coordinates are used for extracting other entities of the target site. However, OSF websites have few redundant project entities. This paper proposes a modified version of that redundancy-based method tailored for OSF websites, which relies on a similar yet weaker presumption that entity attributes are redundant rather than whole entities. Like the previous work, we also construct a seed database to detect web page coordinates of the redundancies, but all at the attribute-level. In addition, we apply attribute name verification to reduce false positives during extraction. The experiment result indicates that our approach is competent in extracting OSF websites, in which scenario the previous method can not be applied.
Software security is one of the most important aspects of software quality, but errors in programs are still inevitable. Despite the development of static and dynamic analysis, the useful but costly manual analysis is...
详细信息
Software security is one of the most important aspects of software quality, but errors in programs are still inevitable. Despite the development of static and dynamic analysis, the useful but costly manual analysis is still heavily used. In this paper, we propose a human computation game based software error detection mechanism. The purpose of our mechanism is to improve the effectiveness and efficiency of manual error detection. The framework includes four main steps: 1) get all suspicious error locations by static tools according to different security properties;2) slice the programs from each error location;3) construct games for each slice and show them to players;4) collect game information and generate the final error report. We evaluate our approach by instantiating it for detecting errors of buffer overflow. The results show that our technique is successful in practice.
Recommender systems are mechanisms that filter information and predict a user's preference to an item. parallel implementations of recommender systems improve scalability issues and can be applied to internet-base...
详细信息
Recommender systems are mechanisms that filter information and predict a user's preference to an item. parallel implementations of recommender systems improve scalability issues and can be applied to internet-based companies having considerable impact on their profits. This paper implements two parallel versions of the collaborative filtering algorithm Slope One, which has advantages such as its efficiency and the ability to update data dynamically. The first presented version is parallely implemented with the use of the OpenMP API and its performance is evaluated on a multi-core system. The second is an hybrid approach using both OpenMP and MPI and its performance is evaluated in an homogeneous and an heterogeneous cluster. Experiments proved that the multithreaded version is 9,5 times faster than the sequential algorithm.
In the relay-trading mode of wireless cognitive radio networks the secondary user (SU) can achieve a promised spectrum access opportunity by relaying for the primary user (PU). How to utilize the exchanged resource ef...
详细信息
暂无评论