Inter-thread dataflows are of great importance in analyzing concurrent programs. Suffering from the complexity of currency, it is still difficult to identify them from Java programs precisely and efficiently. A fundam...
详细信息
ISBN:
(纸本)9780769528106
Inter-thread dataflows are of great importance in analyzing concurrent programs. Suffering from the complexity of currency, it is still difficult to identify them from Java programs precisely and efficiently. A fundamental problem in inter-thread dataflow analysis is pointer analysis. Currently, pointer analyses can be classified into context-sensitive ones and context-insensitive ones. They are either too time consuming or too imprecise and hence not suitable for scalable and high precision inter-thread dataflow analysis. To change the situation, this paper proposes a thread-sensitive pointer analysis algorithm which only uses sequences of thread starts as calling contexts. As in inter-thread dataflow analysis, the major objective is analyzing interthread dataflows not intra-thread ones, the coarse-grained context-sensitivity can not only effectively speed up the analysis, but also preserve the analyze precision as much as possible.
It has very realistic significance for improving the quality of users' accessing information to filter and selectively retrieve the large number of information on the Internet. On the basis of analyzing the existing ...
详细信息
It has very realistic significance for improving the quality of users' accessing information to filter and selectively retrieve the large number of information on the Internet. On the basis of analyzing the existing users' interest models and some basic questions of users' interest (representation, derivation and identification of users' interest), a Bayesian network based users' interest model is given. In this model, the users' interest reduction algorithm based on Markov Blanket model is used to reduce the interest noise, and then users' interested and not interested documents are used to train the Bayesian network. Compared to the simple model, this model has the following advantages like small space requirements, simple reasoning method and high recognition rate. The experiment result shows this model can more appropriately reflect the user's interest, and has higher performance and good usability.
After analysis the importance of continuous attributes in the C5.0 algorithm processing, and consider the shortcomings of discretization method of C5 algorithm, this paper proposes a new method based on Rough set theo...
详细信息
Compared with traditional cryptography, biometric cryptosystems provide more convenient and safe protection of keys. In this paper, an effective scheme for biometric cryptosystems based on the intersections of hyper-p...
详细信息
Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted *** some common designs,attributes are managed by an attribute authority that is supposed to be fully *** concept implies that the attribu...
详细信息
Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted *** some common designs,attributes are managed by an attribute authority that is supposed to be fully *** concept implies that the attribute authority can access all encrypted data,which is known as the key escrow *** addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE *** this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user ***,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access ***,an efficient user revocation mechanism is achieved using a version key that supports forward and backward *** analysis proves that our scheme is secure and efficient in user authorization and revocation.
With the advent of the information age in contemporary society, images are everywhere, no matter in military use or in daily life. Therefore, as a medium for people to obtain information, images have become more and m...
详细信息
3D novelty detection plays a crucial role in various real-world applications, especially in safety-critical fields such as autonomous driving and intelligent surveillance systems. However, existing 3D novelty detectio...
详细信息
This paper proposes a method of data-flow testing for Web services composition. Firstly, to facilitate data flow analysis and constraints collecting, the existing model representation of business process execution lan...
详细信息
This paper proposes a method of data-flow testing for Web services composition. Firstly, to facilitate data flow analysis and constraints collecting, the existing model representation of business process execution language (BPEL) is modified in company with the analysis of data dependency and an exact representation of dead path elimination (DPE) is proposed, which over-comes the difficulties brought to dataflow analysis. Then defining and using information based on data flow rules is collected by parsing BPEL and Web services description language (WSDL) documents and the def-use annotated control flow graph is created. Based on this model, data-flow anomalies which indicate potential errors can be discovered by traversing the paths of graph, and all-du-paths used in dynamic data flow testing for Web services composition are automatically generated, then testers can design the test cases according to the collected constraints for each path selected.
In the field of quantum communication,quantum steganography is an important branch of quantum information *** a realistic quantum communication system,quantum noises are unavoidable and will seriously impact the safet...
详细信息
In the field of quantum communication,quantum steganography is an important branch of quantum information *** a realistic quantum communication system,quantum noises are unavoidable and will seriously impact the safety and reliability of the quantum steganographic ***,it is very important to analyze the influence of noise on the quantum steganography protocol and how to reduce the effect of *** paper takes the quantum steganography protocol proposed in 2010 as an example to analyze the effects of noises on information qubits and secret message qubits in the four primary quantum noise *** results show that when the noise factor of one quantum channel noise is known,the size of the noise factor of the other quantum channel can be adjusted accordingly,such as artificially applying noise,so that the influence of noises on the protocol is *** addition,this paper also proposes a method of improving the efficiency of the steganographic protocol in a noisy environment.
Due to growth of vehicles in urban cities, such problems are increases traffic control systems, security and crime investigation, intelligent parking and electronic toll collection. Moreover, Logistics access manageme...
详细信息
暂无评论