找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Security, Privacy and Anonymity in Computation, Communication and Storage; SpaCCS 2016 Internat Guojun Wang,Indrakshi Ray,Sabu M. Thampi Co

[復(fù)制鏈接]
樓主: 不服從
21#
發(fā)表于 2025-3-25 04:02:47 | 只看該作者
ChainMR Crawler: A Distributed Vertical Crawler Based on MapReducee existing distributed vertical crawlers also have the problem of weak capability of customization. In order to solve the above problem, this paper proposes a distributed vertical crawler named ChainMR Crawler. We adopt ChainMapper/ChainReducer model to design each module of the crawler, use Redis t
22#
發(fā)表于 2025-3-25 10:34:15 | 只看該作者
23#
發(fā)表于 2025-3-25 12:10:23 | 只看該作者
24#
發(fā)表于 2025-3-25 18:08:29 | 只看該作者
Entropy Feature Based on 2D Gabor Wavelets for JPEG Steganalysisw steganalysis feature based on the Shannon entropy of 2-dimensional (2D) Gabor wavelets is proposed. For the proposed feature extraction method, the 2D Gabor wavelets which have certain optimal joint localization properties in spatial domain and in the spatial frequency are employed to capture the
25#
發(fā)表于 2025-3-25 22:54:10 | 只看該作者
A Caching-Based Privacy-Preserving Scheme for Continuous Location-Based Servicessers get the query result data from the LBS server and discard it immediately. However, the data can be cached and reused to answer future queries. In this paper, we propose a caching-based solution to protect location privacy in continuous LBSs. Our scheme adopts a two-level caching mechanism to ca
26#
發(fā)表于 2025-3-26 03:44:17 | 只看該作者
AppWalker: Efficient and Accurate Dynamic Analysis of Apps via Concolic Walking Along the Event-Depethan static methods. However, they are inherently incomplete and inefficiency. We attack this problem by proposing a novel method, i.e., concolic walking along the event-dependency graph. We implement AppWalker based on it. Evaluation over a real-life app set shows that better efficiency and accurac
27#
發(fā)表于 2025-3-26 06:59:47 | 只看該作者
CapaDroid: Detecting Capability Leak for Android Applicationsns so that the latter can act beyond the permission they are granted originally. We demonstrate CapaDroid, a tool implementing our approach that applies accurate static analysis of capability leak of apps, which is based on inter-procedure vulnerable call-graph (., for short) that accurately models
28#
發(fā)表于 2025-3-26 12:23:14 | 只看該作者
29#
發(fā)表于 2025-3-26 15:33:40 | 只看該作者
30#
發(fā)表于 2025-3-26 17:32:55 | 只看該作者
Opportunistic Resource Sharing Based Elastic Resource Allocation in a Data Centerutilization for data centers. However, the resource collision makes it challenging. In this paper, we introduce a Markov-chain based model (MST) to characterize the dynamical resource requirements for application, instead of the traditional static virtual network. To deal with the resource collision
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-20 07:05
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
台东县| 同德县| 庆云县| 远安县| 桃源县| 芮城县| 贡山| 柘城县| 昔阳县| 秦安县| 兖州市| 公安县| 玛沁县| 津南区| 儋州市| 吴桥县| 鄄城县| 德江县| 即墨市| 类乌齐县| 招远市| 黔西县| 嘉义县| 金华市| 塔城市| 静安区| 南阳市| 慈利县| 永丰县| 揭西县| 武宣县| 许昌市| 宜昌市| 长沙县| 通榆县| 侯马市| 鄂托克旗| 天津市| 晋城| 澎湖县| 梁平县|