Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In recent years, software vulnerabilities are one of the main causes of security incidents in computer systems. Dynamic taint analysis is an efficient method to track the flow of sensitive information for soft vulnerability mining. In this paper, we present the method for dynamic taint analysis with control dependent is to tracking sensitive information. And finally, the simulation results are proposed...
Clear evidence indicates the existence of compromised routers in ISP and enterprise networks. Fault localization (FL) protocols enable a network to localize specific links of compromised routers sabotaging network data delivery and are recognized as an essential means to enhancing network availability in the face of targeted attacks. However, theoretically proven lower bounds have shown that secure...
The method of fractal-geometry is widely applied in researches of computer graphics and simulation. Presented here is a study of the Escape-time fractals that generate Mandelbrot (M) Set and Julia (J) Set in hardware platform. The paper simulates M Set and J Set via MATLAB and implements complex calculations, large amounts of data storage and output based on System-on-a-Programmable-Chip (SOPC) embedded...
As a typical form of Cloud service, Software as a Service(SaaS) has been leading the adoption of Cloud to enable e-Business by the industries. There are growing number of SaaS services which could provide different aspects of capability enabling business to leverage Cloud platform to run and manage business processes, such as customer relationship management, supply chain management, finance and accounting...
Multi-tenancy supporting becomes a basic characteristic of Software-as-a-Service (SaaS) operation. In multi-tenancy environment, tenant placement problem is critical for balance the database server workload. In this paper, we discuss how the cross-tenant data access affects the workload and how to optimize resource utilization in tenant placement process. This paper comes up with a SaaS tenant data...
With the application of e-government becomes more and more extensive, the security issues become increasingly important. The paper firstly presents a relatively complete e-government security risk evaluation index system basing on comprehensive analysis of risk factors which affects e-government security. Then we conduct orthogonal transformation to the indexes for eliminating duplication between...
Since automated fault localization can improve the efficiency of both the testing and debugging process, it is an important technique for the development of reliable software. This paper proposes a novel fault localization approach based on multi-level similarity of execution traces, which is suitable for object-oriented software. It selects useful test cases at class level and computes code suspiciousness...
Software as a Service (SaaS) is essentially about delivering a software application as a service over the Web with a usage-based charging plan. Existing Web service subscription models do not consider the complexity of the application and the business environment; for example, multiple service elements with mutual dependencies derived from one application, or various business partnership models for...
In designing a large inclined angle hydraulic support, the structure characteristics of four-bar linkage is presented, and ADAMS software is applied to four-bar linkage modeling and simulation. In order to attain optimal results, parameterized modeling and optimization is achieved, and the design results meets the practical requirements very well. By means of this virtual design method, the errors...
Four-bar linkage is one of the most important components of shield-type powered support or chock-shield-type hydraulic support. Parameterized modeling, simulation and optimization of four-bar linkage is firstly accomplished by use of ADAMS software in designing a large inclined angle hydraulic support. Then based on three-dimension model of the whole hydraulic support, applying COSMOS/Works software,...
In allusion to the reliability, which exists in the parametric design and optimizing process of the single hydraulic prop, this paper presents the new method in comparison with the traditional calculating and checking method for the reliability. The geometry model of the hydraulic prop is built firstly based on the 3D software, then analyzed and optimized by the finite element software - ANSYS. Results...
Based on the data samples authorized by CAIDA, we analyze the Internet router-level topology. By extracting several features of network property, we found obvious disparity distinction between the comparing results measured by single monitor point and multiple monitor points respectively, which approves that the sampling bias caused by single monitor point take primary effect on the Internet topology...
Software as a service (SaaS) provides software application vendors a Web based delivery model to serve big amount of clients with multi-tenancy based infrastructure and application sharing architecture so as to get great benefit from the economy of scale. Though SaaS application is usually developed with highly standardized software functionalities to serve as many clients as possible, many clients...
In seeking more profits, many business service providers have turned their attention to the technologies that can enable the delivery and operations of the network-delivered business services more efficiently and highly automated. To that end, many service providers have adopted the shared service model where the service offerings are shared across multiple customers to reduce the costs associated...
I/O operation within transactions is one of the challenges for hardware transactional memory. This paper analyses the problem of I/O operations within transactions, and proposes a hardware transactional memory system architecture based on multi-core processor and current cache coherent mechanisms. The system supports execution of transactions by adding transactional buffer and related hardware and...
As a macro complex systematic engineering, the Digital Ocean project is an ongoing task in china. The mission of the Digital Ocean is to build an interactive network information system based on a three-dimensional globe. The Digital Ocean can help provide integrated information on historical, current and future states of ocean and coastal zone. This paper addresses the architecture of Digital Ocean,...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.