调情 发表于 2025-3-25 04:02:47

ChainMR Crawler: A Distributed Vertical Crawler Based on MapReducee existing distributed vertical crawlers also have the problem of weak capability of customization. In order to solve the above problem, this paper proposes a distributed vertical crawler named ChainMR Crawler. We adopt ChainMapper/ChainReducer model to design each module of the crawler, use Redis t

灾祸 发表于 2025-3-25 10:34:15

http://reply.papertrans.cn/87/8637/863629/863629_22.png

凝结剂 发表于 2025-3-25 12:10:23

http://reply.papertrans.cn/87/8637/863629/863629_23.png

keloid 发表于 2025-3-25 18:08:29

Entropy Feature Based on 2D Gabor Wavelets for JPEG Steganalysisw steganalysis feature based on the Shannon entropy of 2-dimensional (2D) Gabor wavelets is proposed. For the proposed feature extraction method, the 2D Gabor wavelets which have certain optimal joint localization properties in spatial domain and in the spatial frequency are employed to capture the

CLEFT 发表于 2025-3-25 22:54:10

A Caching-Based Privacy-Preserving Scheme for Continuous Location-Based Servicessers get the query result data from the LBS server and discard it immediately. However, the data can be cached and reused to answer future queries. In this paper, we propose a caching-based solution to protect location privacy in continuous LBSs. Our scheme adopts a two-level caching mechanism to ca

毗邻 发表于 2025-3-26 03:44:17

AppWalker: Efficient and Accurate Dynamic Analysis of Apps via Concolic Walking Along the Event-Depethan static methods. However, they are inherently incomplete and inefficiency. We attack this problem by proposing a novel method, i.e., concolic walking along the event-dependency graph. We implement AppWalker based on it. Evaluation over a real-life app set shows that better efficiency and accurac

DEAWL 发表于 2025-3-26 06:59:47

CapaDroid: Detecting Capability Leak for Android Applicationsns so that the latter can act beyond the permission they are granted originally. We demonstrate CapaDroid, a tool implementing our approach that applies accurate static analysis of capability leak of apps, which is based on inter-procedure vulnerable call-graph (., for short) that accurately models

Cultivate 发表于 2025-3-26 12:23:14

http://reply.papertrans.cn/87/8637/863629/863629_28.png

演绎 发表于 2025-3-26 15:33:40

http://reply.papertrans.cn/87/8637/863629/863629_29.png

油膏 发表于 2025-3-26 17:32:55

Opportunistic Resource Sharing Based Elastic Resource Allocation in a Data Centerutilization for data centers. However, the resource collision makes it challenging. In this paper, we introduce a Markov-chain based model (MST) to characterize the dynamical resource requirements for application, instead of the traditional static virtual network. To deal with the resource collision
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Security, Privacy and Anonymity in Computation, Communication and Storage; SpaCCS 2016 Internat Guojun Wang,Indrakshi Ray,Sabu M. Thampi Co