Case: On July 9, 2003, the people’s procuratorate of Ansai County, Shaanxi Province arrested three judges, Zhang Hongming, Liu Jianzhong and Xue Sheng of the people’s court of Zichang County of the same province on ...Case: On July 9, 2003, the people’s procuratorate of Ansai County, Shaanxi Province arrested three judges, Zhang Hongming, Liu Jianzhong and Xue Sheng of the people’s court of Zichang County of the same province on charges of "unlawful detention." On September 29, 2003, Ansai people’s court declared the three judges innocent and immediately released them. On September 30, 2003, Ansai people’s procuratorate protested the judgment and appealed to the intermediate people’s court of Yan’an city. On December 18, 2003, the Yan’an展开更多
Microsoft Windows平台下的.NET互操作技术包括P/Invoke、COM与.NET互操作。P/Invoke用于.NET托管代码访问非托管dll的导出函数,COM与.NET互操作可使.NET客户端访问COM组件和COM客户端访问.NET组件。这些技术为在.NET平台下使用遗留代...Microsoft Windows平台下的.NET互操作技术包括P/Invoke、COM与.NET互操作。P/Invoke用于.NET托管代码访问非托管dll的导出函数,COM与.NET互操作可使.NET客户端访问COM组件和COM客户端访问.NET组件。这些技术为在.NET平台下使用遗留代码和在传统程序上使用.NET技术提供了实现手段。展开更多
蓝牙通讯技术在嵌入式产品中的应用具有极为广阔的前景,微软公司的Windows CE.NET已经成为了主流的嵌入式操作系统之一。论文给出了在Visual Studio 2005中利用托管码并分别采用P/Invoke技术、微软蓝牙嵌入式工具包、OpenNETCF类库和...蓝牙通讯技术在嵌入式产品中的应用具有极为广阔的前景,微软公司的Windows CE.NET已经成为了主流的嵌入式操作系统之一。论文给出了在Visual Studio 2005中利用托管码并分别采用P/Invoke技术、微软蓝牙嵌入式工具包、OpenNETCF类库和利用本机码来开发Windows CE.NET操作系统下蓝牙通讯模块的几种方法,并在其中对P/Invoke技术、托管码开发、本机码开发等几个关键技术进行了阐述。最后给出了利用托管码和本机码开发蓝牙通讯模块这几种方法的优劣比较和分析。其内容对于在Windows mobile平台下开发蓝牙设备间的通讯具有一定实用价值。展开更多
The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author ...The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack.展开更多
文摘Case: On July 9, 2003, the people’s procuratorate of Ansai County, Shaanxi Province arrested three judges, Zhang Hongming, Liu Jianzhong and Xue Sheng of the people’s court of Zichang County of the same province on charges of "unlawful detention." On September 29, 2003, Ansai people’s court declared the three judges innocent and immediately released them. On September 30, 2003, Ansai people’s procuratorate protested the judgment and appealed to the intermediate people’s court of Yan’an city. On December 18, 2003, the Yan’an
基金the National Natural Science Foundation of China (60673071, 60743003, 90718005, 90718006)the National High Technology Research and Development Program of China (863 Program) (2006AA01Z442, 2007AA01Z411)
文摘The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack.