期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
基于控制流数据保护的缓冲区溢出防御方法 被引量:1
1
作者 张蓝图 王瑛 《计算机工程与应用》 CSCD 2012年第15期63-69,87,共8页
根据栈缓冲区溢出的基本原理,介绍了三种缓冲区溢出攻击的基本模式,分析了现有的动态防御方法所存在的优缺点。以此为基础,提出了一种基于控制流相关数据保护的栈缓冲区溢出动态防御方法,引入了加密机制,有效地防御攻击者对保护数据的... 根据栈缓冲区溢出的基本原理,介绍了三种缓冲区溢出攻击的基本模式,分析了现有的动态防御方法所存在的优缺点。以此为基础,提出了一种基于控制流相关数据保护的栈缓冲区溢出动态防御方法,引入了加密机制,有效地防御攻击者对保护数据的篡改。设计并实现了针对目标文件为对象的二进制文件重构工具,通过理论分析和实验表明该方法能够极大概率防御各种缓冲区溢出攻击。 展开更多
关键词 软件漏洞 栈缓冲区溢出 动态防御 控制流数据
下载PDF
基于CDFG和OVL的系统验证性质分类 被引量:1
2
作者 朱明 边计年 吴为民 《计算机工程》 EI CAS CSCD 北大核心 2005年第10期48-50,共3页
在数据控制流图(CDFG)结构的基础上,结合模拟验证和模型检测的优点,对需要验证的系统性质进行分类,采用不同的验证方法,提高验证的能力。通过对OVL语言和CTL描述进行改进,针对模拟验证、CDFG图匹配、模型检测3种方法设计相应的性质,实... 在数据控制流图(CDFG)结构的基础上,结合模拟验证和模型检测的优点,对需要验证的系统性质进行分类,采用不同的验证方法,提高验证的能力。通过对OVL语言和CTL描述进行改进,针对模拟验证、CDFG图匹配、模型检测3种方法设计相应的性质,实验结果表明这种分治验证策略有助于提高系统验证的效率和规模。 展开更多
关键词 模拟 形式验证 性质 模型检测 数据控制流
下载PDF
面向系统功能特性的协同验证方法研究
3
作者 朱明 边计年 吴为民 《计算机集成制造系统》 EI CSCD 北大核心 2005年第12期1732-1737,1796,共7页
为了提高芯片设计中功能验证环节的效率,提出了一种对系统的功能特性归类划分、自动选择适合的验证技术的协同验证方法,构建了多种验证技术之间无缝协作的平台。该协同验证方法所依据的策略是:特定的功能特性采用特定的验证技术更有效... 为了提高芯片设计中功能验证环节的效率,提出了一种对系统的功能特性归类划分、自动选择适合的验证技术的协同验证方法,构建了多种验证技术之间无缝协作的平台。该协同验证方法所依据的策略是:特定的功能特性采用特定的验证技术更有效。因此,利用不同验证技术的互补验证能力,可提高验证效率。协同验证平台的实现是基于从控制数据流图得到的细化模型,该细化模型采用了包括特性分组、变量重排、结构细化等模型优化技术,以提高验证速度。根据在ITC99上的验证,证明了该协同验证方法的有效性和实用性。 展开更多
关键词 特性 验证 模拟 模型检验 协同验证 数据控制流
下载PDF
基于SAN的分布式文件系统
4
作者 苏静 《安阳师范学院学报》 2004年第2期37-39,共3页
本文分析了研究SAN文件系统的必要性,提出了SAN文件系统的基本设计目标和一般模型并对该模型的构成要素和操作语义作了较详细的阐述;通过对现有各种SAN文件系统的比较、分析并结合自己所从事的研究,探讨了SAN文件系统的实现方式。
关键词 存储区域网络 SAN文件系统 数据流和控制流分离 数据共享
下载PDF
OSPFv3协议一致性测试序列的自动生成
5
作者 郭怡静 叶新铭 李华 《内蒙古大学学报(自然科学版)》 CAS CSCD 北大核心 2008年第4期475-480,共6页
由于手工法生成的测试例具有随机性、不确定性和不完整性,因此提出了一个自动生成测试例的方法,使用该方法生成的测试例比运用手工法生成的测试例准确、完整.该方法首先为OSPFv3协议的邻居状态转换过程建立了部分的EFSM模型,然后遵循故... 由于手工法生成的测试例具有随机性、不确定性和不完整性,因此提出了一个自动生成测试例的方法,使用该方法生成的测试例比运用手工法生成的测试例准确、完整.该方法首先为OSPFv3协议的邻居状态转换过程建立了部分的EFSM模型,然后遵循故障模型的故障类型标准,使用数据流与控制流相结合的方法自动生成测试序列,对生成的测试例经过测试发现了协议实现的一些错误. 展开更多
关键词 OSPFV3 EFSM 数据流与控制流 故障模型
下载PDF
An Experimental Analysis of Water and Soil Conservation Effected by Micro-landscape Structure
6
作者 汪洋 郑威 《Agricultural Science & Technology》 CAS 2012年第11期2442-2444,2452,共4页
[Objective] This comparative experiment was to explore the soil loss con- trol effects under cultivation combination of different soil and vegetation types, and to provide scientific basis for the upcoming pilot proje... [Objective] This comparative experiment was to explore the soil loss con- trol effects under cultivation combination of different soil and vegetation types, and to provide scientific basis for the upcoming pilot project of ecological recovery. [Method] Both the rudiment of water locomotion functioned by micro-landscape structures and different spatial combinations of various landscape constituents are considered, thus, the combination of multi-soil type, crop species and site conditions is designed in three different experimental sites. [Result] Soil loss estimates in experiments in South Wello significantly depended on various soil type, slope, vegetation and type of con- servation structure; grass cover tremendously reduces soil loss; legume cultivation performed better than cereal cultivation in soil loss control. [Conclusion] By conduct- ing the data analysis of the experiment, a scientific reference is proposed to the agri- culture planting and protective mode for the alleviation of water and soil loss in Amhara Region, Ethiopia. 展开更多
关键词 Landscape structure: Runoff Water and soil conservation Site condition EXPERIMENT
下载PDF
Data Distribution Mechanism over Opportunistic Networks with Limited Epidemic 被引量:5
7
作者 GUO Da CHENG Gang +2 位作者 ZHANG Yong SONG Mei Amanda Matthews 《China Communications》 SCIE CSCD 2015年第6期154-163,共10页
Most of data distribution mechanism in Opportunistic Networks is derived by Epidemic data distribution,and Epidemic data distribution means that when each node meets another node,it may copy its own messages and trans... Most of data distribution mechanism in Opportunistic Networks is derived by Epidemic data distribution,and Epidemic data distribution means that when each node meets another node,it may copy its own messages and transfer to another node.On the one hand,the copies improve the forwarding rate,and reduce the transmission delay.However,on the other hand,energy consumption increases and network survival time is reduced because the copies consume transmission resource.Therefore,copy number should be under control.In this paper,we first introduce the existing routing strategy based on Epidemic briefly,and present the Epidemic routing protocol analysis model and copy control mechanism based on the limited Epidemic in Opportunistic Networks.Then based on the limited copies scheme(LCS),we propose an energy balance scheme(EBS),the results show that EBS can improve the network survival time. 展开更多
关键词 opportunistic networks delay tol-erant networks Markov chain
下载PDF
Similarity based mixed transaction concurrency control protocol
8
作者 潘怡 《Journal of Chongqing University》 CAS 2005年第2期107-112,共6页
Due to the various performance requirements and data access restrictions of different types of real-time transactions, concurrency control protocols which had been designed for the systems with single type of transact... Due to the various performance requirements and data access restrictions of different types of real-time transactions, concurrency control protocols which had been designed for the systems with single type of transactions are not sufficient for mixed real-time database systems (MRTDBS), where different types of real-time transactions coexist in the systems concurrently. In this paper, a new concurrency control protocol MRTT_CC for mixed real-time transactions is proposed. The new strategy integrates with different concurrency control protocols to meet the deadline requirements of different types of real-time transactions. The data similarity concept is also explored in the new protocol to reduce the blocking time of soft real-time transactions, which increases their chances to meet the deadlines. Simulation experiments show that the new protocol has gained good performance. 展开更多
关键词 real-time database semantic concurrency control temporary consistency data similarity
下载PDF
Software/Hardware Integrating Model of Embedded Reconfigurable Computing System for Digital Signal Processing
9
作者 刘守山 张同军 +1 位作者 毕丽君 陶安利 《Journal of Measurement Science and Instrumentation》 CAS 2010年第4期343-348,共6页
The system model of embedded reconfigurable system is discussed firstly, followed by the construction of the soft- ware and hardware platform. Based on the platform, the function trait and control models of digital si... The system model of embedded reconfigurable system is discussed firstly, followed by the construction of the soft- ware and hardware platform. Based on the platform, the function trait and control models of digital signal processing tasks are described. According the functional unit model and control model, a software/hardware integrating model with dataflow control infrastructure is constructed. The software/hardware partition is carded out in the experiments of ultrasonic signal processing, and the results show that the system model is practicable. 展开更多
关键词 RECONFIGURABLE embedded system digital signal prooessing integrating model function unit
下载PDF
Data Flow Fuzzy Control of Communication Network with Finite Terminal
10
作者 邓娜 邵世煌 苏庆新 《Journal of Donghua University(English Edition)》 EI CAS 2004年第3期171-174,共4页
We consider the problem of data flow fuzzy control of discrete queuing systems with three different service-rate servers. The objective is to dynamically assign customers to idle severs based on the state of the syste... We consider the problem of data flow fuzzy control of discrete queuing systems with three different service-rate servers. The objective is to dynamically assign customers to idle severs based on the state of the system so as to minimize the mean sojourn time of customers. Simulation shows the validity of the fuzzy controller. 展开更多
关键词 data flow fuzzy control average sojourn time
下载PDF
Block-based test data adequacy measurement criteria and test complexity metrics
11
作者 陈卫东 杨建军 +1 位作者 叶澄清 潘云鹤 《Journal of Zhejiang University Science》 CSCD 2002年第1期37-41,共5页
On the basis of software testing tools we developed for programming languages, we firstly present a new control flowgraph model based on block. In view of the notion of block, we extend the traditional program\|based ... On the basis of software testing tools we developed for programming languages, we firstly present a new control flowgraph model based on block. In view of the notion of block, we extend the traditional program\|based software test data adequacy measurement criteria, and empirically analyze the subsume relation between these measurement criteria. Then, we define four test complexity metrics based on block. They are J\|complexity 0; J\|complexity 1; J\|complexity \{1+\}; J\|complexity 2. Finally, we show the Kiviat diagram that makes software quality visible. 展开更多
关键词 block NODE SEGMENT control flowgraph model test data adequacy measurement criteria test complexity metric Kiviat diagram
下载PDF
On the atmospheric movement and the imbalance of observed and calculated energy in the surface layer 被引量:5
12
作者 ZUO HongChao XIAO Xia +3 位作者 YANG QiDong DONG LongXiang CHEN JiWei WANG ShuJin 《Science China Earth Sciences》 SCIE EI CAS 2012年第9期1518-1532,共15页
Based on existing researches,here we theoretically summarized the characteristics of the atmospheric movement and turbulent transport of energy and substance in the surface layer as well as the ideal and the actual mo... Based on existing researches,here we theoretically summarized the characteristics of the atmospheric movement and turbulent transport of energy and substance in the surface layer as well as the ideal and the actual models for the turbulent transport.Then,using the data observed with eddy covariance at the semiarid climate and environment monitoring station(SACOL) in Lanzhou University from May to October during four consecutive years(September 2006-August 2010),we conducted a detailed analysis of the turbulent transport in the surface layer,through introducing the relative vertical turbulence intensity to characterize the turbulence strength,RIw=wn(wn+U),and also by adopting the method for controlling data quality at different levels.Our conclusions are:(1) The turbulent transport of energy and substance in the surface layer must obey the law of conservation of energy and the law of conservation of matter,the observed and calculated energy in the surface layer must be balanced,or closed in theory,but the actual observed and calculated energy just approximates the ideal in some degree and is difficult to achieve the energy balance.(2) The energy closure rate depends much on the atmospheric state in the surface layer,and the energy closure rate increases generally with the relative vertical turbulence intensity.(3) By the way of controlling data quality at different levels,it is found that the degree of data quality control can affect the closure rate,but it does not change the fact that the energy closure rate depends on the atmospheric state.(4) The calculation method of surface soil heat flux can affect energy closure rate,but does not change its dependence on the atmospheric state. 展开更多
关键词 surface layer energy balance state relative vertical turbulence intensity turbulence transport data quality control
原文传递
On the feasibility and efficacy of control traffic protection in software-defined networks 被引量:1
13
作者 HU YanNan WANG WenDong +2 位作者 GONG XiangYang QUE XiRong CHENG ShiDuan 《Science China Chemistry》 SCIE EI CAS CSCD 2015年第12期40-58,共19页
Software Defined Networking (SDN) is an emerging networking paradigm that assumes a logically centralized control plane separated from the data plane. Despite all its advantages, separating the control and data plan... Software Defined Networking (SDN) is an emerging networking paradigm that assumes a logically centralized control plane separated from the data plane. Despite all its advantages, separating the control and data planes introduces new challenges regarding resilient communications between the two. That is, disconnec- tions between switches and their controllers could result in substantial packet loss and performance degradation. This paper addresses this challenge by studying the issue of control traffic protection in SDNs with arbitrary numbers of controllers. Specifically, we propose a control traffic protection scheme that combines both local rerouting and constrained reverse path forwarding protections, through which switches can locally react to fail- ures and redirect the control traffic using standby backup forwarding options. Our goal is then to find a set of primary routes for control traffic, called protected control network, where as many switches as possible can benefit from the proposed protection scheme. We formulate the protected control network problem, prove its NP-hardness, and develop an algorithm that reconciles proteetability and performance (e.g., switch-to-control latency). Through extensive simulations based on real topologies, we show that our approach significantly im- proves protectability of control traffic. The results should help further the process of deploying SDN in real-world networks. 展开更多
关键词 software-defined network PROTECTION control traffic RESILIENCE optimization
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部