期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Molex推出全新Power Cat6六类解决方案
1
作者 麦新 《电子产品世界》 2003年第10B期79-79,共1页
关键词 Molex企业 布线网络部 PowerCat6六类系统 性能缓冲区 POWER Cat6六类电缆 MOD-Clip DataGate PLUS DataGate Plus插座 六类配线架 六类跳线
在线阅读 下载PDF
High Delivery Performance Opportunistic Routing Scheme for Delay Tolerant Networks 被引量:1
2
作者 Lu Xiaofeng Pan Hui Pietro Lio 《China Communications》 SCIE CSCD 2012年第6期145-153,共9页
In Delay Tolerant Networks (DTNs), establishing routing path from a source node to a destination node may not be possible, so the opportunistic routings are widely used. The energy and buffer constraints are general i... In Delay Tolerant Networks (DTNs), establishing routing path from a source node to a destination node may not be possible, so the opportunistic routings are widely used. The energy and buffer constraints are general in DTNs composed of the mobile phones or Pads. This paper proposes a novel opportunistic routing protocol, denoted by Large Opporturioty (LAOP), for the energy and buffer constrained DTNs. The objective of LAOP is to reach many receivers of a message with a small number of transmissions. By LAOP, the sender floods a message when the number of its neighbors is not less than a threshold. We compare the delivery performance of LAOP with other four widely used Delay or Disruption Tolerant Network (DTN) routing protocols, Direct Delivery, Epidemic routing, SprayAndWait and PRoPHET and demonstrate that LAOP can improve the delivery performance and decrease the delivery latency simultaneously. 展开更多
关键词 computer networks DTNs LAOP opportunistic routing
在线阅读 下载PDF
DCFl-Checker: Checking Kernel Dynamic Control Flow Integrity with Performance Monitoring Counter 被引量:2
3
作者 SHI Wenchang ZHOU Hongwei +1 位作者 YUAN Jinhui LIANG Bin 《China Communications》 SCIE CSCD 2014年第9期31-46,共16页
It is a challenge to verify integrity of dynamic control flows due to their dynamic and volatile nature. To meet the challenge, existing solutions usually implant an "attachment" in each control transfer. However, t... It is a challenge to verify integrity of dynamic control flows due to their dynamic and volatile nature. To meet the challenge, existing solutions usually implant an "attachment" in each control transfer. However, the attachment introduces additional cost except performance penalty. For example, the attachment must be unique or restrictedly modified. In this paper, we propose a novel approach to detect integrity of dynamic control flows by counting executed branch instructions without involving any attachment. Our solution is based on the following observation. If a control flow is compromised, the number of executed branch instructions will be abnormally increased. The cause is that intruders usually hijack control flows for malicious execution which absolutely introduces additional branch instructions. Inspired by the above observation, in this paper, we devise a novel system named DCFI- Checker, which detect integrity corruption of dynamic control flows with the support of Performance Monitoring Counter (PMC). We have developed a proof-of-concept prototype system of DCFI-Checker on Linux fedora 5. Our experiments with existing kemel rootkits and buffer overflow attack show that DCFI- Checker is effective to detect compromised dynamic control transfer, and performance evaluations indicate that performance penaltyinduced by DCFI-Checker is acceptable. 展开更多
关键词 INTEGRITY dynamic control flow KERNEL branch performance monitoringcounter
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部