Learn More
In the last several years hundreds of thousands of SSDs have been deployed in the data centers of Baidu, China's largest Internet search company. Currently only 40\% or less of the raw bandwidth of the flash memory in the SSDs is delivered by the storage system to the applications. Moreover, because of space over-provisioning in the SSD to accommodate(More)
Unknown protocol identification is widely used in the field of network and information security. Most previous researches focus on known protocol identification and analysis of network layer and above. However, the research on unknown protocol is an essential part for ensuring the safety of information system. In this work, a length identification method of(More)
This paper proposes a mental model approach to support category hierarchy maintenance on sellers' self-input items in e-commerce websites. We conduct co-occurrence analysis between sellers' self-input items and existing website category items, and use Hierarchical Clustering Analysis to explore hierarchical structure and the association relationships hidden(More)
  • 1