Learn More
1,3-Butadiene (BTD) is an important commodity chemical and air pollutant that has been shown to be a potent carcinogen in mice, and to a lesser extent, a carcinogen in rats. To better assess butadiene's carcinogenic risk to humans, it is important to understand its mode of action and how this relates to differences in responses among species. In a series of(More)
False data injection attacks not only cause user to receive incorrect reports so that make wrong decisions, but also drain out the significant sensor network energy resources. Previous filtering schemes mainly relying on pairwise key based schemes for endorsing the report. In wireless sensor networks, sharing pairwise key with other sensor nodes may be(More)
Multi-level cell (MLC) NAND flash-based consumer electronic devices suffer from random multiple bit errors that grow exponentially with the increase of program/erase counts. Numerous error correction codes (ECCs) have been developed to detect and correct these multiple erroneous bits within a codeword, such as bosechaudhuri-hocquenghem (BCH) and(More)
Deduplication serves as a fundamental way to eliminate replicas and save space and network bandwidth in various storage systems. However, the performance of most existing deduplication systems can be further improved on normal reads, which carry crucial weight in currently popular WORM access model. Specifically, most existing deduplication systems achieve(More)
The kNN join problem is to find the k nearest neighbors from a given dataset S for each point in the query set R. It is an operation required by many big data applications. As large volume of data are continuously generated in more and more real-life cases, we address the problem of monitoring kNN join results on data streams. Specifically, we are concerned(More)
The widely spread mobile consumer electronic devices, such as Android-based smartphones and tablets, have employed Ext4 file system as their main partition’s file systems. Although the performance of Ext4 file system has been researched and optimized for traditional hard disk drives under general workloads, extensive investigations are urgently required to(More)
Malware detection becomes mission critical as its threats spread from personal computers to industrial control systems. Modern malware generally equips with sophisticated anti-detection mechanisms such as code-morphism, which allows the malware to evolve into many variants and bypass traditional code feature based detection systems. In this paper, we(More)