Learn More
There are two major problems of unstructured P2P systems, one is their heavy network traffic; the other is the problem of unpredictable delay. The popular search techniques in unstructured P2P networks such as flooding, dynamic query don't deal with these problems efficiently for they are lack of heuristic. In this paper, we proposed a new search algorithm,(More)
There're two major problems in the unstructured p2p systems, one is their heavy network traffic; the other is the problem of query effectiveness, which is caused mainly by high numbers of query answers, many of which are irrelevant for users. A potential solution is to use Top-k queries. The objective of a top-k query is to find the k highest ranked answers(More)
P2P systems have suffered a lot from free riding problem i.e. some participants consume more resources than they contribute. In order to deal with this problem efficiently, an incentive model based on peer credit has been proposed. Each peer in this model is a credit entity. Through introducing reward method to the model, peers will allocate resources(More)
With the demand of guaranteeing the safety of the files, which contain enterprise core information resource, this paper presents the Mandatory Hardware Confirming Control technology and a safe file system based on it. The system captures the operations on sensitive files by various processes, and then examines if the corresponding hardware signals exist.(More)
For facing the new challenges of the network information security, the theory of active controllable defense is introduced in this paper, and then a Behavior-based Prediction Detection Response model of active controllable defense called BPDR is proposed. Firstly, it is in order to reduce and eliminate the security delay brought by the traditional passive(More)
Recently, with the support of mobile cloud computing, large number of health-related data collected from various body sensor networks can be managed efficiently. However, it is an important and challenging issue to keep data security and data privacy in cloud-integrated body sensor network (C-BSN). In this paper, we present a novel secure access control(More)
Nowadays in order to process and store many kinds of multimedia data, the storage capability of memory has grown greatly. Moreover the widespread use of mobile devices and cloud computing has made criminal investigators often face a lot of memory dumps. They have to deal with a large quantity of memory data and complex OS data structures which they have(More)