结果过滤

发表日期
成果类型
当前显示 11-15 of 132
 | 
[摘要] 

In recent years, the explosive growth of high-frequency data access requirements had fueled the proliferation of in-memory key-value stores. Redis is a widely used in-memory key-value store, which ...

[摘要] 

Routing asymmetry increases network efficiency, but also brings serious challenges to some use cases, such as policy enforcement, flow identification, malicious/anomaly detection, traffic shaping a...

[摘要] 

People use the Internet to shop, access information and enjoy

entertainment by browsing web sites. At the same time, cyber-criminals

operate malicious domains to spread illegal informat...

[摘要] 

With the dramatically increasing participation in online social networks, huge amount of private information becomes available on such sites. It is critical to preserve users' privacy, with...

[摘要] 

More people use the Internet to shop, access information, etc. But on the other hand, hackers implant malwares (e.g. Trojans, Worms, etc.) in the web pages to steal user information and acquire mon...

当前显示 11-15 of 132