ID 原文 译文
46766 研究了时延敏感传感器网络中时延需求和功率受限情况, The delay-aware dynamic resource management problem was investigated in sensor network, with a focus on resource allocation among the sensors and power control along the time.
46767 联合优化传感器间资源分配与功率控制,将动态资源管理问题建模为一个随机优化问题。 By taking account of average delay requirement sand power constraints, the considered problem was formulated into a stochastic optimization problem.
46768 基于李雅普诺夫优化理论,将较难处理的随机优化问题转变为确定性的混合整数规划问题。 Inspired by Lya-punov optimization theory, the intractable stochastic optimization problem was transformed into a tractable deterministic optimization problem, which was a mixed-integer resource management problem.
46769 在分析问题具体结构基础上,将混合整数规划问题等价地转换为单变量优化问题,进一步提出基于传感器间协作的分布式求解方法,该方法能够实现全局最优解。 By exploiting the specific problem structure, the mixed-integer resource management problem was equivalently transformed into a single variable problem,and the cooperative distributed method was present to effectively solve it with guaranteed global optimality.
46770 最后提出动态资源管理算法求解原随机优化问题。 Finally, a dynamic resource management algorithm was proposed to solve the original stochastic optimization problem.
46771 通过仿真验证了所提算法的性能,并揭示时延与功率消耗间的折中关系。 Simulation results show the performance of the proposed dynamic algorithm and reveal that there exists a fundamental tradeoff be-tween delay requirements and power consumption.
46772 基于多属性决策及污点跟踪提出一种面向大数据平台中敏感信息泄露的感知方法,该方法通过分析已知大数据平台敏感信息泄露的相关已知漏洞,抽取并推演目标敏感信息集合,并结合敏感信息操作语义建立目标集多属性模型,进而设计基于灰色关联分析及理想优基点法的敏感度计算方法, Based on multiple-attribute-decision-making and taint tracking,a sensitive-information leakage awareness method was proposed, some relative known vulnerabilities in big data platform was analyzed, target database was extracted and extended, multiple attribute model was built combined with operation semantic, a grey-correlation-analysis and technique for order preference by similarity to an ideal solution based sensitivity measurement was designed in combination of regular operation semantic for sensitive information.
46773 并基于污点跟踪实现了原型系统,最终实现了基于所提方案的跨平台敏感信息泄露漏洞的挖掘与验证。 A prototype was built based on taint tracking, sensitive information leakage vulnerabilities could be verified and discovered across big data platforms in this method.
46774 实验表明,所提方法可有效实现敏感信息泄露场景的已知漏洞验证及未知漏洞挖掘,从而为敏感信息动态数据流的安全防护提供支持。 The experiment shows that verification for known bugs and discovery for unknown vulnerabilities can be accomplished based on leakage scenarios, which can be regarded as a support for protection in dynamic sensitive information data flow.
46775 在 2 r 个变元的多输出旋转对称平衡函数和弹性函数存在的条件下,研究了输出变量维数的取值问题。 The value ranges of the number of output variables were determined respectively under the existence of mul-ti-output rotation symmetric balanced functions and resilient functions with 2 r input variables.