ID | 原文 | 译文 |
3513 | 获取多数据项场景下候选结果最优权重,实现 Worker 权重与任务对结果性能需求匹配的最大化; | This model obtained the optimal weight of candidate results, and maximized the matching between Worker'sweight and result performance. |
3514 | 提出基于 Top-k 排序的优化模型求解算法,针对多数据项场景下候选结果的 Top-k 排序选取,在合适的 k 值下可快速求解上述模型,获得各 Worker的优化权重。 | Then, the optimization model solving method based on Top-k ranking was proposed to quickly obtain the optimal Worker's weight with the appropriate k value for specific multi-data items ranking scenario. |
3515 | 所提出的基于优化的 Worker 权重可实现结果汇聚的匹配性与匹配速度优化,即在提升结果汇聚速度的同时,具有优化的汇聚结果性能。 | The optimization of Worker's weight could realize optimized performance and speed of the result aggregation. |
3516 | 定性分析证明了算法的正确性,仿真实验结果也验证了算法的效果,与相关算法对比,所提算法的综合性能最优。 | The cor-rectness of the algorithm is verified by qualitative analysis, the effectiveness and efficiency of the algorithm is verified by the simulation results, and the comparison with the relevant algorithms shows the optimal comprehensive performance of the algorithm. |
3517 | 为了防御进程控制流劫持攻击,从漏洞利用的角度对攻击过程建立了威胁模型,提出了截断关键漏洞利用环节的“要塞”防御。 | To defeat the attack of process control flow hijacking, a threat model was established from the point of vul-nerability utilization, and the fortress defense to cut off the key vulnerability utilization path was proposed. |
3518 | 在研究拟态防御原理的基础上提出了进程的拟态执行模型,并对该模型进行了分析与有效性证明,拟态执行能够有效截断控制流劫持的攻击实施过程; | On the basis of studying the principle of mimic defense, a threat model of process mimic execution was proposed, and the threat mod-el was analyzed and proved to be effective. Mimic execution could effectively cut off the attack path of control flow hi-jacking. |
3519 | 实现了拟态执行的原型系统 MimicBox,并对MimicBox 进行了有效性验证实验、性能测试和对比评估。有效性验证实验表明,MimicBox 可以有效防御绝大部分基于已知类型二进制漏洞的控制流劫持攻击;性能评估结果表明,MimicBox 对 CPU 密集型程序带来的额外性能开销不会超过 13%; | The ptototype of mimic execution, MimicBox, was implemented. The validation experiment shows that Mimic-Box can effectively defend against most control flow hijacking attacks based on known binary vulnerabilities. The per-formance evaluation result shows that the overhead MimicBox lead to is less than 13% on CPU-intensive programs. |
3520 | 对比评估结果表明,拟态执行相对于控制流完整性防御来说,是一种较有效实用的主动防御方案。 | The Comparative evaluation result shows that mimic execution is a more effective and practical active defense method com-pared with control flow integrity. |
3521 | 为了解决微波光子混频系统的非线性失真和动态范围受限问题,提出了一种基于并联双平行马赫−曾德尔调制器(DPMZM)的大动态范围微波光子混频系统。 | To solve the problems of nonlinear distortion and limited dynamic range of microwave photonics mixing sys-tem, a large dynamic range microwave photonics mixing system based on parallel dual parallel Mach-Zehnder modulator(DPMZM) was proposed. |
3522 | 利用 DPMZM 实现射频和本振信号的并行调制,通过配置并行两路的电光调制指数及调制器的工作点,抵消输出中频信号中的三阶交调失真(IMD3),最终提高系统的动态范围。 | The parallel modulation of radio frequency and local oscillator signals was realized by usingDPMZM. The third-order intermodulation distortion (IMD3) in the output intermediate frequency signal was eliminatedby configuring the electro-optic modulation index of the two parallel channels and the working point of the modulators.Finally, the dynamic range of the system was improved. |