Abstract:
Embodiments of this application provide application processing methods and apparatuses. One method includes: receiving a startup request from a first client device, where the startup request is used to start an application. Loading, in a high-level language execution environment of an enclave, a manifest file of the application and a dependency relationship between an enclave entrypoint function of the application and a static dependency class, and loading a static dependency class of the enclave entrypoint function of the application based on the manifest file and the dependency relationship between the enclave entrypoint function and the static dependency class.
Abstract:
The invention relates to a client device (100) and a network access node (300) for transmitting and receiving a random access preamble. The modulation sequence for the random access preamble is based on a first sequence and a second sequence. The first sequence is a sequence from a set of near-orthogonal sequences and the second sequence is a sequence from a set of constant envelope sequences. Due to its construction, the random access preamble herein provides low PAPR and suppresses the side-lobes in its auto-correlation function while producing a set of preambles with low cross-correlation. Furthermore, the invention also relates to corresponding methods and a computer program.
Abstract:
A client device includes a processor and a memory. The client device is caused to obtain a first indication indicating an outcome of a link monitoring procedure associated with a serving link between a network access node and the client device. The client device is also caused to obtain a second indication indicating an outcome of a link re-configuration procedure associated with the serving link. The client device is further caused to determine a value of a first counter associated with a radio link failure timer based on the first indication and the second indication. The client device is additionally caused to start the radio link failure timer when the value of the first counter is equal to or larger than a first counter threshold value.
Abstract:
Disclosed are a data processing method and apparatus, a computing device, and a storage medium, which belongs to the field of big data technologies. The method includes: determining, based on a query algorithm, a first query output (601) corresponding to an input data set; determining, based on a second query output of an unsampled data record in the input data set and the query algorithm, a perturbation of each of a target quantity of sampled data records in the input data set to the first query output, to obtain sensitivity (602) corresponding to the input data set, where the unsampled data record and the target quantity of data records constitute the input data set; and adding noise to the first query output based on the sensitivity and outputting a noised first query output (603).
Abstract:
This disclosure relates to techniques for synchronization signals. The synchronization signal comprise a primary synchronization signal (PSS) generated based on a PSS sequence and a secondary synchronization signal (SSS) generated based on an SSS sequence. The SSS sequence may be generated based on a first sequence corresponding to a first cyclic shift and a second sequence corresponding to a second cyclic shift. The first cyclic shift and the second cyclic shift are associated with Cell ID. The PSS sequence may be generated based on one of the first and the second sequences.
Abstract:
A method, a system, and an apparatus for detecting malicious code to solve the problem that detection efficiency is low and that more resources are occupied. The method includes: monitoring execution of an instruction in a virtual machine supervisor of a host computer, where the instruction is generated in escape mode when a read-write request generated during execution of program code in a virtual machine of the host computer is delivered to the virtual machine supervisor; obtaining execution characteristics of the program code according to execution of the instruction; and comparing the obtained execution characteristics with pre-stored execution characteristics of known malicious code, and determining that the program code is malicious code when the obtained execution characteristics and the pre-stored execution characteristics are the same. This improves the detection efficiency, and saves the storage resources and the processing resources in the host computer.
Abstract:
A method for notifying a Real-Time Streaming Protocol (RTSP) event includes: monitoring an event state; and sending a notification indicative of a change of the event state to an event state receiving device if detecting the change of the event state. A computer program and a computer-readable storage medium are provided to enable a computer to perform the steps of the method for notifying an RTSP event. An apparatus for notifying an RTSP event includes: an event state monitoring unit, adapted to monitor an event state; and a message sending unit, adapted to send a notification indicative of a change of the event state when the event state monitoring unit detects the change of the event state. A system for notifying an RTSP event includes the RTSP event notifying apparatus.
Abstract:
A method, a system, and an apparatus for detecting malicious code to solve the problem that detection efficiency is low and that more resources are occupied. The method includes: monitoring execution of an instruction in a virtual machine supervisor of a host computer, where the instruction is generated in escape mode when a read-write request generated during execution of program code in a virtual machine of the host computer is delivered to the virtual machine supervisor; obtaining execution characteristics of the program code according to execution of the instruction; and comparing the obtained execution characteristics with pre-stored execution characteristics of known malicious code, and determining that the program code is malicious code when the obtained execution characteristics and the pre-stored execution characteristics are the same. This improves the detection efficiency, and saves the storage resources and the processing resources in the host computer.
Abstract:
An access object authentication technology is provided. A trusted component in a computing device completes an access object authentication process. When a client requests to access a target object, the trusted component receives an object ID and an authentication ID of the target object from the client, to perform, based on the authentication ID, tenant authentication on a tenant to which the client belongs. When the authentication on the tenant to which the client belongs succeeds, the trusted component accesses a storage device based on the object ID of the target object.
Abstract:
The present disclosure relates to reference signal design methods and devices. In one example method, a first communication device obtains at least one sequence from a subset of sequences in a set of sequences and obtains at least one reference signal based on the obtained at least one sequence. The sequence is phase rotated during its generation, phase rotated in the frequency domain, or cyclically shifted in the time domain based on a constant value Δq. The first communication device transmits the reference signal to a second communication device.