Abstract:
In a detecting method for concurrency bugs, a Current Fetter Set is defined for a dynamic instance of a static instruction in program invariants. A Belonging Invariants Set and an Enforcing Invariants Set from the Current Fetter Set are extracted. The Belonging Invariants Set and the Enforcing Invariants Set are pruned to obtain final results after pruning and storing the final results after pruning in an invariants database. Invariant violation is detected using a detection unit whether a first Current Fetter Set dissatisfying with corresponding Belonging Invariants Set and Enforcing Invariants Set is shown. If yes, the first Current Fetter Set is determined to contain a bug, the detection unit generating a violation report. A currently-running thread (the violated thread) is stalled to prevent running of the bug.
Abstract:
The present disclosure disclosures a protecting system and method for privacy information in a mobile terminal. In the system, a crowdsourcing database stores security strategy information of applications. An interaction management module receives a recommendation request of security strategy sent by the mobile terminal. A recommendation algorithm module calculates according to the recommendation request of security strategy to obtain corresponding recommended security strategy. An interaction management module recommends the recommended security strategy to the privacy protecting module. A privacy protecting module notifies a user and assists the mobile terminal to set privacy protection strategy according to the recommended security strategy recommended by the interaction management module, and protects the privacy information in the mobile terminal according to the privacy protection strategy. The system can set privacy protection dynamically. In this way, user experience is improved.
Abstract:
A data backup method of a distributed file system is provided. The method is based on a comparison of a source file system and a target file system. Metadata of the target file system is compared with metadata of the source file system. The method includes: synchronizing target metadata of a target file according to source metadata of a source file, generating a file checksum list; determining whether a first target block is consistent with a first source block, obtaining and sending a first updated file checksum list to a first data node; determining whether a first chunk is consistent with a first target chunk, generating a first difference list, sending the first difference list and the first updated file checksum list to a first corresponding target data node; creating a temporary block, writing data in the temporary block, replacing the first corresponding target block with the temporary block.