Buffer overflow management with class segregation

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Buffer overflow management with class segregation

We consider a new model for buffer management of network switches with Quality of Service (QoS) requirements. A stream of packets, each attributed with a value representing its Class of Service (CoS), arrives over time at a network switch and demands a further transmission. The switch is equipped with multiple queues of limited capacities, where each queue stores packets of one value only. The ...

متن کامل

Buffer management of multi-queue QoS switches with class segregation

Abstract: In this paper, we focus on buffer management of multi-queue QoS switches in which packets of different values are segregated in different queues. Our model consists of m queues andm packet values 0 < v1 < v2 < · · · < vm. Recently, Al-Bawani and Souza [IPL 113(4), pp.145-150, 2013] presented an online algorithm greedy for buffer management of multi-queue QoS switches with class segreg...

متن کامل

Greedy Algorithms for Multi-Queue Buffer Management with Class Segregation

Abstract: In this paper, we focus on a multi-queue buffer management in which packets of different values are segregated in different queues. Our model consists of m packets values and m queues. Recently, Al-Bawani and Souza (CoRR abs/1103.6049v2 [cs.DS]19 Sep 2011) presented an online multi-queue buffer management algorithm Greedy and showed that it is 2-competitive for the general m-valued ca...

متن کامل

Dynamic Buffer Overflow Detection

The capabilities of seven dynamic buffer overflow detection tools (Chaperon, Valgrind, CCured, CRED, Insure++, ProPolice and TinyCC) are evaluated in this paper. These tools employ different approaches to runtime buffer overflow detection and range from commercial products to opensource gcc-enhancements. A comprehensive testsuite was developed consisting of specifically-designed test cases and ...

متن کامل

Buffer overflow and format string overflow vulnerabilities

Buffer overflow vulnerabilities are among the most widespread of security problems. Numerous incidents of buffer overflow attacks have been reported and many solutions have been proposed, but a solution that is both complete and highly practical is yet to be found. Another kind of vulnerability called format string overflow has recently been found, and though not as popular as buffer overflow, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information Processing Letters

سال: 2013

ISSN: 0020-0190

DOI: 10.1016/j.ipl.2012.12.014