Libra: An Adaptive Method for Protecting Memory from Arbitrary Overwrite
نویسندگان
چکیده
منابع مشابه
Pattern Synthesis for Arbitrary Arrays Using an Adaptive Array Method
This paper presents a new pattern synthesis algorithm for arbitrary arrays based on adaptive array theory. With this algorithm, the designer can efficiently control both mainlobe shaping and sidelobe levels. The element weights optimize a weighted L2 norm between desired and achieved patterns. The values of the weighting function in the L2 norm, interpreted as imaginary jammers as in Olen and C...
متن کاملStructure of an Adaptive with Memory Method with Efficiency Index 2
The current research develops derivative-free family with memory methods with 100% improvement in the order of convergence. They have three parameters. The parameters are approximated and increase the convergence order from 4 to 6, 7, 7.5 and 8, respectively. Additionally, the new self-accelerating parameters are constructed by a new way. They have the properties of simple structures and they a...
متن کاملAn Adaptive Hierarchical Method Based on Wavelet and Adaptive Filtering for MRI Denoising
MRI is one of the most powerful techniques to study the internal structure of the body. MRI image quality is affected by various noises. Noises in MRI are usually thermal and mainly due to the motion of charged particles in the coil. Noise in MRI images also cause a limitation in the study of visual images as well as computer analysis of the images. In this paper, first, it is proved that proba...
متن کاملA Note On `A New Method For Solving An Arbitrary Fully Fuzzy Linear System'
In cite{beh}, the authors claimed by a counterexample that the cross product definition in cite{molo} is not correct and thus the proposed technique is false. In this note, we show that this assertion is incorrect.
متن کاملA Method for Protecting Access Pattern in Outsourced Data
Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computers
سال: 2016
ISSN: 1796-203X
DOI: 10.17706/jcp.11.4.280-288